Ohkado
Akira Ohkado, Kanagawa JP
Patent application number | Description | Published |
---|---|---|
20110106951 | Dividing cloud computing service into individual jobs such that legal auditing requirements are satisfied and presenting plan for distributed execution of individual jobs - A computer network connects to a first computer, a second computer, other multiple computers, and a job category database A service to be executed by any of the other multiple computers is divided into multiple jobs; the job category is associated with each of the divided jobs; a region code and an instruction to execute the service are received from the first computer; and for each of the multiple jobs, the job category database is searched with the received region code and the associated job category as keys to acquire the operation identifier list corresponding to the job; the operation identifier list is transmitted to at least one of the other multiple computers; and a combination of the job, the identifier of that other computer and the identifier list are transmitted to the first computer. | 05-05-2011 |
20110219437 | AUTHENTICATION INFORMATION CHANGE FACILITY - A system, method, and computer program product are provided to facilitate changing authentication information in an environment having two or more configuration items. Establishing a connection between the configuration items may require matching authentication information corresponding to the first configuration item with authentication information transmitted from the second configuration item. The system may include a repository storing at least one predetermined attribute corresponding to a configuration item, and a relation between the configuration item and another configuration item. The attribute and/or the relation may be updated by discovery that detects information regarding configuration items. In response to a request to change authentication information corresponding to the first configuration item, and based on the relation, an identification unit may identify a second configuration item influenced by the change. An instruction unit may initiate a change of authentication information transmitted from the second configuration item. | 09-08-2011 |
20120254951 | PROVIDING PROTECTION AGAINST UNAUTHORIZED NETWORK ACCESS - A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation. | 10-04-2012 |
20120297452 | PROVIDING PROTECTION AGAINST UNAUTHORIZED NETWORK ACCESS - A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation. | 11-22-2012 |
Akira Ohkado, Tokyo JP
Patent application number | Description | Published |
---|---|---|
20140304840 | Deleting Information to Maintain Security Level - A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file. | 10-09-2014 |
Akira Ohkado, Shimotsuruma Kanagawa JP
Patent application number | Description | Published |
---|---|---|
20100115520 | COMPUTER SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MANAGING BATCH JOB - A computer system for managing batch jobs is described. The computer system includes a storage unit for storing at least one job template, and an execution unit for creating or updating a job net definition following a condition defined in the at least one job template, creating or updating a job net, or executing a discovery of a job conflict using at least one attribute or relationship in a set of data including at least one predetermined attribute of an configuration item, and a relationship between the configuration item and another configuration item, the set of data being stored in a repository and updatable through a discovery for detecting information about a configuration item. The present invention further provides a method and computer program product for managing batch jobs. | 05-06-2010 |
Akira Ohkado, Kanaga JP
Patent application number | Description | Published |
---|---|---|
20090287936 | MANAGING PASSWORDS USED WHEN DETECTING INFORMATION ON CONFIGURATION ITEMS DISPOSED ON A NETWORK - Disclosed embodiments include a computer system for receiving an encrypted password from an ID management system. The computer system sends the encrypted password to a decryption system, where the decryption system decrypts the encrypted password. The decrypted password is then transmitted to the computer system, and the computer system transfers the decrypted password to a configuration item disposed on a network. Based on the password, the configuration item sends data concerning the configuration item to the computer system. | 11-19-2009 |
20120144466 | MANAGING PASSWORDS USED WHEN DETECTING INFORMATION ON CONFIGURATION ITEMS DISPOSED ON A NETWORK - Disclosed embodiments include a method for receiving, at a configuration information server, an encrypted password associated with a configuration item, where the encrypted password is encrypted using an encryption key. The method further includes encrypting a decrypted password to generate a reencrypted password, where the decrypted password is derived from the encrypted password. The method further includes transmitting the reenrypted password to the configuration item and removing the decrypted password from the configuration information collection server. | 06-07-2012 |
Akira Ohkado, Kanawaga JP
Patent application number | Description | Published |
---|---|---|
20110131309 | DYNAMIC SERVICE LEVEL AGREEMENT FOR CLOUD COMPUTING SERVICES - A method for dynamically updating a service level agreement, performed by a cloud computing server, includes storing a preference for service selection, acquiring an actual usage level of a first service provided to a user during a predetermined time period in accordance with a first service level agreement, determining a second service level agreement different from the first service level agreement based on the actual usage level acquired during the predetermined time period, and selecting a second service that satisfies the second service level agreement. | 06-02-2011 |
Akira Ohkado, Yamato-Shi JP
Patent application number | Description | Published |
---|---|---|
20120072318 | Mechanisms for Executing a Process in a Cloud Computing Environment - Deterioration of service quality due to shortage of resources and/or increased cost of support due to excessive resources is minimized in the case where the amount of requested services may change in cloud computing. Provided are mechanisms for executing a process specified by a user in a cloud computing environment and charging the user for the process. The mechanisms include a receiving part for receiving an instruction to execute the specified process and a determining part for determining an external resource to provision from a first other computer system for a charge. The mechanisms further comprise an external resource securing part for securing the external resource on the first other computer system and an executing part for causing the external resource to execute at least a part of the specified process. | 03-22-2012 |
Akira Ohkado, Yamato JP
Patent application number | Description | Published |
---|---|---|
20120095797 | Method of Managing Access Right, and System and Computer Program for the Same - A method of managing an access right to at least one asset associated with at least one digital work order, to at least one first element associated with the at least one asset, or to at least one second element associated with an access path to the at least one asset or the first element, and relates to a system and a computer program for the same. | 04-19-2012 |
20120095926 | Method of Managing Asset Associated with Work Order or Element Associated with Asset, and System and Computer Program for the Same - A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring. | 04-19-2012 |
20120209411 | Abnormality Detection for Isolating a Control System - A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation. | 08-16-2012 |
20120210158 | Anomaly Detection to Implement Security Protection of a Control System - An anomaly detection mechanism is provided that detects an anomaly in a control network, and includes an identifying unit to receive event information on an event that occurs, and to identify a group including a resource related to the event information by referring to a configuration management database for retaining dependence relationships between processes and resources including a control system; a policy storing unit to store one or more policies each of which associates one or more actions with a condition defining a situation suspected to have an anomaly; an adding unit to acquire group-related information needed for application to the one or more policies, and to add the acquired information to the event information; and a determining unit to apply the event information to the one or more policies and to determine the one or more actions associated with the matched condition as one or more actions to be taken. | 08-16-2012 |
20120296685 | Method of Managing Access Right, and System for Computer Program for the Same - A method of managing an access right to at least one asset associated with at least one digital work order, to at least one first element associated with the at least one asset, or to at least one second element associated with an access path to the at least one asset or the first element, and relates to a system and a computer program for the same. | 11-22-2012 |
20120297445 | Method of Managing Asset Associated with Work Order or Element Associated with Asset, and System and Computer Program for the Same - A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring. | 11-22-2012 |
20130150985 | Abnormality Detection for Isolating a Control System - A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation. | 06-13-2013 |
20130152198 | Anomaly Detection To Implement Security Protection of a Control System - An anomaly detection mechanism is provided that detects an anomaly in a control network, and includes an identifying unit to receive event information on an event that occurs, and to identify a group including a resource related to the event information by referring to a configuration management database for retaining dependence relationships between processes and resources including a control system; a policy storing unit to store one or more policies each of which associates one or more actions with a condition defining a situation suspected to have an anomaly; an adding unit to acquire group-related information needed for application to the one or more policies, and to add the acquired information to the event information; and a determining unit to apply the event information to the one or more policies and to determine the one or more actions associated with the matched condition as one or more actions to be taken. | 06-13-2013 |
Akira Ohkado, Yokohama JP
Patent application number | Description | Published |
---|---|---|
20150294109 | Generating or Changing Passwords Using a Degree of Simplicity - A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity. | 10-15-2015 |
Makoto Ohkado, Nisshin-Shi Aichi-Ken JP
Patent application number | Description | Published |
---|---|---|
20130038484 | OBSTACLE DETECTION DEVICE - An obstacle detection device includes; a primary device that determines the presence or absence of the target object on the basis of a comparison between the transmitted wave and the reception wave; a storage device that, when it is determined that the object is present, acquires a reception power of the reception wave at a control period determined beforehand, and stores the reception power as reception power time series data; a secondary device that determines whether a value relating to a time series change pattern of the data falls within a predetermined range set beforehand on the basis of phase interference, of the reception wave, that depends on a height of the object from a road; and a output device that determines the object to be an obstacle and outputs a result of this determination, when it is determined that the value relating to the pattern falls within the range. | 02-14-2013 |
Makoto Ohkado, Nisshin-Shi JP
Patent application number | Description | Published |
---|---|---|
20130082868 | RADAR SYSTEM AND DETECTION METHOD - A radar system includes an arithmetic processing unit, which calculates the second derivative of the intensity of a reflected wave and determines whether a target is an upper structure or a vehicle, based on the second derivative. Alternatively, the arithmetic processing unit decomposes the waveform of the intensity of the reflected wave into frequency components and determines whether the target is an upper structure or a vehicle, based on the intensity of a predetermined frequency component. | 04-04-2013 |
20130088379 | RADAR SYSTEM AND DETECTION METHOD - A radar system includes an arithmetic processing unit, which sends a warning command to a warning device when a local minimum point of the intensity of the reflected wave from a target within a predetermined detection range is detected. By determining whether it is necessary to send a warning command based on whether there is a local minimum point of the intensity within the detection range, it is made possible to determine whether it is necessary to send a warning command more quickly as compared to the conventional system. | 04-11-2013 |
Masaru Ohkado, Okazaki-Shi JP
Patent application number | Description | Published |
---|---|---|
20150121767 | INVERTER COVER - An inverter cover for covering an inverter provided in a front space which is formed in front of a vehicle room in a longitudinal direction of the vehicle, by partitioning the vehicle room with a vehicle body panel, includes: a body part for covering an upper face of the inverter; and an extended part extended rearward from the body part so as to be positioned between a connecting part which is provided in a rear part of the inverter and to which a harness is connected, and an edge part which is protruded frontward from the vehicle body panel. | 05-07-2015 |
Michihito Ohkado, Wako-Shi JP
Patent application number | Description | Published |
---|---|---|
20150060611 | CHARGING CABLE SUPPORT ARM - A charging cable support arm includes a support member | 03-05-2015 |
Toshio Ohkado, Himeji-Shi JP
Patent application number | Description | Published |
---|---|---|
20140014287 | MOLD - A mold includes a first groove part and a second groove part. The first groove part extends with a constant length or a constant width from a center part to an outer circumferential part of the mold. The second groove part extends from a terminal end of the first groove part on an outer circumferential part side of the first groove part and merging with any portion of the first groove part. | 01-16-2014 |
Toshio Ohkado, Hyogo JP
Patent application number | Description | Published |
---|---|---|
20110088863 | MOLD AND MOLDING MANUFACTURING METHOD - A mold includes a first groove part and a second groove part. The first groove part extends with a constant length or a constant width from a center part to an outer circumferential part of the mold. The second groove part extends from a terminal end of the first groove part on an outer circumferential part side of the first groove and merges with any portion of the first groove part. A molding manufacturing method includes manufacturing a preform by semimolten die casting or semisolid die casting using the mold. The method may also include removing a portion of the preform corresponding to the second groove part. | 04-21-2011 |
20110100581 | SEMIMOLTEN OR SEMI SOLID MOLDING MEHTOD AND MOLDING APPARATUS - A molded article includes a flat plate portion and a projected portion. A molding method includes filling a cavity with the semimolten or semisolid metal in plate thickness directions of the flat plate portion starting from a surface on an opposite side of the flat plate portion from the surface from which the projected portion projects. The cavity is a casting space of the molded article formed inside a forming mold. A molding apparatus for casting the molded article includes a forming mold having the cavity, and a separate insert or slide mold disposed between the cavity and a runner in order to form the runner in plate thickness directions of the flat plate portion starting from the other surface. The runner is used to fill the cavity. | 05-05-2011 |
20120003115 | PROCESS FOR PRODUCTION OF SEMISOLIDIFIED SLURRY OF IRON-BASE ALLOY; PROCESS FOR PRODUCTION OF CAST IRON CASTINGS BY USING THE PROCESS, AND CAST IRON CASTINGS - A process for the production of a semi-solidified iron alloy slurry having a crystallized solid phase and a residual liquid phase, wherein a material having a hypoeutectic cast iron composition is used, and an additive agent having a boiling point that is lower than at least a crystallization initiation temperature of primary crystals of the material is added to a melt of the material when the melt temperature is within a specific temperature range of not lower than the crystallization initiation temperature of the primary crystals and not greater than a temperature that is 50° C. higher than the crystallization initiation temperature, to thereby simultaneously conduct the stirring of the melt by the boiling of the additive agent and the cooling of the melt to a temperature falling within a semi-solidification temperature range thereof. | 01-05-2012 |