Patents by Inventor Takuya Mishina
Takuya Mishina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240038997Abstract: A lithium metal battery cell has an electrolyte and an anode comprising an anode current collector and a thin film metal layer formed on the anode current collector, the thin film metal layer consisting of a metal that forms a solid solution with lithium metal. The thin film metal layer is configured to promote dense lithium deposition between the thin film metal layer and the electrolyte during charging.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventors: Shigemasa Kuwata, Hideyuki Komatsu, Balachandran Gadaguntla Radhakrishnan, Maarten Sierhuis, Takuya Mishina, Kazuyuki Sakamoto
-
Publication number: 20240006600Abstract: A lithium metal battery cell has an electrolyte and an anode comprising an anode current collector and a composite interlayer formed on the anode current collector between the anode current collector and the electrolyte. The composite interlayer consists of conductive carbon and a metal additive, the composite interlayer configured to promote dense lithium deposition in the anode during charging. The metal additive in the composite interlayer is a metal that forms a solid solution with lithium metal.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Hideyuki Komatsu, Shigemasa Kuwata, Balachandran Gadaguntla Radhakrishnan, Maarten Sierhuis, Kazuyuki Sakamoto, Takuya Mishina
-
Patent number: 11301134Abstract: A method is provided for reducing memory consumption by a rule engine. The method includes receiving attack trees, each having nodes and edges. Each node represents a security event and is associated with a detection rule for detecting an occurrence thereof. Each edge connects a respective node pair. The method includes assigning a watchpoint to each leaf node. The method includes moving the watchpoint assigned to any leaf node to a next upstream node, responsive to detecting an occurrence of the security event represented by the leaf node. The method includes erasing the watchpoint assigned to all downstream nodes relative to the next upstream node, responsive to the next upstream node being connected to a next downstream node using an edge having an “OR” join type. Only the rules for nodes currently having the watchpoint assigned are loaded into a memory device during runtime, while excluding rules for remaining nodes.Type: GrantFiled: October 26, 2017Date of Patent: April 12, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh
-
Patent number: 11030321Abstract: Techniques for analyzing data based on the vulnerability of the corresponding device are provided. A plurality of devices are classified into a plurality of groups based on respective measures of vulnerability associated with each device, and a respective weighting factor is determined for each respective group of the plurality of groups based at least in part on a number of devices included in the respective group. An evidentiary value of data received from a first device of the plurality of devices is modified, based on the respective weighting factor associated with the first device. Further, a probable state of a physical environment is determined, based in part on the data received from the first device.Type: GrantFiled: October 2, 2018Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Saito, Takuya Mishina, Hiroaki Uetsuki
-
Patent number: 10997014Abstract: A computer-implemented method is provided for ensuring a particular service level provided by multiple devices. The method includes maintaining, by a database, complementation parameters for a set of device groups. Each of the device groups includes at least two devices such that one of the two devices can complement at least one functionality of another one of the at least two devices in a same one of the device groups. The method further includes monitoring, by a processor operatively coupled to the database, the devices in the device groups to detect device malfunctions. The method also includes, responsive to a detection of a malfunctioning device from among the device groups, ensuring, by the processor, the particular service level by changing complementation parameters of a corresponding one of the devices paired with the malfunctioning device.Type: GrantFiled: February 6, 2019Date of Patent: May 4, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Mishina, Sanehiro Furuichi, Norie Iwasaki, Fumiko Akiyama
-
Patent number: 10936747Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.Type: GrantFiled: October 25, 2019Date of Patent: March 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20210034279Abstract: Operation testing without side effects may be enabled by a method including preparing a copy of a directory set of at least a part of a host system disk, creating a link to a file in a first directory in the host system disk, in a second directory of the copy of the directory set, wherein the second directory corresponds in position to the first directory in the directory set, and starting a non-privileged system using a disk image including the copy of the directory set and the created link.Type: ApplicationFiled: August 1, 2019Publication date: February 4, 2021Inventors: Takuya Mishina, Yasuharu Katsuno, Takahide Nogayama, Fumiko Akiyama
-
Patent number: 10893090Abstract: Monitoring a process on an Internet of Things (IoT) device is performed by receiving, by the IoT device, a network data transfer from an external device; and receiving, by the IoT device, meta-information of the network data transfer. The meta-information can be generated, based on the network data transfer, by a network monitoring device. Additionally, the IoT device detects a file storing data of the network data transfer based on the meta-information. Further, the IoT device monitors a process relating to the detected file on the IoT device.Type: GrantFiled: February 14, 2019Date of Patent: January 12, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Takuya Mishina, Naoto Sato, Kugamoorthy Gajananan, Kohichi Ono, Fumiko Akiyama
-
Patent number: 10839103Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.Type: GrantFiled: August 13, 2019Date of Patent: November 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20200267205Abstract: Monitoring a process on an Internet of Things (IoT) device is performed by receiving, by the IoT device, a network data transfer from an external device; and receiving, by the IoT device, meta-information of the network data transfer. The meta-information can be generated, based on the network data transfer, by a network monitoring device. Additionally, the IoT device detects a file storing data of the network data transfer based on the meta-information. Further, the IoT device monitors a process relating to the detected file on the IoT device.Type: ApplicationFiled: February 14, 2019Publication date: August 20, 2020Inventors: Takuya Mishina, Naoto Sato, Kugamoorthy Gajananan, Kohichi Ono, Fumiko Akiyama
-
Publication number: 20200252263Abstract: A computer-implemented method is provided for ensuring a particular service level provided by multiple devices. The method includes maintaining, by a database, complementation parameters for a set of device groups. Each of the device groups includes at least two devices such that one of the two devices can complement at least one functionality of another one of the at least two devices in a same one of the device groups. The method further includes monitoring, by a processor operatively coupled to the database, the devices in the device groups to detect device malfunctions. The method also includes, responsive to a detection of a malfunctioning device from among the device groups, ensuring, by the processor, the particular service level by changing complementation parameters of a corresponding one of the devices paired with the malfunctioning device.Type: ApplicationFiled: February 6, 2019Publication date: August 6, 2020Inventors: Takuya Mishina, Sanehiro Furuichi, Norie Iwasaki, Fumiko Akiyama
-
Publication number: 20200104509Abstract: Techniques for analyzing data based on the vulnerability of the corresponding device are provided. A plurality of devices are classified into a plurality of groups based on respective measures of vulnerability associated with each device, and a respective weighting factor is determined for each respective group of the plurality of groups based at least in part on a number of devices included in the respective group. An evidentiary value of data received from a first device of the plurality of devices is modified, based on the respective weighting factor associated with the first device. Further, a probable state of a physical environment is determined, based in part on the data received from the first device.Type: ApplicationFiled: October 2, 2018Publication date: April 2, 2020Inventors: SANEHIRO FURUICHI, AKIRA SAITO, TAKUYA MISHINA, HIROAKI UETSUKI
-
Patent number: 10586051Abstract: A computer-implemented method, a computer program product, and a computer system for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event processors. A computer system or server converts the SIEM rules to formal representations. The computer system or server generates rule abstraction of the formal representations, by using an abstraction function. The computer system or server constructs a finite automaton based on the rule abstraction. The computer system or server eliminates irrelevant transitions in the finite automaton to generate an optimized finite automaton. The computer system or server generates optimized formal rules, based on the optimized finite automaton. The computer system or server converts the optimized formal rules to optimized SIEM rules. The computer or server deploys the optimized SIEM rules in the network of the event processors.Type: GrantFiled: August 31, 2017Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh
-
Publication number: 20200057868Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.Type: ApplicationFiled: October 25, 2019Publication date: February 20, 2020Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10552633Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: GrantFiled: March 23, 2017Date of Patent: February 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10540518Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: GrantFiled: November 9, 2017Date of Patent: January 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20190362100Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.Type: ApplicationFiled: August 13, 2019Publication date: November 28, 2019Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10305909Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.Type: GrantFiled: August 9, 2018Date of Patent: May 28, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hiroshi H. Horii, Takuya Mishina
-
Publication number: 20190129620Abstract: A method is provided for reducing memory consumption by a rule engine. The method includes receiving attack trees, each having nodes and edges. Each node represents a security event and is associated with a detection rule for detecting an occurrence thereof. Each edge connects a respective node pair. The method includes assigning a watchpoint to each leaf node. The method includes moving the watchpoint assigned to any leaf node to a next upstream node, responsive to detecting an occurrence of the security event represented by the leaf node. The method includes erasing the watchpoint assigned to all downstream nodes relative to the next upstream node, responsive to the next upstream node being connected to a next downstream node using an edge having an “OR” join type. Only the rules for nodes currently having the watchpoint assigned are loaded into a memory device during runtime, while excluding rules for remaining nodes.Type: ApplicationFiled: October 26, 2017Publication date: May 2, 2019Inventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh
-
Publication number: 20190065755Abstract: A computer-implemented method, a computer program product, and a computer system for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event processors. A computer system or server converts the SIEM rules to formal representations. The computer system or server generates rule abstraction of the formal representations, by using an abstraction function. The computer system or server constructs a finite automaton based on the rule abstraction. The computer system or server eliminates irrelevant transitions in the finite automaton to generate an optimized finite automaton. The computer system or server generates optimized formal rules, based on the optimized finite automaton. The computer system or server converts the optimized formal rules to optimized SIEM rules. The computer or server deploys the optimized SIEM rules in the network of the event processors.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Inventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh