Patents by Inventor Shoji Sakurai
Shoji Sakurai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10770644Abstract: A piezoelectric device includes a substrate that is flexible and thermally deformable, and a composite piezoelectric body disposed on the substrate. Output in accordance with deformation of the composite piezoelectric body is obtained. The composite piezoelectric body includes a piezoelectric layer containing an organic binder containing piezoelectric particles, a first electrode layer stacked on a first surface side of the piezoelectric layer, and a second electrode stacked on a second surface side of the piezoelectric layer. The substrate is insert molded and integrated with a molded resin body having a curved shape.Type: GrantFiled: July 11, 2017Date of Patent: September 8, 2020Assignee: ALPS ALPINE CO., LTD.Inventors: Heishiro Fudo, Yasuji Hagiwara, Daisuke Takai, Shoji Sakurai, Masahiro Ishida, Yo Tahara
-
Patent number: 10684639Abstract: A movement member which reciprocates includes a thick portion and a thin portion, a bearing portion formed in the thick portion is slidingly supported by the guide shaft, and a sliding portion formed in the thin portion is slidingly guided by the sliding guide portion. Power of the motor is transmitted to a pinion gear via a speed reduction gear and a speed reduction mechanism inside a gear box, and a movement reaction force is applied from the pinion gear to the rack portion. Since the rack portion is positioned on an axis Os, a force is effectively applied to the movement member by the power from the motor.Type: GrantFiled: April 5, 2017Date of Patent: June 16, 2020Assignee: Alps Alpine Co., Ltd.Inventors: Kunio Sato, Shun Miyazaki, Yasuji Hagiwara, Keigo Wakana, Shoji Sakurai
-
Patent number: 10491628Abstract: The present invention relates to an attack observation apparatus being a simulation environment where a malicious program such as malware created by an attacker is run, the simulation environment being built for observing the behavior and attack scheme of the malicious program. The attack observation apparatus includes a low-interactive simulation environment to execute on a terminal a predetermined response to communication coming from the malware, a high-interactive simulation environment to execute a response to the communication coming from the malware with using a virtual machine which simulates the terminal, and a communication management part to monitor an execution state of the low-interactive simulation environment with respect to the communication coming from the malware and switch the communication coming from the malware to the high-interactive simulation environment depending on the execution state of the low-interactive simulation environment.Type: GrantFiled: September 17, 2014Date of Patent: November 26, 2019Assignee: MITSUBISHI ELECTRIC CORPORATIONInventors: Kiyoto Kawauchi, Shoji Sakurai
-
Patent number: 10391395Abstract: An operating device includes a moving member that reciprocates, a motor that applies a force for moving forward and a force for moving rearward to the moving member, a position sensing unit that detects a position to which the moving member is moved, and a control device that varies a load applied to the motor in accordance with an output signal from the position sensing unit. According to the operating device, a reaction force that acts on a finger or the like can be changed in accordance with the position of the moving member that is operated by using a hand or the finger.Type: GrantFiled: March 23, 2017Date of Patent: August 27, 2019Assignee: ALPS ALPINE CO., LTD.Inventors: Kunio Sato, Shun Miyazaki, Yasuji Hagiwara, Shoji Sakurai, Keigo Wakana
-
Patent number: 10325094Abstract: The present invention relates to a process analysis apparatus for analyzing a process executed in an information processing unit and extracting encryption logic such as an encryption function or a decryption function used in the process.Type: GrantFiled: August 28, 2014Date of Patent: June 18, 2019Assignee: MITSUBISHI ELECTRIC CORPORATIONInventors: Takumi Yamamoto, Shoji Sakurai, Kiyoto Kawauchi
-
Patent number: 10073973Abstract: A test memory extracting unit 110 extracts a test memory image 191 from a memory area of a target system. A template memory extracting unit 120 extracts a template memory image 192 from a template system not infected with malware. An injected code detecting unit 130 compares the test memory image 191 with the template memory image 192, and generates an injected code list 193. An injected code testing unit 140 generates a malicious code list 195 based on the injected code list 193 and a test rule list 194. A test result output unit 150 generates a test result file 196 based on the malicious code list 195.Type: GrantFiled: September 25, 2013Date of Patent: September 11, 2018Assignee: Mitsubishi Electric CorporationInventors: Takumi Yamamoto, Kiyoto Kawauchi, Shoji Sakurai
-
Patent number: 9853994Abstract: In a log analysis cooperation system including a logger that collects a log of a communication device and stores the log in a storage device, a SIEM apparatus that detects an attack, and a log analysis apparatus that analyzes the log collected by the logger, a log analysis cooperation apparatus stores an attack scenario in a storage device, receives from the SIEM apparatus warning information including information on the detected attack, computes a predicted occurrence time of an attack predicted to occur subsequent to the detected attack based on the warning information and the attack scenario, and transmits to the log analysis apparatus a scheduled search to search the log at predicted occurrence time computed. The log analysis apparatus transmits a scheduled search to the logger to search the log at the predicted occurrence time.Type: GrantFiled: November 8, 2013Date of Patent: December 26, 2017Assignee: Mitsubishi Electric CorporationInventors: Hiroyuki Sakakibara, Shoji Sakurai, Kiyoto Kawauchi
-
Publication number: 20170337378Abstract: The present invention relates to a process analysis apparatus for analyzing a process executed in an information processing unit and extracting encryption logic such as an encryption function or a decryption function used in the process.Type: ApplicationFiled: August 28, 2014Publication date: November 23, 2017Applicant: MITSUBISHI ELECTRIC CORPORATIONInventors: Takumi YAMAMOTO, Shoji SAKURAI, Kiyoto KAWAUCHI
-
Publication number: 20170317265Abstract: A piezoelectric device includes a substrate that is flexible and thermally deformable, and a composite piezoelectric body disposed on the substrate. Output in accordance with deformation of the composite piezoelectric body is obtained. The composite piezoelectric body includes a piezoelectric layer containing an organic binder containing piezoelectric particles, a first electrode layer stacked on a first surface side of the piezoelectric layer, and a second electrode stacked on a second surface side of the piezoelectric layer. The substrate is insert molded and integrated with a molded resin body having a curved shape.Type: ApplicationFiled: July 11, 2017Publication date: November 2, 2017Inventors: Heishiro FUDO, Yasuji HAGIWARA, Daisuke TAKAI, Shoji SAKURAI, Masahiro ISHIDA, Yo TAHARA
-
Publication number: 20170302683Abstract: The present invention relates to an attack observation apparatus being a simulation environment where a malicious program such as malware created by an attacker is run, the simulation environment being built for observing the behavior and attack scheme of the malicious program. The attack observation apparatus includes a low-interactive simulation environment to execute on a terminal a predetermined response to communication coming from the malware, a high-interactive simulation environment to execute a response to the communication coming from the malware with using a virtual machine which simulates the terminal, and a communication management part to monitor an execution state of the low-interactive simulation environment with respect to the communication coming from the malware and switch the communication coming from the malware to the high-interactive simulation environment depending on the execution state of the low-interactive simulation environment.Type: ApplicationFiled: September 17, 2014Publication date: October 19, 2017Applicant: MITSUBISHI ELECTRIC CORPORATIONInventors: Kiyoto KAWAUCHI, Shoji SAKURAI
-
Patent number: 9794274Abstract: An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and generates packet information by setting an entry for each collected packet and describing attribute data of the packet together with occurrence time of the packet for each entry. Further, the attack detection apparatus (6) stores definition information which defines an extraction time width and an extraction condition for each category of attack.Type: GrantFiled: September 8, 2014Date of Patent: October 17, 2017Assignee: Mitsubishi Electric CorporationInventors: Shoji Sakurai, Kiyoto Kawauchi
-
Publication number: 20170277887Abstract: A candidate event derivation unit (101) derives, as a candidate event, an event predicted to occur in an information system (200) including a plurality of system components (300), the event being a candidate for a monitoring target. An attribute identification unit (102) derives, as a candidate system component, a system component (300) involved in occurrence of the candidate event from among the plurality of system components (300), and identifies an attribute of the candidate system component. A monitoring target decision unit (103) analyzes the attribute of the candidate system component identified by the attribute identification unit (102), and decides whether or not the candidate event is to be the monitoring target.Type: ApplicationFiled: November 14, 2014Publication date: September 28, 2017Applicant: MITSUBISHI ELECTRIC CORPORATIONInventors: Hideaki IJIRO, Shoji SAKURAI, Kiyoto KAWAUCHI
-
Publication number: 20170237751Abstract: An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and generates packet information by setting an entry for each collected packet and describing attribute data of the packet together with occurrence time of the packet for each entry. Further, the attack detection apparatus (6) stores definition information which defines an extraction time width and an extraction condition for each category of attack.Type: ApplicationFiled: September 8, 2014Publication date: August 17, 2017Applicant: MITSUBISHI ELECTRIC CORPORATIONInventors: Shoji SAKURAI, Kiyoto KAWAUCHI
-
Publication number: 20170212548Abstract: A movement member which reciprocates includes a thick portion and a thin portion, a bearing portion formed in the thick portion is slidingly supported by the guide shaft, and a sliding portion formed in the thin portion is slidingly guided by the sliding guide portion. Power of the motor is transmitted to a pinion gear via a speed reduction gear and a speed reduction mechanism inside a gear box, and a movement reaction force is applied from the pinion gear to the rack portion. Since the rack portion is positioned on an axis Os, a force is effectively applied to the movement member by the power from the motor.Type: ApplicationFiled: April 5, 2017Publication date: July 27, 2017Inventors: Kunio SATO, Shun MIYAZAKI, Yasuji HAGIWARA, Keigo WAKANA, Shoji SAKURAI
-
Publication number: 20170203208Abstract: An operating device includes a moving member that reciprocates, a motor that applies a force for moving forward and a force for moving rearward to the moving member, a position sensing unit that detects a position to which the moving member is moved, and a control device that varies a load applied to the motor in accordance with an output signal from the position sensing unit. According to the operating device, a reaction force that acts on a finger or the like can be changed in accordance with the position of the moving member that is operated by using a hand or the finger.Type: ApplicationFiled: March 23, 2017Publication date: July 20, 2017Inventors: Kunio SATO, Shun MIYAZAKI, Yasuji HAGIWARA, Shoji SAKURAI, Keigo WAKANA
-
Patent number: 9507933Abstract: Execute a countermeasure process for vulnerability reliably before an attack aiming at vulnerability occurs. A vulnerability countermeasure processing unit performs a countermeasure process for vulnerability of a vulnerable library function being a general-purpose library function that has vulnerability among the general-purpose library functions included in a general-purpose library. A countermeasure selection unit, when a call for the vulnerable library function is requested at execution of a Web application, makes the vulnerability countermeasure processing unit perform the countermeasure process for the vulnerability of the vulnerable library function, and after the countermeasure process is performed by the vulnerability countermeasure processing unit, calls the vulnerable library function.Type: GrantFiled: July 25, 2013Date of Patent: November 29, 2016Assignee: Mitsubishi Electric CorporationInventors: Takeshi Ueda, Shoji Sakurai
-
Publication number: 20160224791Abstract: A test memory extracting unit 110 extracts a test memory image 191 from a memory area of a target system. A template memory extracting unit 120 extracts a template memory image 192 from a template system not infected with malware. An injected code detecting unit 130 compares the test memory image 191 with the template memory image 192, and generates an injected code list 193. An injected code testing unit 140 generates a malicious code list 195 based on the injected code list 193 and a test rule list 194. A test result output unit 150 generates a test result file 196 based on the malicious code list 195.Type: ApplicationFiled: September 25, 2013Publication date: August 4, 2016Applicant: MITSUBISHI ELECTRIC CORPORATIONInventors: Takumi YAMAMOTO, Kiyoto KAWAUCHI, Shoji SAKURAI
-
Publication number: 20160210474Abstract: An information leakage prevention apparatus 100 receives, from a LAN 109, communication data transmitted by a PC 112 to Internet 111, and when the received data has been encrypted, analyzes a log describing content of data processing performed in the PC 112 and extracts a key used to encrypt the communication data in the PC 112. Further, the information leakage prevention apparatus 100 decrypts the communication data using the extracted key and determines whether or not a keyword is included in a decryption result. If the keyword is not included in the decryption result, the information leakage prevention apparatus 100 transmits the communication data to the Internet 111 through a WAN 110.Type: ApplicationFiled: August 27, 2013Publication date: July 21, 2016Applicant: MITSUBISHI ELECTRIC CORPORATIONInventors: Shoji SAKURAI, Kiyoto KAWAUCHI, Takeshi UEDA, Tomonori NEGI
-
Publication number: 20150302191Abstract: Execute a countermeasure process for vulnerability reliably before an attack aiming at vulnerability occurs. A vulnerability countermeasure processing unit performs a countermeasure process for vulnerability of a vulnerable library function being a general-purpose library function that has vulnerability among the general-purpose library functions included in a general-purpose library. A countermeasure selection unit, when a call for the vulnerable library function is requested at execution of a Web application, makes the vulnerability countermeasure processing unit perform the countermeasure process for the vulnerability of the vulnerable library function, and after the countermeasure process is performed by the vulnerability countermeasure processing unit, calls the vulnerable library function.Type: ApplicationFiled: July 25, 2013Publication date: October 22, 2015Applicant: Mitsubishi Electric CorporationInventors: Takeshi UEDA, Shoji Sakurai
-
Publication number: 20150256554Abstract: In a log analysis cooperation system including a logger that collects a log of a communication device and stores the log in a storage device, a SIEM apparatus that detects an attack, and a log analysis apparatus that analyzes the log collected by the logger, a log analysis cooperation apparatus stores an attack scenario in a storage device, receives from the SIEM apparatus warning information including information on the detected attack, computes a predicted occurrence time of an attack predicted to occur subsequent to the detected attack based on the warning information and the attack scenario, and transmits to the log analysis apparatus a scheduled search to search the log at predicted occurrence time computed. The log analysis apparatus transmits a scheduled search to the logger to search the log at the predicted occurrence time.Type: ApplicationFiled: November 8, 2013Publication date: September 10, 2015Applicant: Mitsubishi Electric CorporationInventors: Hiroyuki Sakakibara, Shoji Sakurai, Kiyoto Kawauchi