Patents by Inventor Takuya Mishina

Takuya Mishina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240038997
    Abstract: A lithium metal battery cell has an electrolyte and an anode comprising an anode current collector and a thin film metal layer formed on the anode current collector, the thin film metal layer consisting of a metal that forms a solid solution with lithium metal. The thin film metal layer is configured to promote dense lithium deposition between the thin film metal layer and the electrolyte during charging.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Inventors: Shigemasa Kuwata, Hideyuki Komatsu, Balachandran Gadaguntla Radhakrishnan, Maarten Sierhuis, Takuya Mishina, Kazuyuki Sakamoto
  • Publication number: 20240006600
    Abstract: A lithium metal battery cell has an electrolyte and an anode comprising an anode current collector and a composite interlayer formed on the anode current collector between the anode current collector and the electrolyte. The composite interlayer consists of conductive carbon and a metal additive, the composite interlayer configured to promote dense lithium deposition in the anode during charging. The metal additive in the composite interlayer is a metal that forms a solid solution with lithium metal.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Inventors: Hideyuki Komatsu, Shigemasa Kuwata, Balachandran Gadaguntla Radhakrishnan, Maarten Sierhuis, Kazuyuki Sakamoto, Takuya Mishina
  • Patent number: 11301134
    Abstract: A method is provided for reducing memory consumption by a rule engine. The method includes receiving attack trees, each having nodes and edges. Each node represents a security event and is associated with a detection rule for detecting an occurrence thereof. Each edge connects a respective node pair. The method includes assigning a watchpoint to each leaf node. The method includes moving the watchpoint assigned to any leaf node to a next upstream node, responsive to detecting an occurrence of the security event represented by the leaf node. The method includes erasing the watchpoint assigned to all downstream nodes relative to the next upstream node, responsive to the next upstream node being connected to a next downstream node using an edge having an “OR” join type. Only the rules for nodes currently having the watchpoint assigned are loaded into a memory device during runtime, while excluding rules for remaining nodes.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: April 12, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh
  • Patent number: 11030321
    Abstract: Techniques for analyzing data based on the vulnerability of the corresponding device are provided. A plurality of devices are classified into a plurality of groups based on respective measures of vulnerability associated with each device, and a respective weighting factor is determined for each respective group of the plurality of groups based at least in part on a number of devices included in the respective group. An evidentiary value of data received from a first device of the plurality of devices is modified, based on the respective weighting factor associated with the first device. Further, a probable state of a physical environment is determined, based in part on the data received from the first device.
    Type: Grant
    Filed: October 2, 2018
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Akira Saito, Takuya Mishina, Hiroaki Uetsuki
  • Patent number: 10997014
    Abstract: A computer-implemented method is provided for ensuring a particular service level provided by multiple devices. The method includes maintaining, by a database, complementation parameters for a set of device groups. Each of the device groups includes at least two devices such that one of the two devices can complement at least one functionality of another one of the at least two devices in a same one of the device groups. The method further includes monitoring, by a processor operatively coupled to the database, the devices in the device groups to detect device malfunctions. The method also includes, responsive to a detection of a malfunctioning device from among the device groups, ensuring, by the processor, the particular service level by changing complementation parameters of a corresponding one of the devices paired with the malfunctioning device.
    Type: Grant
    Filed: February 6, 2019
    Date of Patent: May 4, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, Sanehiro Furuichi, Norie Iwasaki, Fumiko Akiyama
  • Patent number: 10936747
    Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: March 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20210034279
    Abstract: Operation testing without side effects may be enabled by a method including preparing a copy of a directory set of at least a part of a host system disk, creating a link to a file in a first directory in the host system disk, in a second directory of the copy of the directory set, wherein the second directory corresponds in position to the first directory in the directory set, and starting a non-privileged system using a disk image including the copy of the directory set and the created link.
    Type: Application
    Filed: August 1, 2019
    Publication date: February 4, 2021
    Inventors: Takuya Mishina, Yasuharu Katsuno, Takahide Nogayama, Fumiko Akiyama
  • Patent number: 10893090
    Abstract: Monitoring a process on an Internet of Things (IoT) device is performed by receiving, by the IoT device, a network data transfer from an external device; and receiving, by the IoT device, meta-information of the network data transfer. The meta-information can be generated, based on the network data transfer, by a network monitoring device. Additionally, the IoT device detects a file storing data of the network data transfer based on the meta-information. Further, the IoT device monitors a process relating to the detected file on the IoT device.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: January 12, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, Naoto Sato, Kugamoorthy Gajananan, Kohichi Ono, Fumiko Akiyama
  • Patent number: 10839103
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: November 17, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20200267205
    Abstract: Monitoring a process on an Internet of Things (IoT) device is performed by receiving, by the IoT device, a network data transfer from an external device; and receiving, by the IoT device, meta-information of the network data transfer. The meta-information can be generated, based on the network data transfer, by a network monitoring device. Additionally, the IoT device detects a file storing data of the network data transfer based on the meta-information. Further, the IoT device monitors a process relating to the detected file on the IoT device.
    Type: Application
    Filed: February 14, 2019
    Publication date: August 20, 2020
    Inventors: Takuya Mishina, Naoto Sato, Kugamoorthy Gajananan, Kohichi Ono, Fumiko Akiyama
  • Publication number: 20200252263
    Abstract: A computer-implemented method is provided for ensuring a particular service level provided by multiple devices. The method includes maintaining, by a database, complementation parameters for a set of device groups. Each of the device groups includes at least two devices such that one of the two devices can complement at least one functionality of another one of the at least two devices in a same one of the device groups. The method further includes monitoring, by a processor operatively coupled to the database, the devices in the device groups to detect device malfunctions. The method also includes, responsive to a detection of a malfunctioning device from among the device groups, ensuring, by the processor, the particular service level by changing complementation parameters of a corresponding one of the devices paired with the malfunctioning device.
    Type: Application
    Filed: February 6, 2019
    Publication date: August 6, 2020
    Inventors: Takuya Mishina, Sanehiro Furuichi, Norie Iwasaki, Fumiko Akiyama
  • Publication number: 20200104509
    Abstract: Techniques for analyzing data based on the vulnerability of the corresponding device are provided. A plurality of devices are classified into a plurality of groups based on respective measures of vulnerability associated with each device, and a respective weighting factor is determined for each respective group of the plurality of groups based at least in part on a number of devices included in the respective group. An evidentiary value of data received from a first device of the plurality of devices is modified, based on the respective weighting factor associated with the first device. Further, a probable state of a physical environment is determined, based in part on the data received from the first device.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 2, 2020
    Inventors: SANEHIRO FURUICHI, AKIRA SAITO, TAKUYA MISHINA, HIROAKI UETSUKI
  • Patent number: 10586051
    Abstract: A computer-implemented method, a computer program product, and a computer system for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event processors. A computer system or server converts the SIEM rules to formal representations. The computer system or server generates rule abstraction of the formal representations, by using an abstraction function. The computer system or server constructs a finite automaton based on the rule abstraction. The computer system or server eliminates irrelevant transitions in the finite automaton to generate an optimized finite automaton. The computer system or server generates optimized formal rules, based on the optimized finite automaton. The computer system or server converts the optimized formal rules to optimized SIEM rules. The computer or server deploys the optimized SIEM rules in the network of the event processors.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh
  • Publication number: 20200057868
    Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.
    Type: Application
    Filed: October 25, 2019
    Publication date: February 20, 2020
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10552633
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10540518
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20190362100
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.
    Type: Application
    Filed: August 13, 2019
    Publication date: November 28, 2019
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10305909
    Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: May 28, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hiroshi H. Horii, Takuya Mishina
  • Publication number: 20190129620
    Abstract: A method is provided for reducing memory consumption by a rule engine. The method includes receiving attack trees, each having nodes and edges. Each node represents a security event and is associated with a detection rule for detecting an occurrence thereof. Each edge connects a respective node pair. The method includes assigning a watchpoint to each leaf node. The method includes moving the watchpoint assigned to any leaf node to a next upstream node, responsive to detecting an occurrence of the security event represented by the leaf node. The method includes erasing the watchpoint assigned to all downstream nodes relative to the next upstream node, responsive to the next upstream node being connected to a next downstream node using an edge having an “OR” join type. Only the rules for nodes currently having the watchpoint assigned are loaded into a memory device during runtime, while excluding rules for remaining nodes.
    Type: Application
    Filed: October 26, 2017
    Publication date: May 2, 2019
    Inventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh
  • Publication number: 20190065755
    Abstract: A computer-implemented method, a computer program product, and a computer system for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event processors. A computer system or server converts the SIEM rules to formal representations. The computer system or server generates rule abstraction of the formal representations, by using an abstraction function. The computer system or server constructs a finite automaton based on the rule abstraction. The computer system or server eliminates irrelevant transitions in the finite automaton to generate an optimized finite automaton. The computer system or server generates optimized formal rules, based on the optimized finite automaton. The computer system or server converts the optimized formal rules to optimized SIEM rules. The computer or server deploys the optimized SIEM rules in the network of the event processors.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Inventors: Yoichi Hatsutori, Takuya Mishina, Naoto Sato, Fumiko Satoh