Patents by Inventor Shigeyoshi Shima
Shigeyoshi Shima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240119259Abstract: A training data generating system includes an existing tag information acquiring unit, a target tag information acquiring unit, a selecting unit, and a training data generating unit. The existing tag information acquiring unit identifies, as an existing application, an application for which training data for a user operation model has already been generated based on a user operation history and, for each existing application, acquires tag information indicating a feature of the application as existing tag information. The target tag information acquiring unit acquires tag information of a target application as target tag information. The selecting unit calculates a degree of similarity between the target tag information and each piece of the existing tag information and, based on the degree of similarity, selects a similar application from the existing applications. The training data generating unit generates training data for the target application from training data for the similar application.Type: ApplicationFiled: January 28, 2021Publication date: April 11, 2024Applicant: NEC CorporationInventors: Daichi HASUMI, Shigeyoshi Shima
-
Publication number: 20230222027Abstract: The communication terminal detects a functional module of anomalous operating state, and to notify the edge server of the anomalous operating state. The edge server generates respective disk images corresponding to the functional module and a related functional module, generates a plurality of divided disk images obtained by dividing the generated disk image, and sends the plurality of divided disk images to the storage device. The storage device stores the divided disk images, and sends divided disk images corresponding to the functional module and the related functional module to the communication terminal in response to request from the communication terminal. The communication terminal generates the disk image by coupling the plurality of divided disk images acquired from the storage device, and turns on the functional module and the related functional module based on the generated disk image.Type: ApplicationFiled: June 26, 2020Publication date: July 13, 2023Applicant: NEC CorporationInventors: Daichi HASUMI, Shigeyoshi SHIMA
-
Publication number: 20230032143Abstract: A log generation apparatus includes: a log classifying unit that classifies log data formed of a plurality of logs into groups based on log types; a statistical model generating unit that performs, for each of the groups, a conversion of the logs classified into the group into events that are each formed of two or more logs, and further generates a statistical model by calculating, for each of the events obtained by the conversion, an appearance probability of the event based on the times of occurrence of the event and the number of instances of the event; and a log information generating unit that selects a specific event in accordance with the appearance probabilities of the events in the statistical model and generates new logs, or log information for generating the new logs, using text data that corresponds to the selected event and that has been prepared beforehand.Type: ApplicationFiled: February 25, 2020Publication date: February 2, 2023Applicant: NEC CorporationInventors: Daichi HASUMI, Shigeyoshi SHIMA
-
Patent number: 11500987Abstract: Provided is an incident effect range estimation device which estimates the range of the effect of an incident and shortens incident handling time. This incident effect range estimation device is provided with an incident origin log acquisition unit which acquires log information for the incident-originating device which is related to the occurrence of the incident, a communication destination log acquisition unit which acquires, on the basis of the log information for the incident-originating device, log information for a communication destination device which is the communication destination of the incident-originating device, and an effect range estimation unit which estimates the range of the effect of the incident on the basis of the communication destination device. The range of the effect of the incident can thereby be estimated automatically, and thus incident handling time can be shortened significantly.Type: GrantFiled: October 20, 2017Date of Patent: November 15, 2022Assignee: NEC CORPORATIONInventors: Daichi Hasumi, Satoshi Ikeda, Shigeyoshi Shima
-
Publication number: 20210400068Abstract: Provided is a communication information integration system 1 in which a communication information integration apparatus 3 classifies collected first communication information for each terminal apparatus 4, generates summary information summarizing the classified communication information corresponding to the terminal 4, and transmits the generated summary information to the corresponding terminal apparatus 4, the terminal apparatus 4, upon receiving the summary information, extracts a difference between the first communication information and second communication information collected by the terminal apparatus 4, using the second communication information and the summary information, generates difference communication information based on the extracted difference, and transmits the generated difference communication information to the communication information integration apparatus 3, and the communication information integration apparatus 3, upon receiving the difference communication information from the teType: ApplicationFiled: October 2, 2018Publication date: December 23, 2021Applicant: NEC CorporationInventors: Daichi HASUMI, Satoshi IKEDA, Shigeyoshi SHIMA
-
Publication number: 20190319974Abstract: Provided is an incident effect range estimation device which estimates the range of the effect of an incident and shortens incident handling time. This incident effect range estimation device 10 is provided with an incident origin log acquisition unit 11 which acquires log information for the incident-originating device which is related to the occurrence of the incident, a communication destination log acquisition unit 12 which acquires, on the basis of the log information for the incident-originating device, log information for a communication destination device which is the communication destination of the incident-originating device, and an effect range estimation unit 13 which estimates the range of the effect of the incident on the basis of the communication destination device. The range of the effect of the incident can thereby be estimated automatically, and thus incident handling time can be shortened significantly.Type: ApplicationFiled: October 20, 2017Publication date: October 17, 2019Applicant: NEC CORPORATIONInventors: Daichi HASUMI, Satoshi IKEDA, Shigeyoshi SHIMA
-
Patent number: 8510822Abstract: Provided is a communication system capable of fundamentally preventing an attack from an unspecified counterpart and resolve problem even when a problem occurs in a user terminal or client and a server. A mediation server (1) receives an attack from an outside source on behalf of a server (34) (server A), redirects and receives communication addressed to a node-representative ID, and performs first authentication for the communication. In the case of a reliable user terminal or client (42) (client B), the mediation server (1) provides the device with an intermediary server ID specifying an intermediary server (2). The intermediary server (2) performs second authentication for the user terminal or client (42) (client B) going through the mediation server (1).Type: GrantFiled: March 7, 2008Date of Patent: August 13, 2013Assignee: NEC CorporationInventors: Hiroshi Kitamura, Shigeyoshi Shima
-
Patent number: 8239684Abstract: A management server calculates a hash value of software for providing a service, generates a first software area from software which is provided a second electronic signature, provides a third electronic signature to user information provided with a first electronic signature transmitted from a terminal, to the hash value, and to user management information, encrypts a second software area generated from the third electronic signature, user information, from hash value, and from user management information using a common key of the management server and service providing server, combines the first software area and encrypted second software area to create a software IC card, encrypts the software IC card using a public key of the terminal, and transmits the encrypted software IC card to the terminal.Type: GrantFiled: January 17, 2008Date of Patent: August 7, 2012Assignee: NEC CorporationInventors: Shigeyoshi Shima, Yukiko Endo
-
Publication number: 20120072492Abstract: When a client transmits an HTML request to a server (step S5), the server generates HTML texts (step S7), and transmits the generated texts to the client (step S8). A control unit obtains information displayed by a browser (step S11), and determines whether or not confidential information like personal information is displayed by the browser and it is necessary to create a log, and creates the log if necessary (step S12). When creating the log, the control unit transmits the created log to the WWW server (step S13).Type: ApplicationFiled: May 27, 2010Publication date: March 22, 2012Applicant: NEC CORPORATIONInventors: Satoshi Aoki, Takayuki Ishikawa, Masaru Kawakita, Shuntaro Nagai, Shigeyoshi Shima
-
Publication number: 20100122094Abstract: A management server calculates a hash value of software for providing a service, generates a first software area from software which is provided a second electronic signature, provides a third electronic signature to user information provided with a first electronic signature transmitted from a terminal, to the hash value, and to user management information, encrypts a second software area generated from the third electronic signature, user information, from hash value, and from user management information using a common key of the management server and service providing server, combines the first software area and encrypted second software area to create a software IC card, encrypts the software IC card using a public key of the terminal, and transmits the encrypted software IC card to the terminal.Type: ApplicationFiled: January 17, 2008Publication date: May 13, 2010Inventor: SHIGEYOSHI SHIMA
-
Publication number: 20100107237Abstract: Provided is a communication system capable of fundamentally preventing an attack from an unspecified counterpart and resolve problem even when a problem occurs in a user terminal or client and a server. A mediation server (1) receives an attack from an outside source on behalf of a server (34) (server A), redirects and receives communication addressed to a node-representative ID, and performs first authentication for the communication. In the case of a reliable user terminal or client (42) (client B), the mediation server (1) provides the device with an intermediary server ID specifying an intermediary server (2). The intermediary server (2) performs second authentication for the user terminal or client (42) (client B) going through the mediation server (1).Type: ApplicationFiled: March 7, 2008Publication date: April 29, 2010Applicant: NEC CORPORATIONInventors: Hiroshi Kitamura, Shigeyoshi Shima
-
Publication number: 20100070769Abstract: In a log acquisition system comprising a log collection terminal for collecting log data and a log acquisition terminal for acquiring the log data collected by the log collection terminal from the log collection terminal, the log collection terminal stores a common key between the log collection terminal and the log acquisition terminal in a hardware security module inherently mounted in the log collection terminal, encrypts the collected log data as encrypted log data using the stored common key, and stores the encrypted log data, and the log acquisition terminal stores the common key in a hardware security module inherently mounted in the log acquisition terminal, acquires the encrypted log data from the log collection terminal, and decrypts the acquired encrypted log data with the common key.Type: ApplicationFiled: January 22, 2008Publication date: March 18, 2010Inventors: Shigeyoshi Shima, Yukiko Endo
-
Publication number: 20100031049Abstract: In a time information distribution system for distributing time information from a time distributing station to terminals, the time distributing station gives the electronic signature of the time distributing station to time information to be distributed and distributes the time information to which the electronic signature has been appended to the terminals. The terminals verify the electronic signature given to the time information distributed from the time distributing station and, if a determination has been made that the electronic signature has already been given by the time distributing station, store the time information to which the electronic signature is given in a hardware security module installed in the terminals.Type: ApplicationFiled: January 22, 2008Publication date: February 4, 2010Inventors: Shigeyoshi Shima, Yukiko Endo
-
Publication number: 20080310319Abstract: A server includes a packet monitoring unit for monitoring a packet that is sent from a terminal without a function of automatically allocating an Internet Protocol (IP) address to a destination via an unknown network so as to detect the destined IP address of the packet; and a setting changing unit for setting the destined IP address detected by the packet monitoring unit to a self device.Type: ApplicationFiled: May 1, 2008Publication date: December 18, 2008Inventors: HIROSHI KITAMURA, Shigeyoshi Shima, Koki Hayashi, Tsuneo Okajima
-
Patent number: 7443884Abstract: An electronic data transmission and reception system has n apparatus, a transmitting apparatus, and a receiving apparatus which are connected to a network. The transmitting apparatus transmits first electronic data to a first apparatus. The receiving apparatus receives (n+1)th electronic data from a nth apparatus. A jth (j is an integer satisfying 1?j?n) apparatus generates (j+1)th electronic data which comprise jth electronic data with a signature assigned thereto for identifying the jth apparatus, and transmits the (j+1) electronic data to a (j+1)th apparatus. When j is n, an (n+1)th apparatus corresponds to the receiving apparatus. The electronic data transmission and reception system guarantees the first electronic data transmitted by the transmitting apparatus until the first electronic data are received by the receiving apparatus, because of signatures that are generated until the (j+1) electronic data are generated.Type: GrantFiled: September 29, 2003Date of Patent: October 28, 2008Assignee: NEC CorporationInventor: Shigeyoshi Shima
-
Publication number: 20040066797Abstract: An electronic data transmission and reception system has n apparatus, a transmitting apparatus, and a receiving apparatus which are connected to a network. The transmitting apparatus transmits first electronic data to a first apparatus. The receiving apparatus receives (n+1)th electronic data from a nth apparatus. A jth (j is an integer satisfying 1≦j≦n) apparatus generates (j+1)th electronic data which comprise jth electronic data with a signature assigned thereto for identifying the jth apparatus, and transmits the (j+1) electronic data to a (j+1)th apparatus. When j is n, an (n+1)th apparatus corresponds to the receiving apparatus. The electronic data transmission and reception system guarantees the first electronic data transmitted by the transmitting apparatus until the first electronic data are received by the receiving apparatus, because of signatures that are generated until the (j+1) electronic data are generated.Type: ApplicationFiled: September 29, 2003Publication date: April 8, 2004Applicant: NEC CORPORATIONInventor: Shigeyoshi Shima