Patents by Inventor Yuji Watanabe
Yuji Watanabe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200394497Abstract: Guided character string alteration can be performed by obtaining an original character string and a plurality of altered character strings, traversing the original character string with a first Long Short Term Memory (LSTM) network to generate, for each character of the original character string, a hidden state of a partial original character string up to that character, and applying, during the traversing, an alteration learning process to each hidden state of a partial original character string to produce an alteration function for relating partial original character strings to partial altered character strings.Type: ApplicationFiled: June 12, 2019Publication date: December 17, 2020Inventors: Pablo Loyola, Kugamoorthy Gajananan, Yuji Watanabe, Fumiko Akiyama
-
Patent number: 10839103Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.Type: GrantFiled: August 13, 2019Date of Patent: November 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10834069Abstract: A computer readable medium having instructions embodied therewith, the instructions executable by a processor or programmable circuitry of a federation server to cause the processor or programmable circuitry to perform operations including configuring a plurality of identification (ID) federations between the federation server and a plurality of applications such that each of the plurality of ID federations is between the federation server and one of the plurality of applications, receiving a first authentication request for authenticating a user who has been authenticated on a first application of the plurality of applications using an ID federation between the first application and the federation server from among the plurality of ID federations, and sending a second authentication request to a second application of the plurality of applications for authenticating the user using an ID federation between the federation server and the second application from among the plurality of ID federations.Type: GrantFiled: August 30, 2016Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Miki Enoki, Yuji Watanabe
-
Patent number: 10803075Abstract: A database search system ensures the privacy of a search request and the security of a database with high processing efficiency. The system comprises a database server residing on a network that stores predetermined data, and a client terminal issuing to the database server a search request for inquiring for desired data while keeping the desired data secret. The database server further comprises: a database storing predetermined data; and a search response message generation unit for receiving through a network the data search request in which data to be searched for is kept secret, searching the database by a predetermined computation based on the search request and a list of the data stored in the database while a data item involved with the search request is kept secret, and generating a response to the search request.Type: GrantFiled: September 3, 2013Date of Patent: October 13, 2020Assignee: International Business Machines CorporationInventors: Masayuki Numao, Yuji Watanabe
-
Publication number: 20200255347Abstract: A method for producing a honeycomb structure, the method including: a step of drying a pillar-shaped honeycomb formed body including partition walls that define a plurality of cells each forming a flow path penetrating from a first end face to a second end face; and after the step of drying, a step of cooling the honeycomb formed body by applying a suction force to the first end face of the honeycomb formed body to allow a coolant to flow in the honeycomb formed body from the second end face, pass through the cells, and flow out from the first end face.Type: ApplicationFiled: January 28, 2020Publication date: August 13, 2020Applicant: NGK INSULATORS, LTD.Inventors: Ken ITADU, Nobuhiro FUJIE, Yuji WATANABE
-
Publication number: 20200142761Abstract: In an approach to detection of co-location of container services, a method may include monitoring a load on one or more resources accessible by cloud containers located on a first host. The method may further include identifying a bit string from the monitored load of the one or more resources. A high load on the one or more resources for a time period indicates a first bit value, and a low load on the one or more resources for the time period indicates a second alternate bit value. The method may further include receiving a shared key corresponding to a second program in a second cloud container. The method may further include determining the second cloud container is located on the first host based on the shared key matching a key corresponding to the identified bit string.Type: ApplicationFiled: January 3, 2020Publication date: May 7, 2020Inventors: Alisa Arno, Yuji Watanabe, Ai Yoshino
-
Publication number: 20200134102Abstract: Computer systems, computer-implemented methods and computer program products that detect a homographic string against defined strings is disclosed. In one embodiment, a computer-implemented method comprises: preparing, by a device operatively coupled to a processor, a mapping function to map a character into an identifier, the mapping function defining a plurality of groups each comprising two or more characters that resemble one another assigned a same identifier, and wherein the plurality of groups are mutually exclusive; preparing, by the device, a list of identifier sequences obtained from defined strings based on the mapping function; applying, by the device, the mapping function to a queried string to obtain a queried identifier sequence; and determining, by the device, whether the queried string is a homographic string by comparing the queried identifier sequence with the list of the identifier sequences.Type: ApplicationFiled: October 26, 2018Publication date: April 30, 2020Inventors: Takashi Yoneuchi, Yuji Watanabe, Fumiko Akiyama
-
Patent number: 10637845Abstract: A computer readable medium, apparatus, system, and method for performing identification (ID) operations using a processor or programmable circuitry. The processor configures ID federations between a federation server and applications. The processor is further configured to receive a first authentication request for authenticating a first user who has been authenticated on a first application among the applications with a first user ID using an ID federation. The processor is also configured to check the first user ID to determine whether the first user is authorized to access information of a second user on a second application and send a second authentication request to a second application, the second authentication request for authenticating the first user with a second user ID, which is associated with the second user, using an ID federation between the federation server and the second application.Type: GrantFiled: July 21, 2017Date of Patent: April 28, 2020Assignee: International Business Machines CorporationInventors: Miki Ishikawa, Yuji Watanabe
-
Patent number: 10616204Abstract: A computer readable medium, apparatus, system, and method for performing identification (ID) operations using a processor or programmable circuitry are provided. The processor configures ID federations between a federation server and applications. The processor is further configured to receive a first authentication request for authenticating a first user who has been authenticated on a first application among the applications with a first user ID using an ID federation. The processor is also configured to check the first user ID to determine whether the first user is authorized to access information of a second user on a second application and send a second authentication request to a second application, the second authentication request for authenticating the first user with a second user ID, which is associated with the second user, using an ID federation between the federation server and the second application.Type: GrantFiled: November 6, 2017Date of Patent: April 7, 2020Assignee: International Business Machines CorporationInventors: Miki Ishikawa, Yuji Watanabe
-
Patent number: 10581246Abstract: When a voltage-fluctuation suppression device suppresses, for input/output of connected power between a first power grid, or a commercial power grid, and a second power grid including a power generation device and grid-connected to the first power grid, voltage fluctuations in the first power grid, a control unit includes a voltage allowable range computing unit, controls a ratio between active and reactive power output by the voltage-fluctuation suppression device to be equal to a ratio between active and reactive power of power flowing between the first and second power grids, and controls the ratio between the active and reactive power output by the voltage-fluctuation suppression device to be equal to the ratio between the active and reactive power of power flowing between the first and second power grids.Type: GrantFiled: September 3, 2015Date of Patent: March 3, 2020Assignees: Kabushiki Kaisha Toshiba, Toshiba Energy Systems & Solutions CorporationInventors: Yukitaka Monden, Yuji Watanabe
-
Publication number: 20200067911Abstract: A method includes, for a first user having been authenticated on a first application with a first user identification (ID) using a first ID federation between the first application and a federation server, determining that the first user is authorized to access information of a second user on a second application based on the first user ID, the second user being associated with a second user ID, and sending a second authentication request for authenticating the first user to the second application with the second user ID using a second ID federation between the federation server and the second application.Type: ApplicationFiled: November 1, 2019Publication date: February 27, 2020Inventors: Miki Ishikawa, Yuji Watanabe
-
Publication number: 20200067910Abstract: At least one processor device is configured to receive a first authentication request for authenticating a first user, the first user having been authenticated on a first application with a first user identification (ID) using a first ID federation between the first application and a federation server, determine that the first user is authorized to access information of a second user on a second application based on the first user ID, the second user being associated with a second user ID, and send a second authentication request for authenticating the first user to the second application with the second user ID using a second ID federation between the federation server and the second application.Type: ApplicationFiled: November 1, 2019Publication date: February 27, 2020Inventors: Miki Ishikawa, Yuji Watanabe
-
Patent number: 10572320Abstract: In an approach to detection of co-location of container services, a method may include receiving, by a first program in a first cloud container on a first host, a bit string over a side channel within a trial period of time. The method may also include determining whether a key corresponding to the bit string matches a pre-determined key corresponding to a second program in a second cloud container. The method may further include determining whether the second cloud container is located on the first host based, at least in part, on whether the key corresponding to the bit string matches the pre-determined key. The side channel may include a first resource on the first host that is accessible by cloud containers located on the first host and the bit string is received by monitoring the first resource for activity indicative of bit values.Type: GrantFiled: December 1, 2017Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Alisa Arno, Yuji Watanabe, Ai Yoshino
-
Publication number: 20200057868Abstract: A system prevents divulgation of sensitive data in two snapshots, taken at different times, of one or more systems. The system identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes a difference with respect to each of the two snapshots. The system performs a pattern reducing process that removes, from the set, any file having, as the at least one difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The system performs a commonality reducing process that removes, from the set, any file having, as the at least one difference, a common difference between different system users. The system annotates data in remaining files in the set as potentially being sensitive data. The predetermined non-sensitive difference is determined using a Sandbox host. The common difference is determined using an actual one of the systems.Type: ApplicationFiled: October 25, 2019Publication date: February 20, 2020Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10552633Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: GrantFiled: March 23, 2017Date of Patent: February 4, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Patent number: 10540518Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method includes identifying a set of files from among a plurality of file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method includes performing a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method includes performing a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method includes annotating data in remaining files in the set of files as potentially being the sensitive data, subsequent to the reducing processes.Type: GrantFiled: November 9, 2017Date of Patent: January 21, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20190362100Abstract: A method is provided for preventing divulgation of sensitive data in two snapshots, taken at different times, of one or more same systems in a cloud environment. The method identifies a set of files from among file pairs. Each file pair is formed from a respective file that includes at least one difference with respect to each snapshot. The method performs a pattern reducing process that removes, from the set of files, any of the files having, as the difference, a predetermined non-sensitive difference between respective executions of a pre-determined system operation. The method performs a commonality reducing process that removes, from the set of files, any files having, as the difference, a common difference between different users. The method annotates data in remaining files in the set as potentially being the sensitive data, subsequent to the reducing processes. The two snapshots include at least one Sandbox-based image.Type: ApplicationFiled: August 13, 2019Publication date: November 28, 2019Inventors: Ai Ishida, Takuya Mishina, Yuji Watanabe
-
Publication number: 20190344473Abstract: A masking method for honeycomb formed body, including bonding a film on at least one bottom face of a honeycomb formed body in a quadrangular prism shape such that an adhesive surface is in contact with the bottom face. The step of bonding the film includes bonding of the film so as to have a bottom face covering portion that covers a whole surface of the bottom face and a pair of outer edge portions along one pair of opposite sides of a quadrangle defining an outer peripheral shape of the bottom face and a pair of protruding portions protruding from another pair of opposite sides of the quadrangle. At least a part of the adhesive surface of each of the pair of protruding portions is bonded so as to be in contact with a pair of opposing lateral faces of the honeycomb formed body.Type: ApplicationFiled: March 19, 2019Publication date: November 14, 2019Applicant: NGK INSULATORS, LTD.Inventors: Nobuhiro FUJIE, Yuji WATANABE, Ken ITADU, Yoshihiro SATO
-
Patent number: 10450914Abstract: The manufacturing method of the plugged honeycomb structure includes a honeycomb structure forming step of forming a pillar-shaped honeycomb structure, and a plugging step of forming plugging portions in end portions of the cells of the honeycomb structure formed in the honeycomb structure forming step, and in the plugging step, there is performed a press pouring operation of pressing one end face of the honeycomb structure into a plugging slurry stored in a bottomed tubular container to pour, under pressure, the plugging slurry into the cells of the honeycomb structure, and as the plugging slurry of the plugging step, there is used a slurry in which a yield point viscosity of a viscous fluidity is 600 Pa·s or more, a recovery viscosity is 300 Pa·s or more, and a high shearing viscosity is 200 Pa·s or less.Type: GrantFiled: March 16, 2017Date of Patent: October 22, 2019Assignee: NGK Insulators, Ltd.Inventors: Michio Suzuki, Kojiro Hayashi, Yuji Watanabe
-
Publication number: 20190299487Abstract: A bottom face processing method of a pillar-shaped honeycomb structure including steps of: preparing a pillar-shaped honeycomb structure including a plurality of first cells which extend in parallel with each other from a first bottom face to a second bottom face, and each of which is opened in the first bottom face and has a protruding plugged portion in the second bottom face, and a plurality of second cells each of which is adjacent to at least one of the first cells with a partition wall interposed therebetween, which extend in parallel with each other from the first bottom face to the second bottom face, and each of which has a protruding plugged portion in the first bottom face, and is opened in the second bottom face; and removing the protruding portion from the plugged portion of each of the first cells and the second cells of the pillar-shaped honeycomb structure.Type: ApplicationFiled: March 15, 2019Publication date: October 3, 2019Applicant: NGK INSULATORS, LTD.Inventors: Nobuhiro FUJIE, Yuji WATANABE, Ken ITADU, Yoshihiro SATO