Patents by Inventor Toshiharu Kishi
Toshiharu Kishi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11050776Abstract: A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated security point among security points each having a measure function performing a security measure on a node connected to a network. The invalidated security point has a measure function to be invalidated. The device also includes a determination unit that determines whether a security event to be addressed with the measure function of the invalidated security point is present on the basis of the invalidated security point information acquired by the acquisition unit. The device further includes an extraction unit that extracts a security point to which the measure function of the invalidated security point can be shifted when the determination unit determines that the security event is present.Type: GrantFiled: February 29, 2016Date of Patent: June 29, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiharu Kishi, Yasuhiro Teramoto, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
-
Patent number: 10972490Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.Type: GrantFiled: October 5, 2016Date of Patent: April 6, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yasuhiro Teramoto, Bo Hu, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
-
Patent number: 10616270Abstract: An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related to an entire system including a device that has received the cyber attack. Based on the collected cyber attack information and system information, the optimization apparatus identifies an attack route of the cyber attack, and extracts, as dealing point candidates, devices that are on the attack route and have an effective dealing function against the cyber attack. Subsequently, the optimization apparatus selects a dealing point from the extracted dealing point candidates by using optimization logic that has been set.Type: GrantFiled: November 5, 2015Date of Patent: April 7, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Bo Hu, Toshiharu Kishi, Hideo Kitazume, Takaaki Koyama, Yukio Nagafuchi, Yasuhiro Teramoto
-
Publication number: 20190081970Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.Type: ApplicationFiled: October 5, 2016Publication date: March 14, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yasuhiro TERAMOTO, Bo HU, Toshiharu KISHI, Yukio NAGAFUCHI, Takaaki KOYAMA, Hideo KITAZUME
-
Patent number: 10181031Abstract: A cloud controller performs, when an attack on a VM in any of data centers in a system is detected, setting of NAT of a private IP address of a VM(A), for a boundary router of each data center other than a data center that the VM(A) belongs to, the VM(A) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the VM(A), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center. Thereafter, the cloud controller changes a private IP address of the VM(A) in a NAT setting of a boundary router of the data center to a private IP address of the redirecting device.Type: GrantFiled: August 26, 2015Date of Patent: January 15, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume
-
Publication number: 20180041535Abstract: A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated security point among security points each having a measure function performing a security measure on a node connected to a network. The invalidated security point has a measure function to be invalidated. The device also includes a determination unit that determines whether a security event to be addressed with the measure function of the invalidated security point is present on the basis of the invalidated security point information acquired by the acquisition unit. The device further includes an extraction unit that extracts a security point to which the measure function of the invalidated security point can be shifted when the determination unit determines that the security event is present.Type: ApplicationFiled: February 29, 2016Publication date: February 8, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiharu KISHI, Yasuhiro TERAMOTO, Bo HU, Yukio NAGAFUCHI, Takaaki KOYAMA, Hideo KITAZUME
-
Publication number: 20170339183Abstract: An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related to an entire system including a device that has received the cyber attack. Based on the collected cyber attack information and system information, the optimization apparatus identifies an attack route of the cyber attack, and extracts, as dealing point candidates, devices that are on the attack route and have an effective dealing function against the cyber attack. Subsequently, the optimization apparatus selects a dealing point from the extracted dealing point candidates by using optimization logic that has been set.Type: ApplicationFiled: November 5, 2015Publication date: November 23, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Bo HU, Toshiharu KISHI, Hideo KITAZUME, Takaaki KOYAMA, Yukio NAGAFUCHI, Yasuhiro TERAMOTO
-
Publication number: 20170228539Abstract: A cloud controller performs, when an attack on a VM in any of data centers in a system is detected, setting of NAT of a private IP address of a VM(A), for a boundary router of each data center other than a data center that the VM(A) belongs to, the VM(A) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the VM(A), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center. Thereafter, the cloud controller changes a private IP address of the VM(A) in a NAT setting of a boundary router of the data center to a private IP address of the redirecting device.Type: ApplicationFiled: August 26, 2015Publication date: August 10, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yukio NAGAFUCHI, Yasuhiro TERAMOTO, Toshiharu KISHI, Takaaki KOYAMA, Hideo KITAZUME
-
Patent number: 8105433Abstract: It is an object of the invention to provide a cement admixture that can form concrete having a sufficient self-healing capability and satisfactorily maintaining its self-healing capability for prolonged periods. The cement admixture of the invention contains an expanding material and an alumina-silicate with swelling properties. The cement admixture is combined with cement to form a cement composition. The cement composition is mixed with water and an aggregate to provide concrete with an excellent self-healing capability.Type: GrantFiled: February 13, 2009Date of Patent: January 31, 2012Assignees: The University of Tokyo, National University Corporation Yokohama National University, East Japan Railway CompanyInventors: Toshiharu Kishi, Tae-Ho Ahn, Akira Hosoda, Kaoru Kobayashi
-
Publication number: 20110132231Abstract: It is an object of the invention to provide a cement admixture that can form concrete having a sufficient self-healing capability and satisfactorily maintaining its self-healing capability for prolonged periods. The cement admixture of the invention contains an expanding material and an alumina-silicate with swelling properties. The cement admixture is combined with cement to form a cement composition. The cement composition is mixed with water and an aggregate to provide concrete with an excellent self-healing capability.Type: ApplicationFiled: February 13, 2009Publication date: June 9, 2011Applicants: The University of Tokyo, National University Corporation Yokohama National University, East Japan Railway CompanyInventors: Toshiharu Kishi, Tae-Ho Ahn, Akira Hosoda, Kaoru Kobayashi