Patents by Inventor Takeshi YADA
Takeshi YADA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12049103Abstract: A rotary drive device in a mobile body includes a main wheel and a pair of drive assemblies opposing each other and each driving the main wheel. The main wheel includes driven rollers. One of the pair of drive assemblies includes a motor, a motor case, a drive force transmission, and driving rollers. The driving rollers are in the drive force transmission along a circumferential direction, and contact at least a portion of the driven rollers from one side of the rotary drive device of the axial direction. The drive force transmission rotates to transmit a drive force of the motor to the main wheel via the driving rollers. At least a portion of the motor case opposes at least a portion of the driving rollers in the axial direction.Type: GrantFiled: March 30, 2021Date of Patent: July 30, 2024Assignees: NIDEC-SHIMPO CORPORATION, HONDA MOTOR CO., LTDInventors: Taihei Tsubone, Kyohei Haizumi, Wataru Yada, Tomokazu Sakamoto, Takeshi Echizenya, Seiji Kato
-
Patent number: 11256803Abstract: A selection apparatus includes a macro analysis unit that acquires a macro feature amount from a macro in a document file to which the macro is added, a text analysis unit that acquires a text feature amount from text in the document file, a cluster analysis unit that performs clustering using the macro feature amount and the text feature amount, and a selection unit that selects an analysis target document file based on a cluster analysis result, and is able to efficiently and accurately select the macro-added document file to be analyzed.Type: GrantFiled: October 16, 2017Date of Patent: February 22, 2022Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshinori Usui, Makoto Iwamura, Takeshi Yada
-
Patent number: 11010471Abstract: An attack code detection apparatus includes a preprocessing unit that analyzes in advance a library file for learning used in an ROP (Return Oriented Programming) chain, and obtains sets including the addresses of ROP gadgets, which represent pieces of code in the library file, and increment values of the stack pointer at the time of execution of the ROP gadgets; and a detecting unit that refers to the obtaining result of the preprocessing unit, that verifies, regarding an unknown data series representing the examination target, whether or not the ROP chain is valid in which the ROP gadgets are correctly linked, and that detects whether or not the unknown data series representing the examination target is a malicious data series.Type: GrantFiled: October 2, 2017Date of Patent: May 18, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CorporationInventors: Toshinori Usui, Makoto Iwamura, Takeshi Yada
-
Patent number: 10878091Abstract: An attack code detection device includes a learning unit configured to generate a model that learns, using a known labeled malicious document file including an ROP code, as learning data, a feature of a byte sequence being a component of a document file, and a feature of a byte sequence being a component of an ROP code, a detection unit configured to detect the ROP code included in an inspection target unknown document file, based on the model, and a malignancy determination unit configured to determine, based on a detection result, whether the inspection target unknown document file is a malicious data series that executes attack using ROP.Type: GrantFiled: February 22, 2017Date of Patent: December 29, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshinori Usui, Makoto Iwamura, Takeshi Yada, Tomonori Ikuse
-
Patent number: 10747887Abstract: A vulnerability detection device includes a vulnerability portion extracting unit that extracts a first program code corresponding to an uncorrected vulnerability portion of software, a normalization processing unit that normalizes a parameter varying depending on compilation environment, among parameters included in the extracted first program code and in a second program code of software as a target to be tested for the vulnerability portion, a similarity calculating unit that calculates a similarity of an arbitrary portion of the second program code after normalization as a comparison target to the first program code, and a determining unit that refers to vulnerability related information for a portion of the second program code in which the calculated first similarity exceeds a predetermined threshold, and that determines whether the portion of the second program code is an unknown vulnerability portion.Type: GrantFiled: September 20, 2016Date of Patent: August 18, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Asuka Nakajima, Makoto Iwamura, Takeshi Yada
-
Patent number: 10691798Abstract: A static code analysis unit specifies an implementation portion of a Java code in a cooperation mechanism that sends and receives data between an Android application implemented by the Java code and Web content implemented by a JavaScript code and specifies a method in which a return value that can be called by the JavaScript code is set in the cooperation mechanism; a code converting unit inserts, into the Java code, a call code of a simulation function in which the return value of the specified method is inserted into an argument; and a data flow analysis unit analyzes a data flow by observing, by using the argument and the return value of the simulation function and the specified method, the data that is sent and received between the Android application implemented by the Java code and the Web content implemented by the JavaScript code.Type: GrantFiled: September 9, 2016Date of Patent: June 23, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Fumihiro Kanei, Takeshi Yada, Mitsuaki Akiyama, Yuta Takata
-
Publication number: 20200042708Abstract: An attack code detection device includes a learning unit configured to generate a model that learns, using a known labeled malicious document file including an ROP code, as learning data, a feature of a byte sequence being a component of a document file, and a feature of a byte sequence being a component of an ROP code, a detection unit configured to detect the ROP code included in an inspection target unknown document file, based on the model, and a malignancy determination unit configured to determine, based on a detection result, whether the inspection target unknown document file is a malicious data series that executes attack using ROP.Type: ApplicationFiled: February 22, 2017Publication date: February 6, 2020Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshinori USUI, Makoto IWAMURA, Takeshi YADA, Tomonori IKUSE
-
Publication number: 20200012789Abstract: A selection apparatus includes a macro analysis unit that acquires a macro feature amount from a macro in a document file to which the macro is added, a text analysis unit that acquires a text feature amount from text in the document file, a cluster analysis unit that performs clustering using the macro feature amount and the text feature amount, and a selection unit that selects an analysis target document file based on a cluster analysis result, and is able to efficiently and accurately select the macro-added document file to be analyzed.Type: ApplicationFiled: October 16, 2017Publication date: January 9, 2020Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshinori USUI, Makoto IWAMURA, Takeshi YADA
-
Publication number: 20190384913Abstract: An attack code detection apparatus includes a preprocessing unit that analyzes in advance a library file for learning used in an ROP (Return Oriented Programming) chain, and obtains sets including the addresses of ROP gadgets, which represent pieces of code in the library file, and increment values of the stack pointer at the time of execution of the ROP gadgets; and a detecting unit that refers to the obtaining result of the preprocessing unit, that verifies, regarding an unknown data series representing the examination target, whether or not the ROP chain is valid in which the ROP gadgets are correctly linked, and that detects whether or not the unknown data series representing the examination target is a malicious data series.Type: ApplicationFiled: October 2, 2017Publication date: December 19, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshinori USUI, Makoto IWAMURA, Takeshi YADA
-
Publication number: 20180225460Abstract: A vulnerability detection device includes a vulnerability portion extracting unit that extracts a first program code corresponding to an uncorrected vulnerability portion of software, a normalization processing unit that normalizes a parameter varying depending on compilation environment, among parameters included in the extracted first program code and in a second program code of software as a target to be tested for the vulnerability portion, a similarity calculating unit that calculates a similarity of an arbitrary portion of the second program code after normalization as a comparison target to the first program code, and a determining unit that refers to vulnerability related information for a portion of the second program code in which the calculated first similarity exceeds a predetermined threshold, and that determines whether the portion of the second program code is an unknown vulnerability portion.Type: ApplicationFiled: September 20, 2016Publication date: August 9, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Asuka NAKAJIMA, Makoto IWAMURA, Takeshi YADA
-
Publication number: 20180218154Abstract: A static code analysis unit specifies an implementation portion of a Java code in a cooperation mechanism that sends and receives data between an Android application implemented by the Java code and Web content implemented by a JavaScript code and specifies a method in which a return value that can be called by the JavaScript code is set in the cooperation mechanism; a code converting unit inserts, into the Java code, a call code of a simulation function in which the return value of the specified method is inserted into an argument; and a data flow analysis unit analyzes a data flow by observing, by using the argument and the return value of the simulation function and the specified method, the data that is sent and received between the Android application implemented by the Java code and the Web content implemented by the JavaScript code.Type: ApplicationFiled: September 9, 2016Publication date: August 2, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Fumihiro KANEI, Takeshi YADA, Mitsuaki AKIYAMA, Yuta TAKATA