Patents by Inventor Yasuhiro Teramoto
Yasuhiro Teramoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230412624Abstract: An estimation device includes processing circuitry configured to generate a feature quantity by performing invertible transformation on a payload of a packet character by character with respect to each packet determined to be abnormal or normal by an abnormality detector, and give a determination result as to whether a packet is abnormal or normal to the generated feature quantity, learn a model that classifies whether the packet is abnormal or normal by machine learning using the feature quantity of the payload of the packet and the determination result as to whether the packet is abnormal or normal as teacher data, extract a number of dimensions of the feature quantity in which a contribution degree to classification is equal to or greater than a predetermined value in the learned model, and estimate a cause part of abnormality in the payload of the packet determined to be abnormal.Type: ApplicationFiled: November 19, 2020Publication date: December 21, 2023Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tomohiro NAGAI, Masanori YAMADA, Tomokatsu TAKAHASHI, Yasuhiro TERAMOTO, Yuki YAMANAKA
-
Patent number: 11050776Abstract: A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated security point among security points each having a measure function performing a security measure on a node connected to a network. The invalidated security point has a measure function to be invalidated. The device also includes a determination unit that determines whether a security event to be addressed with the measure function of the invalidated security point is present on the basis of the invalidated security point information acquired by the acquisition unit. The device further includes an extraction unit that extracts a security point to which the measure function of the invalidated security point can be shifted when the determination unit determines that the security event is present.Type: GrantFiled: February 29, 2016Date of Patent: June 29, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiharu Kishi, Yasuhiro Teramoto, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
-
Patent number: 10972490Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.Type: GrantFiled: October 5, 2016Date of Patent: April 6, 2021Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yasuhiro Teramoto, Bo Hu, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume
-
Patent number: 10616270Abstract: An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related to an entire system including a device that has received the cyber attack. Based on the collected cyber attack information and system information, the optimization apparatus identifies an attack route of the cyber attack, and extracts, as dealing point candidates, devices that are on the attack route and have an effective dealing function against the cyber attack. Subsequently, the optimization apparatus selects a dealing point from the extracted dealing point candidates by using optimization logic that has been set.Type: GrantFiled: November 5, 2015Date of Patent: April 7, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Bo Hu, Toshiharu Kishi, Hideo Kitazume, Takaaki Koyama, Yukio Nagafuchi, Yasuhiro Teramoto
-
Publication number: 20190081970Abstract: A specifying device receives detection information from a security device that detects hacking into a network or an activity of a terminal related to infection, and specifies a state of the terminal from information of the terminal and content of activity of the terminal included in the detection information. The specifying device specifies, when specifying that the terminal is in the state of being infected with malware, a terminal that may be infected before performing the content of the activity of the terminal included in the detection information based on connection information stored in a configuration information storage device, and specifies a terminal located on a route, along which the infected terminal is likely to be used for hacking or for infection of the terminal in the future, as a candidate for an infected terminal likely to be infected.Type: ApplicationFiled: October 5, 2016Publication date: March 14, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yasuhiro TERAMOTO, Bo HU, Toshiharu KISHI, Yukio NAGAFUCHI, Takaaki KOYAMA, Hideo KITAZUME
-
Patent number: 10181031Abstract: A cloud controller performs, when an attack on a VM in any of data centers in a system is detected, setting of NAT of a private IP address of a VM(A), for a boundary router of each data center other than a data center that the VM(A) belongs to, the VM(A) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the VM(A), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center. Thereafter, the cloud controller changes a private IP address of the VM(A) in a NAT setting of a boundary router of the data center to a private IP address of the redirecting device.Type: GrantFiled: August 26, 2015Date of Patent: January 15, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume
-
Publication number: 20180041535Abstract: A security measure invalidation prevention device includes an acquisition unit that acquires invalidated security point information about an invalidated security point among security points each having a measure function performing a security measure on a node connected to a network. The invalidated security point has a measure function to be invalidated. The device also includes a determination unit that determines whether a security event to be addressed with the measure function of the invalidated security point is present on the basis of the invalidated security point information acquired by the acquisition unit. The device further includes an extraction unit that extracts a security point to which the measure function of the invalidated security point can be shifted when the determination unit determines that the security event is present.Type: ApplicationFiled: February 29, 2016Publication date: February 8, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Toshiharu KISHI, Yasuhiro TERAMOTO, Bo HU, Yukio NAGAFUCHI, Takaaki KOYAMA, Hideo KITAZUME
-
Publication number: 20170339183Abstract: An optimization apparatus collects cyber attack information that is information related to a cyber attack, and system information that is information related to an entire system including a device that has received the cyber attack. Based on the collected cyber attack information and system information, the optimization apparatus identifies an attack route of the cyber attack, and extracts, as dealing point candidates, devices that are on the attack route and have an effective dealing function against the cyber attack. Subsequently, the optimization apparatus selects a dealing point from the extracted dealing point candidates by using optimization logic that has been set.Type: ApplicationFiled: November 5, 2015Publication date: November 23, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Bo HU, Toshiharu KISHI, Hideo KITAZUME, Takaaki KOYAMA, Yukio NAGAFUCHI, Yasuhiro TERAMOTO
-
Publication number: 20170228539Abstract: A cloud controller performs, when an attack on a VM in any of data centers in a system is detected, setting of NAT of a private IP address of a VM(A), for a boundary router of each data center other than a data center that the VM(A) belongs to, the VM(A) being a victim. Next, the cloud controller performs setting for a redirecting device in the same data center as the VM(A), such that the redirecting device redirects access from a user terminal to a host under a boundary router of any of the respective data centers other than the data center. Thereafter, the cloud controller changes a private IP address of the VM(A) in a NAT setting of a boundary router of the data center to a private IP address of the redirecting device.Type: ApplicationFiled: August 26, 2015Publication date: August 10, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yukio NAGAFUCHI, Yasuhiro TERAMOTO, Toshiharu KISHI, Takaaki KOYAMA, Hideo KITAZUME
-
Patent number: 6848023Abstract: The present invention relates to a cache directory configuration method and an information processing device that implements the same. In an embodiment of this invention, each cache directory is divided up into a plurality of units that can be operated in a parallel manner. A plurality of search requests can be processed by each cache directory concurrently. Thus this embodiment allows the hardware requirements for the cache directory to be restricted while providing cache directory search performance higher than that of the conventional technology.Type: GrantFiled: December 19, 2000Date of Patent: January 25, 2005Assignee: Hitachi, Ltd.Inventor: Yasuhiro Teramoto
-
Publication number: 20010032299Abstract: The present invention relates to a cache directory configuration method and an information processing device that implements the same. In an embodiment of this invention, each cache directory is divided up into a plurality of units that can be operated in a parallel manner. A plurality of search requests can be processed by each cache directory concurrently. Thus this embodiment allows the hardware requirements for the cache directory to be restricted while providing cache directory search performance higher than that of the conventional technology.Type: ApplicationFiled: December 19, 2000Publication date: October 18, 2001Applicant: Hitachi, Ltd.Inventor: Yasuhiro Teramoto
-
Patent number: 5968135Abstract: An information processing system is connected to a common storage and executes programs by use of processors. This system includes a common storage; a plurality of processors, connected to the common storage.Type: GrantFiled: November 18, 1997Date of Patent: October 19, 1999Assignee: Hitachi, Ltd.Inventors: Yasuhiro Teramoto, Toshimitsu Andoh, Tadaaki Isobe, Naonobu Sukegawa, Yuko Ishibashi