Patents by Inventor Satoru Torii

Satoru Torii has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060085857
    Abstract: In this system, a monitor unit monitors outbound communications through a network interface. A process designation unit designates a process 2X which has generated communications. A process tree obtaining unit obtains and outputs process tree information for designation of an upper process to the process 2X. A discrimination unit refers to an illegal rule file for definition of an illegal process by a combination of a process and an upper process which have generated communications, and determines whether or not a process 2X is illegal according to communications information, process information, and process tree information. A process stop unit stops a process 2X determined to be illegal. A notification unit notifies a user of the stop of the process 2X.
    Type: Application
    Filed: January 25, 2005
    Publication date: April 20, 2006
    Applicant: Fujitsu Limited
    Inventors: Kazumasa Omote, Masahiko Takenaka, Satoru Torii
  • Publication number: 20060036718
    Abstract: In a system for providing software maintenance service, a server includes: a storage unit that stores a determination rule for determining whether to deny a process request to the faulty software; and a transmitting unit that transmits the determination rule to the client. The client includes: a determination-rule receiving unit that receives the determination rule; a process-request receiving unit that receives the process request; and a determining unit that determines whether to deny the process request based on the determination rule.
    Type: Application
    Filed: August 4, 2005
    Publication date: February 16, 2006
    Applicant: FUJITSU LIMITED
    Inventors: Masashi Mitomo, Satoru Torii, Etsuo Ono
  • Publication number: 20050289649
    Abstract: A malicious access-detecting apparatus which is cable of grasping the whole aspect of an attack which can occur, before it actually occurs. A monitoring information-collecting section collects monitoring information including the network events detected by the monitoring devices on networks. A malicious apparatus group-deriving section retrieves a corresponding piece of the event information from an event information storage device, and derives, based on the retrieved piece of the event information, apparatuses that are involved in relevant detected network events which belong to the predetermined type of network events and of which addresses of senders or recipients are same, as a malicious apparatus group involved in the predetermined type of malicious access. A storage section stores information on each derived malicious apparatus group. An output section outputs a list of the each derived malicious apparatus group.
    Type: Application
    Filed: January 26, 2005
    Publication date: December 29, 2005
    Applicant: Fujitsu Limited
    Inventors: Masashi Mitomo, Yoshiki Higashikado, Fumie Takizawa, Satoru Torii, Osamu Koyano
  • Publication number: 20050091533
    Abstract: A communication-information acquisition section 240a acquires information related to a traffic and communication address of a communication packet based on setting information related to acquisition of information that is stored in setting-data. Worm detection section makes a judgment of whether a communication is executed by a worm based on information acquired by the communication-information acquisition section and information related to judgment criteria that is stored in the setting-data and which regulates whether the communication is executed by a worm.
    Type: Application
    Filed: March 30, 2004
    Publication date: April 28, 2005
    Inventors: Kazumasa Omote, Satoru Torii
  • Publication number: 20050091513
    Abstract: An unauthorized access detection device capable of detecting unauthorized accesses which are made through preparation, in real time. When a packet travels on a network, a key data extractor obtains the packet and obtains key data. Next an ongoing scenario detector searches an ongoing scenario storage unit for an ongoing scenario with the key data as search keys. A check unit determines whether the execution of the process indicated by the packet after the ongoing scenario detected by the ongoing scenario detector follows an unauthorized access scenario being stored in an unauthorized access scenario storage unit. Then a report output unit outputs an unauthorized access report depending on the check result of the check unit.
    Type: Application
    Filed: April 12, 2004
    Publication date: April 28, 2005
    Inventors: Masashi Mitomo, Yoshiki Higashikado, Fumie Takizawa, Satoru Torii, Osamu Koyano
  • Publication number: 20040193892
    Abstract: An unauthorized access prevention system includes a countermeasure execution status screen generation unit, a countermeasure execution instruction obtaining unit, and a countermeasure execution control unit. With the configuration, the countermeasure execution status screen generation unit generates a screen on which a case where countermeasures are being taken to protect a destination against unauthorized access in traffic entering a predetermined position on a communications network can be identified. The countermeasure execution instruction obtaining unit obtains an instruction to take the countermeasures to be taken for each type of traffic or an instruction to suspend the countermeasures being taken. The countermeasure execution control unit controls to take the countermeasures or to suspend the countermeasures at the instruction.
    Type: Application
    Filed: March 4, 2004
    Publication date: September 30, 2004
    Applicant: Fujitsu Limited
    Inventors: Naohiro Tamura, Takuya Habu, Mayuko Morita, Satoru Torii, Osamu Koyano
  • Publication number: 20040187034
    Abstract: An unauthorized access prevention system that includes a search unit searching the flowing-in path of the unauthorized access to the services by a Web system disclosed by a user's ISP, a determination unit determining the place to implement a countermeasure for protecting the services from the unauthorized access based on the result of the search, and a notification unit notifying, according to a determination that that the countermeasure is implemented in the flow source that makes the unauthorized access flow into the user's communication network, the determination to the flow source.
    Type: Application
    Filed: March 1, 2004
    Publication date: September 23, 2004
    Applicant: FUJITSU LIMITED
    Inventors: Naohiro Tamura, Takuya Habu, Mayuko Morita, Satoru Torii, Osamu Koyano
  • Publication number: 20040168085
    Abstract: A security management apparatus is capable of taking various security measures while referencing machine information and hence excellent in flexibility and widely applicable. The apparatus includes a security diagnostic unit for making a security diagnosis on the basis of security information obtained from a security information providing apparatus for providing information concerning security in a network and further on the basis of machine information obtained from at least one network machine connected to a network to judge a type of security-related processing to be executed for the network machine and also judge whether or not the security-related processing needs to be executed. A security execution unit executes predetermined security measure processing for the network machine on the basis of a result of diagnosis made by the security diagnostic unit.
    Type: Application
    Filed: December 9, 2003
    Publication date: August 26, 2004
    Applicant: FUJITSU LIMITED
    Inventors: Kazumasa Omote, Satoru Torii
  • Publication number: 20030120603
    Abstract: Method signatures included in an input program are detected. An access analyzer sequentially analyzes the method signatures and obtains a run-time access right list based on a rule. This rule specifies method signatures and the access rights which may possibly be included in the program so that the method signatures correspond to the access rights, respectively. A comparator compares the run-time access right list with the design-time access right list in width of restriction based on another rule. This rule specifies widths related to restrictions of the access rights which may possibly be included in the program.
    Type: Application
    Filed: October 11, 2002
    Publication date: June 26, 2003
    Applicant: Fujitsu Limited
    Inventors: Hisashi Kojima, Satoru Torii
  • Patent number: 6470448
    Abstract: The digital signatures of users A and B are created for a transaction document which states the contents of a transaction between the users A and B, and they are sent to a transaction proof device of a notary public being a third party, together with the transaction document. Thus, the users A and B and the notary public share information, and the notary public can objectively prove the transactional contents, etc.
    Type: Grant
    Filed: March 31, 1997
    Date of Patent: October 22, 2002
    Assignee: Fujitsu Limited
    Inventors: Yasutsugu Kuroda, Masahiro Komura, Satoru Torii, Shoko Iwase, Etsuo Ono
  • Publication number: 20020133603
    Abstract: The filtering system includes the incorrect request database that stores patterns of incorrect accesses to the Web server. The estimation unit that estimates the correctness of an access request from a client device based on the patterns stored in the incorrect request database and a predetermined estimation rule. The decision unit decides whether the access request is to be passed to the Web server based on the result of estimation by the estimation unit and a predetermined decision rule.
    Type: Application
    Filed: July 25, 2001
    Publication date: September 19, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Masashi Mitomo, Satoru Torii, Seigo Kotani, Fumie Takizawa, Etsuo Ono, Osamu Koyano
  • Publication number: 20020133606
    Abstract: A filtering apparatus includes an illegal request DB (database) which stores patterns of illegal accesses to a Web server, an estimation section which estimates the legality of an access request from a client device based on the illegal access patterns stored in the illegal request DB and on a predetermined estimation rule, and a determination section which determines whether the access request is to be transmitted to the Web server based on an estimation result of the estimation section and on a predetermined determination rule.
    Type: Application
    Filed: March 5, 2002
    Publication date: September 19, 2002
    Applicant: Fujitsu Limited
    Inventors: Masashi Mitomo, Satoru Torii, Seigo Kotani, Fumie Takizawa, Etsuo Ono, Osamu Koyano
  • Publication number: 20020116631
    Abstract: The system includes the monitor agent that analyzes log of an entity. When an abnormality is detected, the monitor agent notifies about the abnormality to the control manager. The control manager decides a countermeasure and a countermeasure request party from the database and informs them to the action agent which the countermeasure request party. The action agent implements the countermeasure.
    Type: Application
    Filed: September 20, 2001
    Publication date: August 22, 2002
    Inventors: Satoru Torii, Masashi Mitomo, Seigo Kotani, Fumie Takizawa
  • Publication number: 20020016920
    Abstract: The security information mediation apparatus comprises security information registering unit which registers security information supplied by a client of a user, a transfer unit which transfers the security information registered in the security information registering unit to a client of a program developer. This client judges the usefulness of the security information and outputs reply information when the security information is useful. A reply information registering unit receives the reply information and payment information that indicates payment of the information presentation fee of the corresponding security information from the developer client. A transfer unit transfers the reply information and payment information to the client of the user.
    Type: Application
    Filed: December 20, 2000
    Publication date: February 7, 2002
    Inventors: Masahiro Komura, Seigo Kotani, Satoru Torii
  • Patent number: 6260145
    Abstract: In an authentication system for companies, a server appends suitable verification data to an electronic document to be circulated through terminal units for persons in charge. Each terminal is allocated a unique function in advance and applies it to the verification data in turn when receiving the document. Upon receipt of the document that has been circulated through the persons in charge, the server examines the function-applied value appended to the document to determine whether the document has been circulated correctly through the persons in charge, or via the correct route.
    Type: Grant
    Filed: July 29, 1997
    Date of Patent: July 10, 2001
    Assignee: Fujitsu Limited
    Inventors: Masahiro Komura, Etsuo Ono, Yasutsugu Kuroda, Satoru Torii
  • Patent number: 5892921
    Abstract: A prestaging method is adapted to a computer system comprising a central processing unit, a buffer and a secondary storage, where the prestaging method reads input data of a submitted job into the buffer from the secondary storage before executing the submitted job so as to carry out a prestaging.
    Type: Grant
    Filed: January 29, 1997
    Date of Patent: April 6, 1999
    Assignee: Fujitsu Limited
    Inventors: Takeo Murakami, Satoru Torii
  • Patent number: 5652916
    Abstract: A prestaging method is adapted to a computer system comprising a central processing unit, a buffer and a secondary storage, where the prestaging method reads input data of a submitted job into the buffer from the secondary storage before executing the submitted job so as to carry out a prestaging.
    Type: Grant
    Filed: December 21, 1995
    Date of Patent: July 29, 1997
    Assignee: Fujitsu Limited
    Inventors: Takeo Murakami, Satoru Torii
  • Patent number: 5355479
    Abstract: An interface conformance verification system uses a computer to verify, e.g., the interface between modules in a large computer program or other a verification target. The interface conformance verification system includes an information collector and a verifier. The information collector receives at least one module group made up of one or more modules, collects as identification data pieces of target information on a predetermined operation, and creates sets, each having elements formed of the identification data. For example, the identification data may be a list of all variables declared, referenced or assigned a value in respective modules. Each set may correspond to a module or a plurality of modules. The verifier has a set operating mechanism and judging unit.
    Type: Grant
    Filed: January 21, 1992
    Date of Patent: October 11, 1994
    Assignee: Fujitsu Limited
    Inventors: Satoru Torii, Etsuo Ono
  • Patent number: 5116188
    Abstract: A vibration suppressing device for a wheeled construction equipment having a wheeled chassis, a working device operatively supported on the wheeled chassis, and a hydraulic circuit including hydraulic actuators for operating the working device for up-and-down motion. The vibration suppressing device includes an accumulator filled with a pressurized gas for suppressing vibrations, and a mode changeover valve for connecting the accumulator to the load bearing pressure chambers of the hydraulic actuators in a travelling mode in which the wheeled construction equipment operates for running, and for disconnecting the accumulator from the load bearing pressure chambers of the hydraulic actuators in a working mode in which the wheeled construction equipment operates. When the working device is held at a height in the range of zero to a minimum limit height from the road, the vibration suppressing device meets conditions: P.sub.G x V.sub.A.sup.n .ltoreq.P.sub.H x V.sub.F.sup.n and P.sub.G .ltoreq.P.sub.H, where P.
    Type: Grant
    Filed: August 16, 1990
    Date of Patent: May 26, 1992
    Assignee: Kabushiki Kaisha Kobe Seiko Sho
    Inventors: Michiya Kurohashi, Satoru Torii, Yoichi Kunieda
  • Patent number: 4362018
    Abstract: A hydraulic rotation control circuit for a rotational actuator such as a hydraulic motor for rotating a rotary frame of a hydraulic crane, the circuit employing a combination of a number of check and variable reducing valves in a manner which allows smooth and delicate control of the rotation of the actuator to provide an operation performance equivalent to that of mechanical drive, including coasting operation of the motor.
    Type: Grant
    Filed: June 12, 1980
    Date of Patent: December 7, 1982
    Assignee: Kobe Steel, Ltd.
    Inventor: Satoru Torii