Patents by Inventor Shinichi Tankyo

Shinichi Tankyo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120005147
    Abstract: A technique for collecting information concerning those files distributed on a file sharing network and for detecting an information leak file to take corrective measures is provided. Supervised information is generated by adding as attributes a file type, a speech-part appearance frequency of words making up a file name and a result of human-made judgment as to whether a file being inspected is the information leak file to key information collected from the file sharing network. Next, the supervised information is input to a decision tree leaning algorithm, thereby causing it to learn an information leak file judgment rule and then derive a decision tree for use in information leak file judgment. Thereafter, this decision tree is used to detect the information leak file from key information flowing on the file sharing network, followed by alert transmission and key information invalidation, thereby preventing damage expansion.
    Type: Application
    Filed: June 28, 2011
    Publication date: January 5, 2012
    Inventors: HIROFUMI NAKAKOJI, Tetsuro Kito, Masato Terada, Shinichi Tankyo, Isao Kaine, Tomohiro Shigemoto
  • Publication number: 20100050260
    Abstract: An attack node set determination apparatus obtains an event log basic parameter extracted from collected event logs and attribute information based on the event log basic parameter. The attack node set determination apparatus performs a clustering on a space having dimensions of part or all of the obtained attribute information and event log basic parameter, computes a cluster, and transmits information on the cluster and a countermeasure against the cluster to a firewall. Upon detecting an attack packet from an attack node set, the firewall identifies a cluster including the attack packet and conducts a countermeasure against the whole identified cluster.
    Type: Application
    Filed: August 10, 2009
    Publication date: February 25, 2010
    Inventors: Hirofumi Nakakoji, Tetsuro Kito, Masato Terada, Shinichi Tankyo, Isao Kaine