Patents by Inventor Shoji Sakurai

Shoji Sakurai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10770644
    Abstract: A piezoelectric device includes a substrate that is flexible and thermally deformable, and a composite piezoelectric body disposed on the substrate. Output in accordance with deformation of the composite piezoelectric body is obtained. The composite piezoelectric body includes a piezoelectric layer containing an organic binder containing piezoelectric particles, a first electrode layer stacked on a first surface side of the piezoelectric layer, and a second electrode stacked on a second surface side of the piezoelectric layer. The substrate is insert molded and integrated with a molded resin body having a curved shape.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: September 8, 2020
    Assignee: ALPS ALPINE CO., LTD.
    Inventors: Heishiro Fudo, Yasuji Hagiwara, Daisuke Takai, Shoji Sakurai, Masahiro Ishida, Yo Tahara
  • Patent number: 10684639
    Abstract: A movement member which reciprocates includes a thick portion and a thin portion, a bearing portion formed in the thick portion is slidingly supported by the guide shaft, and a sliding portion formed in the thin portion is slidingly guided by the sliding guide portion. Power of the motor is transmitted to a pinion gear via a speed reduction gear and a speed reduction mechanism inside a gear box, and a movement reaction force is applied from the pinion gear to the rack portion. Since the rack portion is positioned on an axis Os, a force is effectively applied to the movement member by the power from the motor.
    Type: Grant
    Filed: April 5, 2017
    Date of Patent: June 16, 2020
    Assignee: Alps Alpine Co., Ltd.
    Inventors: Kunio Sato, Shun Miyazaki, Yasuji Hagiwara, Keigo Wakana, Shoji Sakurai
  • Patent number: 10491628
    Abstract: The present invention relates to an attack observation apparatus being a simulation environment where a malicious program such as malware created by an attacker is run, the simulation environment being built for observing the behavior and attack scheme of the malicious program. The attack observation apparatus includes a low-interactive simulation environment to execute on a terminal a predetermined response to communication coming from the malware, a high-interactive simulation environment to execute a response to the communication coming from the malware with using a virtual machine which simulates the terminal, and a communication management part to monitor an execution state of the low-interactive simulation environment with respect to the communication coming from the malware and switch the communication coming from the malware to the high-interactive simulation environment depending on the execution state of the low-interactive simulation environment.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: November 26, 2019
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Kiyoto Kawauchi, Shoji Sakurai
  • Patent number: 10391395
    Abstract: An operating device includes a moving member that reciprocates, a motor that applies a force for moving forward and a force for moving rearward to the moving member, a position sensing unit that detects a position to which the moving member is moved, and a control device that varies a load applied to the motor in accordance with an output signal from the position sensing unit. According to the operating device, a reaction force that acts on a finger or the like can be changed in accordance with the position of the moving member that is operated by using a hand or the finger.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: August 27, 2019
    Assignee: ALPS ALPINE CO., LTD.
    Inventors: Kunio Sato, Shun Miyazaki, Yasuji Hagiwara, Shoji Sakurai, Keigo Wakana
  • Patent number: 10325094
    Abstract: The present invention relates to a process analysis apparatus for analyzing a process executed in an information processing unit and extracting encryption logic such as an encryption function or a decryption function used in the process.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: June 18, 2019
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takumi Yamamoto, Shoji Sakurai, Kiyoto Kawauchi
  • Patent number: 10073973
    Abstract: A test memory extracting unit 110 extracts a test memory image 191 from a memory area of a target system. A template memory extracting unit 120 extracts a template memory image 192 from a template system not infected with malware. An injected code detecting unit 130 compares the test memory image 191 with the template memory image 192, and generates an injected code list 193. An injected code testing unit 140 generates a malicious code list 195 based on the injected code list 193 and a test rule list 194. A test result output unit 150 generates a test result file 196 based on the malicious code list 195.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: September 11, 2018
    Assignee: Mitsubishi Electric Corporation
    Inventors: Takumi Yamamoto, Kiyoto Kawauchi, Shoji Sakurai
  • Patent number: 9853994
    Abstract: In a log analysis cooperation system including a logger that collects a log of a communication device and stores the log in a storage device, a SIEM apparatus that detects an attack, and a log analysis apparatus that analyzes the log collected by the logger, a log analysis cooperation apparatus stores an attack scenario in a storage device, receives from the SIEM apparatus warning information including information on the detected attack, computes a predicted occurrence time of an attack predicted to occur subsequent to the detected attack based on the warning information and the attack scenario, and transmits to the log analysis apparatus a scheduled search to search the log at predicted occurrence time computed. The log analysis apparatus transmits a scheduled search to the logger to search the log at the predicted occurrence time.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: December 26, 2017
    Assignee: Mitsubishi Electric Corporation
    Inventors: Hiroyuki Sakakibara, Shoji Sakurai, Kiyoto Kawauchi
  • Publication number: 20170337378
    Abstract: The present invention relates to a process analysis apparatus for analyzing a process executed in an information processing unit and extracting encryption logic such as an encryption function or a decryption function used in the process.
    Type: Application
    Filed: August 28, 2014
    Publication date: November 23, 2017
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takumi YAMAMOTO, Shoji SAKURAI, Kiyoto KAWAUCHI
  • Publication number: 20170317265
    Abstract: A piezoelectric device includes a substrate that is flexible and thermally deformable, and a composite piezoelectric body disposed on the substrate. Output in accordance with deformation of the composite piezoelectric body is obtained. The composite piezoelectric body includes a piezoelectric layer containing an organic binder containing piezoelectric particles, a first electrode layer stacked on a first surface side of the piezoelectric layer, and a second electrode stacked on a second surface side of the piezoelectric layer. The substrate is insert molded and integrated with a molded resin body having a curved shape.
    Type: Application
    Filed: July 11, 2017
    Publication date: November 2, 2017
    Inventors: Heishiro FUDO, Yasuji HAGIWARA, Daisuke TAKAI, Shoji SAKURAI, Masahiro ISHIDA, Yo TAHARA
  • Publication number: 20170302683
    Abstract: The present invention relates to an attack observation apparatus being a simulation environment where a malicious program such as malware created by an attacker is run, the simulation environment being built for observing the behavior and attack scheme of the malicious program. The attack observation apparatus includes a low-interactive simulation environment to execute on a terminal a predetermined response to communication coming from the malware, a high-interactive simulation environment to execute a response to the communication coming from the malware with using a virtual machine which simulates the terminal, and a communication management part to monitor an execution state of the low-interactive simulation environment with respect to the communication coming from the malware and switch the communication coming from the malware to the high-interactive simulation environment depending on the execution state of the low-interactive simulation environment.
    Type: Application
    Filed: September 17, 2014
    Publication date: October 19, 2017
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Kiyoto KAWAUCHI, Shoji SAKURAI
  • Patent number: 9794274
    Abstract: An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and generates packet information by setting an entry for each collected packet and describing attribute data of the packet together with occurrence time of the packet for each entry. Further, the attack detection apparatus (6) stores definition information which defines an extraction time width and an extraction condition for each category of attack.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: October 17, 2017
    Assignee: Mitsubishi Electric Corporation
    Inventors: Shoji Sakurai, Kiyoto Kawauchi
  • Publication number: 20170277887
    Abstract: A candidate event derivation unit (101) derives, as a candidate event, an event predicted to occur in an information system (200) including a plurality of system components (300), the event being a candidate for a monitoring target. An attribute identification unit (102) derives, as a candidate system component, a system component (300) involved in occurrence of the candidate event from among the plurality of system components (300), and identifies an attribute of the candidate system component. A monitoring target decision unit (103) analyzes the attribute of the candidate system component identified by the attribute identification unit (102), and decides whether or not the candidate event is to be the monitoring target.
    Type: Application
    Filed: November 14, 2014
    Publication date: September 28, 2017
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Hideaki IJIRO, Shoji SAKURAI, Kiyoto KAWAUCHI
  • Publication number: 20170237751
    Abstract: An attack detection apparatus (6) collects packets a transmission source or a transmission destination of which is a protection target apparatus (5), and generates packet information by setting an entry for each collected packet and describing attribute data of the packet together with occurrence time of the packet for each entry. Further, the attack detection apparatus (6) stores definition information which defines an extraction time width and an extraction condition for each category of attack.
    Type: Application
    Filed: September 8, 2014
    Publication date: August 17, 2017
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Shoji SAKURAI, Kiyoto KAWAUCHI
  • Publication number: 20170212548
    Abstract: A movement member which reciprocates includes a thick portion and a thin portion, a bearing portion formed in the thick portion is slidingly supported by the guide shaft, and a sliding portion formed in the thin portion is slidingly guided by the sliding guide portion. Power of the motor is transmitted to a pinion gear via a speed reduction gear and a speed reduction mechanism inside a gear box, and a movement reaction force is applied from the pinion gear to the rack portion. Since the rack portion is positioned on an axis Os, a force is effectively applied to the movement member by the power from the motor.
    Type: Application
    Filed: April 5, 2017
    Publication date: July 27, 2017
    Inventors: Kunio SATO, Shun MIYAZAKI, Yasuji HAGIWARA, Keigo WAKANA, Shoji SAKURAI
  • Publication number: 20170203208
    Abstract: An operating device includes a moving member that reciprocates, a motor that applies a force for moving forward and a force for moving rearward to the moving member, a position sensing unit that detects a position to which the moving member is moved, and a control device that varies a load applied to the motor in accordance with an output signal from the position sensing unit. According to the operating device, a reaction force that acts on a finger or the like can be changed in accordance with the position of the moving member that is operated by using a hand or the finger.
    Type: Application
    Filed: March 23, 2017
    Publication date: July 20, 2017
    Inventors: Kunio SATO, Shun MIYAZAKI, Yasuji HAGIWARA, Shoji SAKURAI, Keigo WAKANA
  • Patent number: 9507933
    Abstract: Execute a countermeasure process for vulnerability reliably before an attack aiming at vulnerability occurs. A vulnerability countermeasure processing unit performs a countermeasure process for vulnerability of a vulnerable library function being a general-purpose library function that has vulnerability among the general-purpose library functions included in a general-purpose library. A countermeasure selection unit, when a call for the vulnerable library function is requested at execution of a Web application, makes the vulnerability countermeasure processing unit perform the countermeasure process for the vulnerability of the vulnerable library function, and after the countermeasure process is performed by the vulnerability countermeasure processing unit, calls the vulnerable library function.
    Type: Grant
    Filed: July 25, 2013
    Date of Patent: November 29, 2016
    Assignee: Mitsubishi Electric Corporation
    Inventors: Takeshi Ueda, Shoji Sakurai
  • Publication number: 20160224791
    Abstract: A test memory extracting unit 110 extracts a test memory image 191 from a memory area of a target system. A template memory extracting unit 120 extracts a template memory image 192 from a template system not infected with malware. An injected code detecting unit 130 compares the test memory image 191 with the template memory image 192, and generates an injected code list 193. An injected code testing unit 140 generates a malicious code list 195 based on the injected code list 193 and a test rule list 194. A test result output unit 150 generates a test result file 196 based on the malicious code list 195.
    Type: Application
    Filed: September 25, 2013
    Publication date: August 4, 2016
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takumi YAMAMOTO, Kiyoto KAWAUCHI, Shoji SAKURAI
  • Publication number: 20160210474
    Abstract: An information leakage prevention apparatus 100 receives, from a LAN 109, communication data transmitted by a PC 112 to Internet 111, and when the received data has been encrypted, analyzes a log describing content of data processing performed in the PC 112 and extracts a key used to encrypt the communication data in the PC 112. Further, the information leakage prevention apparatus 100 decrypts the communication data using the extracted key and determines whether or not a keyword is included in a decryption result. If the keyword is not included in the decryption result, the information leakage prevention apparatus 100 transmits the communication data to the Internet 111 through a WAN 110.
    Type: Application
    Filed: August 27, 2013
    Publication date: July 21, 2016
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Shoji SAKURAI, Kiyoto KAWAUCHI, Takeshi UEDA, Tomonori NEGI
  • Publication number: 20150302191
    Abstract: Execute a countermeasure process for vulnerability reliably before an attack aiming at vulnerability occurs. A vulnerability countermeasure processing unit performs a countermeasure process for vulnerability of a vulnerable library function being a general-purpose library function that has vulnerability among the general-purpose library functions included in a general-purpose library. A countermeasure selection unit, when a call for the vulnerable library function is requested at execution of a Web application, makes the vulnerability countermeasure processing unit perform the countermeasure process for the vulnerability of the vulnerable library function, and after the countermeasure process is performed by the vulnerability countermeasure processing unit, calls the vulnerable library function.
    Type: Application
    Filed: July 25, 2013
    Publication date: October 22, 2015
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takeshi UEDA, Shoji Sakurai
  • Publication number: 20150256554
    Abstract: In a log analysis cooperation system including a logger that collects a log of a communication device and stores the log in a storage device, a SIEM apparatus that detects an attack, and a log analysis apparatus that analyzes the log collected by the logger, a log analysis cooperation apparatus stores an attack scenario in a storage device, receives from the SIEM apparatus warning information including information on the detected attack, computes a predicted occurrence time of an attack predicted to occur subsequent to the detected attack based on the warning information and the attack scenario, and transmits to the log analysis apparatus a scheduled search to search the log at predicted occurrence time computed. The log analysis apparatus transmits a scheduled search to the logger to search the log at the predicted occurrence time.
    Type: Application
    Filed: November 8, 2013
    Publication date: September 10, 2015
    Applicant: Mitsubishi Electric Corporation
    Inventors: Hiroyuki Sakakibara, Shoji Sakurai, Kiyoto Kawauchi