Patents by Inventor Makoto Hamatsu

Makoto Hamatsu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8132262
    Abstract: An objective is to prevent a downloaded application from accessing data in an external memory unrelated to the application, and to achieve safer management of access to the external memory. An external memory function module 15 is a function module that controls access of an application downloaded in a cell phone 1, to an external memory 2. This external memory function module 15 has a bind ID acquirer 156 for acquiring a bind ID to specify the application downloaded, a discrimination ID acquirer 157 for acquiring a directory discrimination ID to specify an application permitted to access a directory, and an access controller 158 for checking the bind ID against the directory discrimination ID and for, when they coincide with each other, performing such control as to permit access of the application to the directory.
    Type: Grant
    Filed: September 13, 2006
    Date of Patent: March 6, 2012
    Assignee: NTT DoCoMo, Inc.
    Inventors: Mao Asai, Makoto Hamatsu, Tomoyuki Tamachika, Hirohito Taniguchi
  • Publication number: 20110122461
    Abstract: An image-forming apparatus includes: a memory that stores a plurality of image forming modes; a contact controller that controls a status of contact between a plurality of image-forming units and an intermediate transfer member on the basis of an image forming mode selected from among the plurality of image forming modes, so that an image-forming unit used for image forming represented in the selected image forming mode is contacted with the intermediate transfer member, and another image-forming unit is moved away from the intermediate transfer member; and an image-quality adjusting unit that adjusts, if the status of contact is changed by the contact controller, an image quality of an image that is to be transferred onto the intermediate transfer member from the image-forming unit that is in contact with the intermediate transfer member.
    Type: Application
    Filed: August 20, 2010
    Publication date: May 26, 2011
    Applicant: FUJI XEROX CO., LTD.
    Inventors: Satoshi TANAKA, Matsuyuki AOKI, Makoto HAMATSU, Gen NAKAJIMA, Yoshiki MATSUZAKI, Shun YASHIMA
  • Patent number: 7738854
    Abstract: An objective is to prevent an unauthorized application from falsifying and assuming specific information generated for access to an external memory, without permission, and to achieve safer management of access to the external memory. An external memory function module 15 is a function module to control access of applications 101A and 101B downloaded in a cell phone 1, to an external memory 2. This external memory function module 15 has an identifier acquirer 151 for acquiring an identifier from each of the applications 101A and 101B, a generator 153 for generating specific information to specify the application, based on identification information designated by the identifier acquired, a reserving section 154 for reserving a predetermined area of the external memory 2 as a directory for the application, and a writing section 155 for writing the specific information generated, in an attribute file of the external memory 2.
    Type: Grant
    Filed: September 13, 2006
    Date of Patent: June 15, 2010
    Assignee: NTT DoCoMo, Inc.
    Inventors: Mao Asai, Makoto Hamatsu, Tomoyuki Tamachika, Hirohito Taniguchi
  • Patent number: 7668335
    Abstract: It is an object of the present invention to provide a communication device, a digital signature verification method, and a digital signature generation method, in which the memory usage efficiency is improved without confidential information required for the verification or generation of a signature being easily leaked to the outside. The Java application judges whether signature verification is required for the received signature target data. When judging that signature verification is required, the Java application outputs the received signature target data to the PKI of the platform. The PKI verifies the signature that has been added to the data output by the Java application and performs signature generation, and then notifies the Java application.
    Type: Grant
    Filed: January 12, 2006
    Date of Patent: February 23, 2010
    Assignee: NTT DoCoMo, Inc.
    Inventors: Eiji Yano, Makoto Hamatsu, Mao Asai
  • Publication number: 20100030990
    Abstract: An objective is to prevent a downloaded application from accessing data in an external memory unrelated to the application, and to achieve safer management of access to the external memory. An external memory function module 15 is a function module that controls access of an application downloaded in a cell phone 1, to an external memory 2. This external memory function module 15 has a bind ID acquirer 156 for acquiring a bind ID to specify the application downloaded, a discrimination ID acquirer 157 for acquiring a directory discrimination ID to specify an application permitted to access a directory, and an access controller 158 for checking the bind ID against the directory discrimination ID and for, when they coincide with each other, performing such control as to permit access of the application to the directory.
    Type: Application
    Filed: September 13, 2006
    Publication date: February 4, 2010
    Applicant: NTT DoCoMo, Inc.
    Inventors: Mao Asai, Makoto Hamatsu, Tomoyuki Tamachika, Hirohito Taniguchi
  • Patent number: 7472123
    Abstract: Server device 60 stores contract identification information with UIM (Universal Identity Module) identification information for identifying a UIM 20 issued in accordance with a subscription contract between a subscriber and a communication carrier for services provided by the communication carrier, the contract identification information identifying the subscription contract. The UIM 20 stores UIM identification information. After receiving the UIM identification information from the mobile station 30, which obtained the UIM identification information from UIM 20, server device 60 transmits the contract identification information corresponding to the UIM identification information to the mobile station 30. Then the contract identification information is stored in UIM 20. Consequently, the present invention allows a communication apparatus to distinguish a user who attempts to use the communication apparatus.
    Type: Grant
    Filed: February 27, 2003
    Date of Patent: December 30, 2008
    Assignee: NTT DoCoMo, Inc.
    Inventor: Makoto Hamatsu
  • Patent number: 7346337
    Abstract: Mobile terminal receives from a server a content, a sending time information which indicates the time of sending the content, and a time restriction information that indicates the time period when the content can be used. Mobile terminal correlates the content with the sending time information and the time restriction information, and stores them. Mobile terminal calculates the difference between the time of receiving the content and the sending time information. Mobile terminal correlates the difference with the content and stores them. Mobile terminal adds the difference to the current time kept by time keeping unit to obtain a usage determination reference time. Mobile terminal compares the usage determination reference time with the time restriction information to determine whether the mobile terminal can use the content or not.
    Type: Grant
    Filed: June 2, 2003
    Date of Patent: March 18, 2008
    Assignee: NTT DoCoMo, Inc.
    Inventors: Makoto Hamatsu, Kazuya Anzawa, Riko Nagai
  • Publication number: 20070060116
    Abstract: An objective is to prevent an unauthorized application from falsifying and assuming specific information generated for access to an external memory, without permission, and to achieve safer management of access to the external memory. An external memory function module 15 is a function module to control access of applications 101A and 101B downloaded in a cell phone 1, to an external memory 2. This external memory function module 15 has an identifier acquirer 151 for acquiring an identifier from each of the applications 101A and 101B, a generator 153 for generating specific information to specify the application, based on identification information designated by the identifier acquired, a reserving section 154 for reserving a predetermined area of the external memory 2 as a directory for the application, and a writing section 155 for writing the specific information generated, in an attribute file of the external memory 2.
    Type: Application
    Filed: September 13, 2006
    Publication date: March 15, 2007
    Applicant: NTT DoCoMo, Inc
    Inventors: Mao Asai, Makoto Hamatsu, Tomoyuki Tamachika, Hirohito Taniguchi
  • Publication number: 20060177111
    Abstract: It is an object of the present invention to provide a communication device, a digital signature verification method, and a digital signature generation method, in which the memory usage efficiency is improved without confidential information required for the verification or generation of a signature being easily leaked to the outside. The Java application judges whether signature verification is required for the received signature target data. When judging that signature verification is required, the Java application outputs the received signature target data to the PKI of the platform. The PKI verifies the signature that has been added to the data output by the Java application and performs signature generation, and then notifies the Java application.
    Type: Application
    Filed: January 12, 2006
    Publication date: August 10, 2006
    Applicant: NTT DoCoMo, Inc.
    Inventors: Eiji Yano, Makoto Hamatsu, Mao Asai
  • Publication number: 20050165711
    Abstract: Server device 60 stores contract identification information with UIM identification information for identifying UIM 20 issued based on a subscription contract between a subscriber and a communication carrier for services provided by the communication carrier, the contract identification information identifying the subscription contract. UIM 20 stores UIM identification information. After receiving the UIM identification information from mobile station 30 which obtained the UIM identification information from UIM 20, server device 60 transmits the contract identification information corresponding to the UIM identification information to the mobile station 30. Then the contract identification information is stored in UIM 20. Consequently, the present invention allows a communication apparatus to distinguish the user who attempts to use the communication apparatus.
    Type: Application
    Filed: February 27, 2003
    Publication date: July 28, 2005
    Inventor: Makoto Hamatsu
  • Publication number: 20040029536
    Abstract: Mobile terminal receives from a server a content, a sending time information which indicates the time of sending the content, and a time restriction information that indicates the time period when the content can be used. Mobile terminal correlates the content with the sending time information and the time restriction information, and stores them. Mobile terminal calculates the difference between the time of receiving the content and the sending time information. Mobile terminal correlates the difference with the content and stores them. Mobile terminal adds the difference to the current time kept by time keeping unit to obtain a usage determination reference time. Mobile terminal compares the usage determination reference time with the time restriction information to determine whether the mobile terminal can use the content or not.
    Type: Application
    Filed: June 2, 2003
    Publication date: February 12, 2004
    Inventors: Makoto Hamatsu, Kazuya Anzawa, Riko Nagai