Patents by Inventor Yoshiki Higashikado

Yoshiki Higashikado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230362015
    Abstract: A storage unit stores transaction data to be recorded on a blockchain. When receiving identification information identifying a processing system for processing the transaction data among processing systems, a processing unit calculates a function value using a parameter corresponding to the received identification information and a function. The processing unit notifies a determination unit, which determines the processing system for processing the transaction data from among the processing systems, of the transaction data and signature data generated from the function value.
    Type: Application
    Filed: July 13, 2023
    Publication date: November 9, 2023
    Applicant: FUJITSU LIMITED
    Inventors: Keita KAYABA, Yuki YONEKURA, Yoshiki HIGASHIKADO, Masanobu MORINAGA, Yasushi TAKAHASHI, Rikuhiro KOJIMA
  • Publication number: 20230205762
    Abstract: A blockchain linking method for a computer to execute a process includes when deleting, a first block that precedes a second block from a blockchain, extracting first information that satisfies a certain condition from among a plurality of pieces of information stored in the first block, the first block and the second block being included in a plurality of blocks included in the blockchain; generating a third block that stores second information that includes the first information, the third information being generated such that a hash value obtained from the second information is equal to a hash value stored in the second block; and linking the third block before the second block in the blockchain.
    Type: Application
    Filed: February 22, 2023
    Publication date: June 29, 2023
    Applicant: FUJITSU LIMITED
    Inventors: Yoshiki HIGASHIKADO, Masanobu MORINAGA
  • Patent number: 11641271
    Abstract: A control method includes generating third key information, when receiving a recording request for asset information to a blockchain and first key information, based on the first key information and second key information stored in a specific storage area, generating fourth key information by decrypting key information associated with the blockchain among a plurality of pieces of encrypted key information, by using the generated third key information, transmitting the fourth key information and the recording request to the blockchain.
    Type: Grant
    Filed: January 27, 2021
    Date of Patent: May 2, 2023
    Assignee: FUJITSU LIMITED
    Inventors: Yoshiki Higashikado, Shingo Fujimoto, Masanobu Morinaga
  • Publication number: 20210273785
    Abstract: A control method includes generating third key information, when receiving a recording request for asset information to a blockchain and first key information, based on the first key information and second key information stored in a specific storage area, generating fourth key information by decrypting key information associated with the blockchain among a plurality of pieces of encrypted key information, by using the generated third key information, transmitting the fourth key information and the recording request to the blockchain.
    Type: Application
    Filed: January 27, 2021
    Publication date: September 2, 2021
    Applicant: FUJITSU LIMITED
    Inventors: Yoshiki Higashikado, Shingo Fujimoto, Masanobu Morinaga
  • Publication number: 20200226596
    Abstract: An information processing apparatus includes: a memory; and a processor coupled to the memory and configured to: generate, in response to reception of a token issue request including transaction information from a user, a permission rule for determining a permission range of transaction contents based on the transaction information; transmit a token corresponding to the permission rule to a web application which processes a proxy transaction for the user, and determine, in response to reception of a signature issue request based on a transaction request by the user including the token from the web application, whether or not to issue a digital signature corresponding to the signature issue request, based on whether or not the transaction contents included in the transaction request are within the permission range determined by the permission rule corresponding to the token included in the signature issue request.
    Type: Application
    Filed: December 12, 2019
    Publication date: July 16, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Takuma Takeuchi, Yoshiki Higashikado, Shingo Fujimoto, Ken Kamakura
  • Patent number: 8429361
    Abstract: An information-storage system storing information includes, an information-storage unit configured to store data, an encoding/decoding unit configured to encode and store input data in the information-storage unit, and decode and output the encoded data stored in the information-storage unit upon receiving a request for an information output, a transmission unit configured to output the encoded data stored in the information-storage unit, the encoded data being left undecoded, and store the encoded data in a backup spot different from the information-storage unit, a status-monitoring unit configured to monitor an unusual status of the information-storage system, and a selection unit configured to select the transmission unit between the encoding/decoding unit and the transmission unit when the status-monitoring unit confirms the unusual status of the information-storage system.
    Type: Grant
    Filed: February 2, 2011
    Date of Patent: April 23, 2013
    Assignee: Fujitsu Limited
    Inventors: Yoshiki Higashikado, Kuniko Omido
  • Patent number: 8375445
    Abstract: A malware detecting apparatus, monitoring apparatus, malware detecting program, and malware detecting method are provided. The method detects a plurality of nodes that have sent connection request information commonly to one of first destinations among a set of monitoring target nodes, detects, for each node in the set of monitoring target nodes, the number of second destinations to which the node has sent connection request information, identifies a node infected with malware based on the plurality of nodes detected and the number of second destinations detected, and outputs a result of the identification.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: February 12, 2013
    Assignee: Fujitsu Limited
    Inventor: Yoshiki Higashikado
  • Patent number: 8307445
    Abstract: An anti-worm program allows a computer to execute control of communication suspected as worm communication, the program allowing the computer to execute: a communication information acquisition step that acquires communication information which is information concerning communication from a target source; and a communication control step that has a control amount calculation formula for calculating the control amount of the communication from the target source using the communication information and performs control of the communication from the target source based on the communication control amount obtained using the control amount calculation formula.
    Type: Grant
    Filed: July 7, 2008
    Date of Patent: November 6, 2012
    Assignee: Fujitsu Limited
    Inventors: Bintatsu Noda, Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Masashi Mitomo, Satoru Torii
  • Publication number: 20110202736
    Abstract: An information-storage system storing information includes, an information-storage unit configured to store data, an encoding/decoding unit configured to encode and store input data in the information-storage unit, and decode and output the encoded data stored in the information-storage unit upon receiving a request for an information output, a transmission unit configured to output the encoded data stored in the information-storage unit, the encoded data being left undecoded, and store the encoded data in a backup spot different from the information-storage unit, a status-monitoring unit configured to monitor an unusual status of the information-storage system, and a selection unit configured to select the transmission unit between the encoding/decoding unit and the transmission unit when the status-monitoring unit confirms the unusual status of the information-storage system.
    Type: Application
    Filed: February 2, 2011
    Publication date: August 18, 2011
    Applicant: FUJITSU LIMITED
    Inventors: Yoshiki HIGASHIKADO, Kuniko Omido
  • Patent number: 7832010
    Abstract: The apparatus analyzes management information about network information collected from a computer and a router, detects a change in the management information specific to the activity of an unauthorized access program (worm), and generates alert information including a type of apparatus whose collected management information indicates the detected change and address information about an apparatus suspected of performing the activity of a worm. When the type of apparatus in the alert information refers to a computer, the apparatus generates an instruction to delete relayed information for the computer. When the type of apparatus refers to a network connection apparatus, the apparatus generates an instruction to set a filter for cutting off the communications of a worm with the network connection apparatus. Thus, the apparatus transmits the instructions.
    Type: Grant
    Filed: April 18, 2007
    Date of Patent: November 9, 2010
    Assignee: Fujitsu Limited
    Inventors: Yoshiki Higashikado, Satoru Torii
  • Patent number: 7568232
    Abstract: A malicious access-detecting apparatus which is cable of grasping the whole aspect of an attack which can occur, before it actually occurs. A monitoring information-collecting section collects monitoring information including the network events detected by the monitoring devices on networks. A malicious apparatus group-deriving section retrieves a corresponding piece of the event information from an event information storage device, and derives, based on the retrieved piece of the event information, apparatuses that are involved in relevant detected network events which belong to the predetermined type of network events and of which addresses of senders or recipients are same, as a malicious apparatus group involved in the predetermined type of malicious access. A storage section stores information on each derived malicious apparatus group. An output section outputs a list of the each derived malicious apparatus group.
    Type: Grant
    Filed: January 26, 2005
    Date of Patent: July 28, 2009
    Assignee: Fujitsu Limited
    Inventors: Masashi Mitomo, Yoshiki Higashikado, Fumie Takizawa, Satoru Torii, Osamu Koyano
  • Patent number: 7564837
    Abstract: A recording medium recording a network shutdown control program permitting suitable preventive measures to be taken. A detector monitors each network segment to be managed, and on detecting a communication fulfilling a predetermined condition, the detector generates a detection notification and sends the notification to a quarantine manager. On acquiring the detection notification generated by the detector of the local device or a detection notification generated by a remote network shutdown device, the quarantine manager generates a shutdown operation request in accordance with quarantine policy stored in a quarantine policy storage, and sends the request to a communication shutdown unit. In accordance with the shutdown operation request, the communication shutdown unit sets shutdown data identifying a target of shutdown and controls packets to be input to and output from the network segment so that the packets may be shut off or passed.
    Type: Grant
    Filed: March 1, 2006
    Date of Patent: July 21, 2009
    Assignee: Fujitsu Limited
    Inventors: Masahiro Komura, Kazumasa Omote, Yoshiki Higashikado, Masashi Mitomo, Bintatsu Noda, Satoru Torii
  • Publication number: 20090113547
    Abstract: A malware detecting apparatus, monitoring apparatus, malware detecting program, and malware detecting method are provided. The method detects a plurality of nodes that have sent connection request information commonly to one of first destinations among a set of monitoring target nodes, detects, for each node in the set of monitoring target nodes, the number of second destinations to which the node has sent connection request information, identifies a node infected with malware based on the plurality of nodes detected and the number of second destinations detected, and outputs a result of the identification.
    Type: Application
    Filed: October 27, 2008
    Publication date: April 30, 2009
    Applicant: Fujitsu Limited
    Inventor: Yoshiki HIGASHIKADO
  • Publication number: 20080271148
    Abstract: An anti-worm program allows a computer to execute control of communication suspected as worm communication, the program allowing the computer to execute: a communication information acquisition step that acquires communication information which is information concerning communication from a target source; and a communication control step that has a control amount calculation formula for calculating the control amount of the communication from the target source using the communication information and performs control of the communication from the target source based on the communication control amount obtained using the control amount calculation formula.
    Type: Application
    Filed: July 7, 2008
    Publication date: October 30, 2008
    Applicant: FUJITSU LIMITED
    Inventors: Bintatsu NODA, Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Masashi Mitomo, Satoru Torii
  • Patent number: 7313818
    Abstract: An unauthorized access detection device capable of detecting unauthorized accesses which are made through preparation, in real time. When a packet travels on a network, a key data extractor obtains the packet and obtains key data. Next an ongoing scenario detector searches an ongoing scenario storage unit for an ongoing scenario with the key data as search keys. A check unit determines whether the execution of the process indicated by the packet after the ongoing scenario detected by the ongoing scenario detector follows an unauthorized access scenario being stored in an unauthorized access scenario storage unit. Then a report output unit outputs an unauthorized access report depending on the check result of the check unit.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: December 25, 2007
    Assignee: Fujitsu Limited
    Inventors: Masashi Mitomo, Yoshiki Higashikado, Fumie Takizawa, Satoru Torii, Osamu Koyano
  • Publication number: 20070256119
    Abstract: The apparatus analyzes management information about network information collected from a computer and a router, detects a change in the management information specific to the activity of an unauthorized access program (worm), and generates alert information including a type of apparatus whose collected management information indicates the detected change and address information about an apparatus suspected of performing the activity of a worm. When the type of apparatus in the alert information refers to a computer, the apparatus generates an instruction to delete relayed information for the computer. When the type of apparatus refers to a network connection apparatus, the apparatus generates an instruction to set a filter for cutting off the communications of a worm with the network connection apparatus. Thus, the apparatus transmits the instructions.
    Type: Application
    Filed: April 18, 2007
    Publication date: November 1, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Yoshiki Higashikado, Satoru Torii
  • Publication number: 20070101404
    Abstract: In a network relay device, unauthorized access from an internal computer to an external network is detected, an unauthorized destination service port used for the unauthorized access is specified, and a substitute port is allocated. A service relay unit and the internal computer are instructed to use the substitute port instead of the unauthorized destination service port, and an unauthorized access notification is sent. Mutual conversion of the unauthorized destination service port and a substitute service port is carried out, to relay a packet between an internal network and the external network.
    Type: Application
    Filed: March 7, 2006
    Publication date: May 3, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Yoshiki Higashikado, Masashi Mitomo, Masahiro Komura, Bintatsu Noda, Kazumasa Omote, Satoru Torii
  • Publication number: 20070011745
    Abstract: A computer-readable recording medium recording a worm detection parameter setting program for setting an appropriate worm detection parameter for target environments. When a log reader loads a communication log created within a prescribed time period, a log classifier classifies the entries of the communication log into categories based on communication contents. A frequency distribution creator analyzes the entries of a category, counts the number of appearance of each worm detection parameter value for each object of a preset network unit, and creates frequency distribution information. A threshold derivation unit analyzes the frequency distribution information and derives a threshold value that is used for determining whether a worm is propagating. An output unit outputs to an output device the threshold value for the worm detection parameter for the category, together with the frequency distribution information created by the frequency distribution creator, thereby providing a user with the information.
    Type: Application
    Filed: March 16, 2006
    Publication date: January 11, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Masashi Mitomo, Yoshiki Higashikado, Masahiro Komura, Bintatsu Noda, Kazumasa Omote, Satoru Torii
  • Publication number: 20070002838
    Abstract: A recording medium recording a network shutdown control program permitting suitable preventive measures to be taken. A detector monitors each network segment to be managed, and on detecting a communication fulfilling a predetermined condition, the detector generates a detection notification and sends the notification to a quarantine manager. On acquiring the detection notification generated by the detector of the local device or a detection notification generated by a remote network shutdown device, the quarantine manager generates a shutdown operation request in accordance with quarantine policy stored in a quarantine policy storage, and sends the request to a communication shutdown unit. In accordance with the shutdown operation request, the communication shutdown unit sets shutdown data identifying a target of shutdown and controls packets to be input to and output from the network segment so that the packets may be shut off or passed.
    Type: Application
    Filed: March 1, 2006
    Publication date: January 4, 2007
    Applicant: FUJITSU LIMITED
    Inventors: Masahiro Komura, Kazumasa Omote, Yoshiki Higashikado, Masashi Mitomo, Bintatsu Noda, Satoru Torii
  • Publication number: 20060291469
    Abstract: A computer-readable recording medium recording a worm detection program which is preferably usable for a large-scale network and is capable of detecting worm communication with little information. A worm detection device which runs this program has a switching hub function, and comprises five physical ports that are network interfaces, a communication acquisition section, and a worm detector, for example. The communication acquisition section acquires ICMP type3 (destination unreachable message) packets going out of the physical ports. The worm detector determines whether the packet communication is worm communication, based on information on the ICMP type3 packets obtained for each source MAC address by the communication acquisition section and worm criteria set for determining whether communication is worm communication.
    Type: Application
    Filed: February 7, 2006
    Publication date: December 28, 2006
    Applicant: FUJITSU LIMITED
    Inventors: Kazumasa Omote, Yoshiki Higashikado, Masahiro Komura, Bintatsu Noda, Masashi Mitomo, Satoru Torii