Patents by Inventor Takumi Yamamoto

Takumi Yamamoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240080330
    Abstract: A security monitoring apparatus (100) includes a content category deducing unit (122), a category comparing unit (123), and an information assignment unit (130). The content category deducing unit (122) deduces a first deduced category that is a result of deducing a category of content that a target device that a monitoring target system (200) includes has, using a content category deducing model that is a learning model that deduces using content data that indicates content, a category of content indicated in the content data, and data that indicates content that the target device has. The category comparing unit (123) verifies whether or not the first deduced category and a category for comparison match. The information assignment unit (130) generates assignment information that is in accordance with whether or not the first deduced category and the category for comparison match.
    Type: Application
    Filed: October 30, 2023
    Publication date: March 7, 2024
    Applicant: Mitsubishi Electric Corporation
    Inventors: Aiko IWASAKI, Takumi YAMAMOTO, Hajime KOBAYASHI, Kiyoto KAWAUCHI
  • Patent number: 11850945
    Abstract: A power supply device for an electric work vehicle, including: a battery by which an electric work vehicle is drivable; a first connection unit for an internal inverter configured to convert DC power from the battery into AC power, and output the AC power to an internal electric device installed in the electric work vehicle; a second connection unit for an external inverter configured to convert DC power from the battery into AC power, and output the AC power to an external electric device; and a battery control unit connected to the first connection unit and the second connection unit, and configured to control charging of, and power supply from, the battery, wherein the battery control unit is configured to communicate with the external inverter side via the second connection unit to perform authentication regarding whether or not power supply to the external inverter is permitted.
    Type: Grant
    Filed: June 15, 2022
    Date of Patent: December 26, 2023
    Assignee: Kubota Corporation
    Inventors: Takumi Yamamoto, Tomohiko Hisakuni, Masahiro Yamada, Hirokazu Ito
  • Patent number: 11797668
    Abstract: An acquisition unit (10) acquires normal sample data and non-normal sample data. A model generation unit (120) generates a normal model representing the normal sample data. A change unit (141) generates a non-normal feature vector of the non-normal sample data, and generates a non-normal changed vector obtained by changing an element of the non-normal feature vector. When the non-normal changed vector and the normal model are similar to each other, a verification unit (142) executes a process using sample data represented by the non-normal changed vector. The verification unit (142) verifies whether an anomalous event is detected by a detection device. Upon verification that an anomalous event is not detected, the verification unit (142) determines whether an anomalous event is present, independently of the detection device.
    Type: Grant
    Filed: October 11, 2017
    Date of Patent: October 24, 2023
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takumi Yamamoto, Keisuke Kito, Tomonori Negi, Kiyoto Kawauchi
  • Publication number: 20230273993
    Abstract: A log generation apparatus (100) includes an object search unit (111), a user search unit (112), and a specific operation log generation unit. The object search unit (111) uses a target operation log, which is a log of operations actually performed on objects owned by a target system, to search for a target object from among the objects owned by the target system. The user search unit (112) uses the target operation log to search for, as a target user, a user who can operate the target object from among users of the target system. The specific operation log generation unit receives specific operation information indicating a specific operation that a specific user performs in the target system, and uses the specific operation information and the target operation log to generate a specific operation log, which is a virtual log indicating a specific operation that the target user has performed on the target object.
    Type: Application
    Filed: May 9, 2023
    Publication date: August 31, 2023
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Kiyoto KAWAUCHI
  • Publication number: 20230262075
    Abstract: A normal classification unit (101) extracts a true positive access that is known to be an access aimed to attack and that has been determined by a detection unit (102) to be an access aimed to attack. A modification unit (107) modifies a feature of the true positive access by using a feature of a true negative access that is known to be a normal access and that has been determined by the detection unit (102) to be a normal access.
    Type: Application
    Filed: April 7, 2023
    Publication date: August 17, 2023
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Kiyoto KAWAUCHI
  • Publication number: 20230090301
    Abstract: A power supply device for an electric work vehicle, including: a battery by which an electric work vehicle is drivable; a first connection unit for an internal inverter configured to convert DC power from the battery into AC power, and output the AC power to an internal electric device installed in the electric work vehicle; a second connection unit for an external inverter configured to convert DC power from the battery into AC power, and output the AC power to an external electric device; and a battery control unit connected to the first connection unit and the second connection unit, and configured to control charging of, and power supply from, the battery, wherein the battery control unit is configured to communicate with the external inverter side via the second connection unit to perform authentication regarding whether or not power supply to the external inverter is permitted.
    Type: Application
    Filed: June 15, 2022
    Publication date: March 23, 2023
    Inventors: Takumi Yamamoto, Tomohiko Hisakuni, Masahiro Yamada, Hirokazu Ito
  • Publication number: 20220303294
    Abstract: An attribute-value extraction unit (101) extracts as a plurality of model-generation attribute values, a plurality of attribute values belonging to an attribute associated with a monitoring subject for anomaly detection. A division-data generation unit (102) extracts for each model-generation attribute value, a normal event associated with the model-generation attribute value from normal data indicating a plurality of normal events each of which is found out to be normal, each of which is associated with one attribute value of the plurality of attribute values, and each of which includes a plurality of characteristics, and generates for each model-generation attribute value, division data indicating the extracted normal event. A characteristic selection unit (103) selects a combination of characteristics to be used for generation of a normal model to be used for anomaly detection, from a plurality of characteristics included in a plurality of normal events indicated in a plurality of pieces of division data.
    Type: Application
    Filed: May 31, 2022
    Publication date: September 22, 2022
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Aiko IWASAKI, Hisashi FUKUDA, Kiyoto KAWAUCHI
  • Publication number: 20220294811
    Abstract: An attribute-value acquisition unit (203) acquires an attribute value of an attribute associated with a monitoring subject for anomaly detection. A normal-model acquisition unit (204) acquires from among a plurality of normal models generated corresponding to a plurality of attribute values, a normal model generated corresponding to the attribute value acquired by the attribute-value acquisition unit (203). An anomaly detection unit (205) performs the anomaly detection, using the normal model acquired by the normal-model acquisition unit (204).
    Type: Application
    Filed: May 31, 2022
    Publication date: September 15, 2022
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Aiko IWASAKI, Hisashi FUKUDA, Kiyoto KAWAUCHI
  • Patent number: 11444901
    Abstract: A fraudulent email decision device (10) is provided with a consistency analysis unit (24). The consistency analysis unit (24) identifies an intention of a subject email by, for example, a method of, with respect to a newly received incoming email as a subject email, extracting a function term, being a word expressing a reason the subject email was sent, from a body of the subject email. The consistency analysis unit (24) decides whether or not the subject email is a fraudulent email, from a relationship between another incoming email received in the past from the same sender as the sender of the subject email, and the identified intention of the subject email.
    Type: Grant
    Filed: October 1, 2020
    Date of Patent: September 13, 2022
    Assignee: Mitsubishi Electric Corporation
    Inventors: Takumi Yamamoto, Hiroki Nishikawa, Kiyoto Kawauchi
  • Publication number: 20220275768
    Abstract: A piston for an internal combustion engine, said piston having an upper piston portion (1) in which a ring zone (2) is located, and a piston lower part (3) having two opposing, load-carrying skirt wall sections (4,5) on the pressure- and counter-pressure sides of the piston adjoins the upper piston portion (1), and the two load-carrying skirt wall sections (4,5) are interconnected via connecting walls (6,7) that are recessed relative to the outer diameter of the piston. Each connecting wall (6,7) includes a pin bore having a pin bore axis (18) for receiving a pin. The two opposing, load-carrying wall section (4,5) have different wall thicknesses and different transition regions at the transition of their lateral skirt connections (8,9 and 16,17) to the recessed connection walls (6,7).
    Type: Application
    Filed: July 20, 2020
    Publication date: September 1, 2022
    Inventors: Satoru Suyama, Yasuo Takashima, Yoshie Nonaka, Takumi Yamamoto
  • Publication number: 20210365431
    Abstract: In an SNS server (103) corresponding to a false submission filter device, an event specifying unit (604) analyzes contents of a submission informing of an occurrence of an event and specifies a location (721) of occurrence of the event. A query destination specifying unit (605) searches a query destination database (613) and specifies a query destination corresponding to the location (721) specified by the event specifying unit (604). A query unit (606) transmits a request for checking the presence or absence of occurrence of the event from the observation result of one or more machines to the query destination specified by the query destination specifying unit (605). The query unit (606) receives a response to the request. A result reflecting unit (607) determines whether the contents of the submission are true or false from a check result indicated by the response received by the query unit (606).
    Type: Application
    Filed: May 25, 2017
    Publication date: November 25, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Tomonori NEGI, Kiyoto KAWAUCHI, Yukio IZUMI, Takeshi ASAI, Takumi YAMAMOTO, Hiroki NISHIKAWA, Keisuke KITO, Kohei TAMMACHI
  • Publication number: 20210224397
    Abstract: An evaluation tree generation unit (101) generates as an evaluation tree, an attack tree about an information system, which is based on inference using predicate logic. A gold tree generation unit (102) generates a gold tree which covers an intrusion route to the information system and reflects an intrusion procedure for the information system, by using network configuration information indicating a network configuration of the information system and intrusion procedure information indicating an intrusion procedure assumed in intrusion into the information system. A tree comparison unit (103) compares the evaluation tree with the gold tree.
    Type: Application
    Filed: March 12, 2021
    Publication date: July 22, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takumi YAMAMOTO, Ryosuke SHIMABE, Takeshi ASAI, Kiyoto KAWAUCHI
  • Publication number: 20210182405
    Abstract: A disclosed feature generation unit (110) collects information related to an assessment target whose security risk is to be assessed, as disclosure target information from disclosed information that has been disclosed, and generates disclosed feature information (F1) expressing a feature of the disclosure target information. An email feature generation unit (120) generates email feature information F2 expressing a feature of an assessment target email contained in an email box of the assessment target. An assessment unit (130) calculates a similarity degree between the disclosed feature information (F1) and the email feature information (F2). The assessment unit (130) outputs an assessment result 31 being a result of assessment on the security risk of the assessment target, based on the similarity degree.
    Type: Application
    Filed: February 4, 2021
    Publication date: June 17, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Hiroki NISHIKAWA, Kiyoto KAWAUCHI
  • Publication number: 20210157909
    Abstract: An acquisition unit (10) acquires normal sample data and non-normal sample data. A model generation unit (120) generates a normal model representing the normal sample data. A change unit (141) generates a non-normal feature vector of the non-normal sample data, and generates a non-normal changed vector obtained by changing an element of the non-normal feature vector. When the non-normal changed vector and the normal model are similar to each other, a verification unit (142) executes a process using sample data represented by the non-normal changed vector. The verification unit (142) verifies whether an anomalous event is detected by a detection device. Upon verification that an anomalous event is not detected, the verification unit (142) determines whether an anomalous event is present, independently of the detection device.
    Type: Application
    Filed: October 11, 2017
    Publication date: May 27, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Keisuke KITO, Tomonori NEGI, Kiyoto KAWAUCHI
  • Publication number: 20210136043
    Abstract: A state replication apparatus (200) generates communication, between a main apparatus (421) and each sub-apparatus (422, 423), to cause a state combination to transit in accordance with transition order specified in an acquisition scenario. The state replication apparatus records each of the communication generated between the main apparatus and the each sub-apparatus. The state replication apparatus acquires a snapshot combination at each of acquisition timings specified in the acquisition scenario. The state replication apparatus replicates each of the main apparatus and the each sub-apparatus in states of a replication state combination based on the acquired each snapshot combination and the recorded each communication.
    Type: Application
    Filed: October 6, 2017
    Publication date: May 6, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Keisuke KITO, Kiyoto KAWAUCHI, Takumi YAMAMOTO, Hiroki NISHIKAWA
  • Publication number: 20210092139
    Abstract: In an email inspection device (10), a learning unit (20) learns a relationship between a feature of each email included in a plurality of emails and a feature of a resource accompanying each email. The resource accompanying each email includes at least either one of a file attached to each email and a resource specified by a URL in a message body of each email. A determination unit (30) extracts a feature of an inspection-target email and a feature of a resource accompanying the inspection-target email, and determines whether or not the inspection-target email is a suspicious email depending on whether or not the relationship learned by the learning unit (20) exists between the extracted features.
    Type: Application
    Filed: September 14, 2017
    Publication date: March 25, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Hiroki NISHIKAWA, Takumi YAMAMOTO, Kiyoto KAWAUCHI
  • Publication number: 20210021555
    Abstract: A fraudulent email decision device (10) is provided with a consistency analysis unit (24). The consistency analysis unit (24) identifies an intention of a subject email by, for example, a method of, with respect to a newly received incoming email as a subject email, extracting a function term, being a word expressing a reason the subject email was sent, from a body of the subject email. The consistency analysis unit (24) decides whether or not the subject email is a fraudulent email, from a relationship between another incoming email received in the past from the same sender as the sender of the subject email, and the identified intention of the subject email.
    Type: Application
    Filed: October 1, 2020
    Publication date: January 21, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Hiroki NISHIKAWA, Kiyoto KAWAUCHI
  • Publication number: 20210021617
    Abstract: An operation unit (120) calculates a feature quantity of an object mail which is an email to be tested. Then, the operation unit acquires, based on the feature quantity of the object mail, a status identifier of the object mail from a status definition file. Then, the operation unit selects a mail thread which the object mail belongs to, from one mail thread or more as an object thread, and adds the status identifier of the object mail to a status group of the object thread. Then, the operation unit decides whether the status group, to which the status identifier of the object mail has been added, of the object thread complies with a detection rule. When the status group of the object thread complies with the detection rule, the operation unit produces an alert.
    Type: Application
    Filed: September 25, 2020
    Publication date: January 21, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Hiroki NISHIKAWA, Takumi YAMAMOTO, Kiyoto KAWAUCHI
  • Publication number: 20210010950
    Abstract: A correlation value calculation unit calculates a correlation value between input data input to an inspection-targeted apparatus whose internal specifications are unknown and output data for the input data from the inspection-targeted apparatus. A state transition determination unit analyzes in a time-series manner, a plurality of correlation values calculated by the correlation value calculation unit for a plurality of pieces of input data and a plurality of pieces of output data for the plurality of pieces of input data, and determines whether or not a state transition has occurred in the inspection-targeted apparatus.
    Type: Application
    Filed: September 28, 2020
    Publication date: January 14, 2021
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Keisuke KITO, Kiyoto KAWAUCHI, Takumi YAMAMOTO, Hiroki NISHIKAWA
  • Publication number: 20210006587
    Abstract: A people network detection unit (110) detects, based on public information of a target person, a people network that indicates a connection between the target person and a group of related persons. A disclosure risk calculation unit (120) calculates a disclosure risk of the target person based on the public information of the target person, and calculates a group of disclosure risks corresponding to the group of related persons based on a group of public information corresponding to the group of related persons. A connection risk determination unit (130) determines a representative value of the group of disclosure risks as a connection risk of the target person based on the group of disclosure risks corresponding to the group of related persons. A security risk calculation unit (140) calculates a security risk of the target person with respect to a cyberattack, using the disclosure risk of the target person and the connection risk of the target person.
    Type: Application
    Filed: September 22, 2020
    Publication date: January 7, 2021
    Applicant: Mitsubishi Electric Corporation
    Inventors: Takumi YAMAMOTO, Hiroki NISHIKAWA, Kiyoto KAWAUCHI