Patents by Inventor Takuya Mishina

Takuya Mishina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120317636
    Abstract: A system and method of an appropriate countermeasure at the time of anomaly. The management system for an industrial control system includes a control apparatus, a control network connected to the control apparatus, and multiple devices controlled by the control apparatus via the control network, the management system includes multiple firewall modules provided for each of control zones each controlling one part of the industrial control system, the firewall modules relaying communication between devices in the control zones and the control network; an event analyzing module collecting events from each of the multiple firewall modules and analyzing the events to detect an anomaly of each of the control zones, and a communication managing module changing a communication operation performed via the firewall module provided for the control zone where an anomaly has been detected.
    Type: Application
    Filed: August 28, 2012
    Publication date: December 13, 2012
    Applicant: International Business Machines Corporation
    Inventors: Takuya Mishina, Tadashi Tsumura, John David Wilson
  • Patent number: 8307451
    Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.
    Type: Grant
    Filed: February 22, 2010
    Date of Patent: November 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
  • Publication number: 20120272308
    Abstract: A system and method of an appropriate countermeasure at the time of anomaly. The management system for an industrial control system includes a control apparatus, a control network connected to the control apparatus, and multiple devices controlled by the control apparatus via the control network, the management system includes multiple firewall modules provided for each of control zones each controlling one part of the industrial control system, the firewall modules relaying communication between devices in the control zones and the control network; an event analyzing module collecting events from each of the multiple firewall modules and analyzing the events to detect an anomaly of each of the control zones, and a communication managing module changing a communication operation performed via the firewall module provided for the control zone where an anomaly has been detected.
    Type: Application
    Filed: April 10, 2012
    Publication date: October 25, 2012
    Applicant: International Business Machines Corporation
    Inventors: Takuya Mishina, Tadashi Tsumura, John David Wilson
  • Publication number: 20120109960
    Abstract: Techniques are disclosed for generating rules for classifying structured documents, and for classifying, retrieving, or checking structured documents, using generated rules. In one example, a method for generating rules for classifying a plurality of electronic structured documents to which a same schema is applied comprises a computer performing the following steps: determining one or more variable portions defined by the schema by scanning the schema; acquiring respective feature values of the determined variable portions from each of the plurality of structured documents and associating the structured document, from which the feature values are acquired, with the acquired feature values; and generating the rules on the basis of the feature values associated with the structured document.
    Type: Application
    Filed: October 17, 2011
    Publication date: May 3, 2012
    Applicant: International Business Machines Corporation
    Inventors: Takuya Mishina, Toshiro Takase
  • Publication number: 20110270851
    Abstract: A method, system and program for detecting similarity between two pieces of document data in which text information and non-text information are mixed. Each data object can include text, non-text, or a combination of text and non-text. The method includes converting each of the pieces of document data to a directed graph, storing the directed graph, and calculating a similarity between the converted directed graphs. In an embodiment, similarity is determined by importance of each object. Importance can be measured by a ratio of the area of the object to the total area of all objects. Moreover, when converting documents to a directed graph, objects can be converted to nodes which are connect to other nodes by edges.
    Type: Application
    Filed: April 18, 2011
    Publication date: November 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, Sachiko Yoshihama
  • Publication number: 20100218259
    Abstract: Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.
    Type: Application
    Filed: February 22, 2010
    Publication date: August 26, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Takuya Mishina, Masayoshi Teraguchi, Sachiko Yoshihama
  • Publication number: 20080301754
    Abstract: Granular policy management is provided based upon an active status of a process and the display status of an associated visual display. A policy is constructed and applied to a process by a combination of individual control policy parameters associated with the status of a process or a graphical user interface. Each active policy is dynamically adjusted in response to a change in at least one policy condition.
    Type: Application
    Filed: May 31, 2007
    Publication date: December 4, 2008
    Inventors: Sanehiro Furuichi, Atsumi Ikebe, Takuya Mishina, Masami Tada
  • Publication number: 20080178257
    Abstract: A system for recording an expected value which a hash value of each of a plurality of the components in this system should take on. The system further records in association with secret information an expected value of integrity information which serves as a condition for permitting access to the secret information. The system includes a register for storing integrity information for certifying the integrity of the components. In the system, a value computed by further inputting to a hash function the expected values which hash values of the components should take on is stored in the register as the integrity information before the components are started. Then, a hash value of a component newly started is computed, and the integrity information of the register is updated on condition that the computed hash value is different from the expected value.
    Type: Application
    Filed: January 20, 2007
    Publication date: July 24, 2008
    Inventors: Takuya Mishina, Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama