Patents by Inventor Yuji Watanabe

Yuji Watanabe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10839103
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: November 17, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10834069
    Abstract: A computer readable medium having instructions embodied therewith, the instructions executable by a processor or programmable circuitry of a federation server to cause the processor or programmable circuitry to perform operations including configuring a plurality of identification (ID) federations between the federation server and a plurality of applications such that each of the plurality of ID federations is between the federation server and one of the plurality of applications, receiving a first authentication request for authenticating a user who has been authenticated on a first application of the plurality of applications using an ID federation between the first application and the federation server from among the plurality of ID federations, and sending a second authentication request to a second application of the plurality of applications for authenticating the user using an ID federation between the federation server and the second application from among the plurality of ID federations.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Miki Enoki, Yuji Watanabe
  • Patent number: 10803075
    Abstract: A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database server residing on a network that stores predetermined data, and a client terminal issuing to the database server a search request for inquiring for desired data while keeping the desired data secret. The database server further comprises: a database storing predetermined data; and a search response message generation unit for receiving through a network the data search request in which data to be searched for is kept secret, searching the database by a predetermined computation based on the search request and a list of the data stored in the database while a data item involved with the search request is kept secret, and generating a response to the search request.
    Type: Grant
    Filed: September 3, 2013
    Date of Patent: October 13, 2020
    Assignee: International Business Machines Corporation
    Inventors: Masayuki Numao, Yuji Watanabe
  • Publication number: 20200255347
    Abstract: A method for producing a honeycomb structure, the method including: a step of drying a pillar-shaped honeycomb formed body including partition walls that define a plurality of cells each forming a flow path penetrating from a first end face to a second end face; and after the step of drying, a step of cooling the honeycomb formed body by applying a suction force to the first end face of the honeycomb formed body to allow a coolant to flow in the honeycomb formed body from the second end face, pass through the cells, and flow out from the first end face.
    Type: Application
    Filed: January 28, 2020
    Publication date: August 13, 2020
    Applicant: NGK INSULATORS, LTD.
    Inventors: Ken ITADU, Nobuhiro FUJIE, Yuji WATANABE
  • Publication number: 20200142761
    Abstract: In an approach to detection of co-location of container services, a method may include monitoring a load on one or more resources accessible by cloud containers located on a first host. The method may further include identifying a bit string from the monitored load of the one or more resources. A high load on the one or more resources for a time period indicates a first bit value, and a low load on the one or more resources for the time period indicates a second alternate bit value. The method may further include receiving a shared key corresponding to a second program in a second cloud container. The method may further include determining the second cloud container is located on the first host based on the shared key matching a key corresponding to the identified bit string.
    Type: Application
    Filed: January 3, 2020
    Publication date: May 7, 2020
    Inventors: Alisa Arno, Yuji Watanabe, Ai Yoshino
  • Publication number: 20200134102
    Abstract: Computer systems, computer-implemented methods and computer program products that detect a homographic string against defined strings is disclosed. In one embodiment, a computer-implemented method comprises: preparing, by a device operatively coupled to a processor, a mapping function to map a character into an identifier, the mapping function defining a plurality of groups each comprising two or more characters that resemble one another assigned a same identifier, and wherein the plurality of groups are mutually exclusive; preparing, by the device, a list of identifier sequences obtained from defined strings based on the mapping function; applying, by the device, the mapping function to a queried string to obtain a queried identifier sequence; and determining, by the device, whether the queried string is a homographic string by comparing the queried identifier sequence with the list of the identifier sequences.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Takashi Yoneuchi, Yuji Watanabe, Fumiko Akiyama
  • Patent number: 10637845
    Abstract: A computer readable medium, apparatus, system, and method for performing identification (ID) operations using a processor or programmable circuitry. The processor configures ID federations between a federation server and applications. The processor is further configured to receive a first authentication request for authenticating a first user who has been authenticated on a first application among the applications with a first user ID using an ID federation. The processor is also configured to check the first user ID to determine whether the first user is authorized to access information of a second user on a second application and send a second authentication request to a second application, the second authentication request for authenticating the first user with a second user ID, which is associated with the second user, using an ID federation between the federation server and the second application.
    Type: Grant
    Filed: July 21, 2017
    Date of Patent: April 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Miki Ishikawa, Yuji Watanabe
  • Patent number: 10616204
    Abstract: A computer readable medium, apparatus, system, and method for performing identification (ID) operations using a processor or programmable circuitry are provided. The processor configures ID federations between a federation server and applications. The processor is further configured to receive a first authentication request for authenticating a first user who has been authenticated on a first application among the applications with a first user ID using an ID federation. The processor is also configured to check the first user ID to determine whether the first user is authorized to access information of a second user on a second application and send a second authentication request to a second application, the second authentication request for authenticating the first user with a second user ID, which is associated with the second user, using an ID federation between the federation server and the second application.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Miki Ishikawa, Yuji Watanabe
  • Patent number: 10581246
    Abstract: When a voltage-fluctuation suppression device suppresses, for input/output of connected power between a first power grid, or a commercial power grid, and a second power grid including a power generation device and grid-connected to the first power grid, voltage fluctuations in the first power grid, a control unit includes a voltage allowable range computing unit, controls a ratio between active and reactive power output by the voltage-fluctuation suppression device to be equal to a ratio between active and reactive power of power flowing between the first and second power grids, and controls the ratio between the active and reactive power output by the voltage-fluctuation suppression device to be equal to the ratio between the active and reactive power of power flowing between the first and second power grids.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: March 3, 2020
    Assignees: Kabushiki Kaisha Toshiba, Toshiba Energy Systems & Solutions Corporation
    Inventors: Yukitaka Monden, Yuji Watanabe
  • Publication number: 20200067911
    Abstract: A method includes, for a first user having been authenticated on a first application with a first user identification (ID) using a first ID federation between the first application and a federation server, determining that the first user is authorized to access information of a second user on a second application based on the first user ID, the second user being associated with a second user ID, and sending a second authentication request for authenticating the first user to the second application with the second user ID using a second ID federation between the federation server and the second application.
    Type: Application
    Filed: November 1, 2019
    Publication date: February 27, 2020
    Inventors: Miki Ishikawa, Yuji Watanabe
  • Publication number: 20200067910
    Abstract: At least one processor device is configured to receive a first authentication request for authenticating a first user, the first user having been authenticated on a first application with a first user identification (ID) using a first ID federation between the first application and a federation server, determine that the first user is authorized to access information of a second user on a second application based on the first user ID, the second user being associated with a second user ID, and send a second authentication request for authenticating the first user to the second application with the second user ID using a second ID federation between the federation server and the second application.
    Type: Application
    Filed: November 1, 2019
    Publication date: February 27, 2020
    Inventors: Miki Ishikawa, Yuji Watanabe
  • Patent number: 10572320
    Abstract: In an approach to detection of co-location of container services, a method may include receiving, by a first program in a first cloud container on a first host, a bit string over a side channel within a trial period of time. The method may also include determining whether a key corresponding to the bit string matches a pre-determined key corresponding to a second program in a second cloud container. The method may further include determining whether the second cloud container is located on the first host based, at least in part, on whether the key corresponding to the bit string matches the pre-determined key. The side channel may include a first resource on the first host that is accessible by cloud containers located on the first host and the bit string is received by monitoring the first resource for activity indicative of bit values.
    Type: Grant
    Filed: December 1, 2017
    Date of Patent: February 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: Alisa Arno, Yuji Watanabe, Ai Yoshino
  • Publication number: 20200057868
    Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.
    Type: Application
    Filed: October 25, 2019
    Publication date: February 20, 2020
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10552633
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Patent number: 10540518
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20190362100
    Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.
    Type: Application
    Filed: August 13, 2019
    Publication date: November 28, 2019
    Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
  • Publication number: 20190344473
    Abstract: A masking method for honeycomb formed body, including bonding a film on at least one bottom face of a honeycomb formed body in a quadrangular prism shape such that an adhesive surface is in contact with the bottom face. The step of bonding the film includes bonding of the film so as to have a bottom face covering portion that covers a whole surface of the bottom face and a pair of outer edge portions along one pair of opposite sides of a quadrangle defining an outer peripheral shape of the bottom face and a pair of protruding portions protruding from another pair of opposite sides of the quadrangle. At least a part of the adhesive surface of each of the pair of protruding portions is bonded so as to be in contact with a pair of opposing lateral faces of the honeycomb formed body.
    Type: Application
    Filed: March 19, 2019
    Publication date: November 14, 2019
    Applicant: NGK INSULATORS, LTD.
    Inventors: Nobuhiro FUJIE, Yuji WATANABE, Ken ITADU, Yoshihiro SATO
  • Patent number: 10450914
    Abstract: The manufacturing method of the plugged honeycomb structure includes a honeycomb structure forming step of forming a pillar-shaped honeycomb structure, and a plugging step of forming plugging portions in end portions of the cells of the honeycomb structure formed in the honeycomb structure forming step, and in the plugging step, there is performed a press pouring operation of pressing one end face of the honeycomb structure into a plugging slurry stored in a bottomed tubular container to pour, under pressure, the plugging slurry into the cells of the honeycomb structure, and as the plugging slurry of the plugging step, there is used a slurry in which a yield point viscosity of a viscous fluidity is 600 Pa·s or more, a recovery viscosity is 300 Pa·s or more, and a high shearing viscosity is 200 Pa·s or less.
    Type: Grant
    Filed: March 16, 2017
    Date of Patent: October 22, 2019
    Assignee: NGK Insulators, Ltd.
    Inventors: Michio Suzuki, Kojiro Hayashi, Yuji Watanabe
  • Publication number: 20190300643
    Abstract: Provided is a material having an excellent sound-absorbing performance which can be easily applied to the desired area at the operation site and which can effectively prevent sound leakage The material includes a 2-part reactive urethane resin composition prepared from a polyisocyanate component and a polyol-containing component, wherein the polyol-containing component comprises a polyol component (a), catalysts (b), a foam stabilizer (c), an amine compound having primary or secondary amino groups (d), and carbon dioxide (e). The 2-part reactive urethane resin composition, when cured, is an open-cell soft polyurethane foam, wherein the average sound absorption coefficient of said polyurethane foam is 30% or more, measured in accordance with JIS A 1405-2:2007 for 63 hertz to 5000 hertz.
    Type: Application
    Filed: March 28, 2019
    Publication date: October 3, 2019
    Inventors: Shinsuke Kataoka, Eiichi Kawase, Masanori Takasaki, Yuji Watanabe, Hirofumi Takeuchi, Shinichiro Sado, Hiroaki Ido, Shinji Nishikawa, Saeko Kinami, Kazuki Murata
  • Publication number: 20190299487
    Abstract: A bottom face processing method of a pillar-shaped honeycomb structure including steps of: preparing a pillar-shaped honeycomb structure including a plurality of first cells which extend in parallel with each other from a first bottom face to a second bottom face, and each of which is opened in the first bottom face and has a protruding plugged portion in the second bottom face, and a plurality of second cells each of which is adjacent to at least one of the first cells with a partition wall interposed therebetween, which extend in parallel with each other from the first bottom face to the second bottom face, and each of which has a protruding plugged portion in the first bottom face, and is opened in the second bottom face; and removing the protruding portion from the plugged portion of each of the first cells and the second cells of the pillar-shaped honeycomb structure.
    Type: Application
    Filed: March 15, 2019
    Publication date: October 3, 2019
    Applicant: NGK INSULATORS, LTD.
    Inventors: Nobuhiro FUJIE, Yuji WATANABE, Ken ITADU, Yoshihiro SATO