Patents by Inventor Masami Tada
Masami Tada has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180239922Abstract: Embodiments of the present invention disclose a method, computer system, and a computer program product for routing an image file from an imaging device to a storage device via a near-field communication network. The present invention may include receiving a device search signal from the storage device. The present invention may include sending a search signal response to the storage device. The present invention may include receiving an encrypted password from the storage device. The present invention may include decrypting the received encrypted password. The present invention may include setting the imaging device to an exclusive external storage mode. The present invention may include generating an image file using a sensor. The present invention may include encrypting the image file using the decrypted password. The present invention may include sending the encrypted image file to the storage device for storage.Type: ApplicationFiled: December 26, 2017Publication date: August 23, 2018Inventors: Sanehiro Furuichi, Masami Tada
-
Patent number: 10057768Abstract: Embodiments of the present invention disclose a method, computer system, and a computer program product for routing an image file from an imaging device to a storage device via a near-field communication network. The present invention may include receiving a device search signal from the storage device. The present invention may include sending a search signal response to the storage device. The present invention may include receiving an encrypted password from the storage device. The present invention may include decrypting the received encrypted password. The present invention may include setting the imaging device to an exclusive external storage mode. The present invention may include generating an image file using a sensor. The present invention may include encrypting the image file using the decrypted password. The present invention may include sending the encrypted image file to the storage device for storage.Type: GrantFiled: December 26, 2017Date of Patent: August 21, 2018Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Masami Tada
-
Publication number: 20180211522Abstract: Verifying shared event information is provided. Communication with a nearby mobile or immobile apparatus is established to generate an event existence proof in response to encountering the nearby mobile or immobile apparatus. Existence of an incident event is verified in response to arriving at a geographic location of the incident event. A verified incident event is published to add to an incident event distributed ledger for managing incident event information corresponding to the incident event.Type: ApplicationFiled: January 24, 2017Publication date: July 26, 2018Inventors: Sanehiro Furuichi, Norie Iwasaki, Masami Tada, Takahito Tashiro
-
Publication number: 20180211524Abstract: Verifying shared event information is provided. Communication with a nearby mobile or immobile apparatus is established to generate an event existence proof in response to encountering the nearby mobile or immobile apparatus. Existence of an incident event is verified in response to arriving at a geographic location of the incident event. A verified incident event is published to add to an incident event distributed ledger for managing incident event information corresponding to the incident event.Type: ApplicationFiled: November 15, 2017Publication date: July 26, 2018Inventors: Sanehiro Furuichi, Norie Iwasaki, Masami Tada, Takahito Tashiro
-
Patent number: 10033695Abstract: A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further include collecting data associated with the devices based on the data requests. Additionally, the method may include identifying applications for receiving the collected data. The method may also include generating datasets based on the collected data and the identified applications, wherein the datasets include collected data that is combined based on a commonality for transmission to one or more common applications. The method may further include generating passwords for the datasets. The method may also include encrypting the passwords. The method may further include generating data blocks, including a dataset, the generated and encrypted passwords, and UUIDs for each application. The method may also include transmitting the data blocks to the identified applications.Type: GrantFiled: December 4, 2017Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Masami Tada, Takahito Tashiro
-
Patent number: 9996556Abstract: A computer-implemented method includes receiving an image. The image includes one or more objects and one or more text portions. The computer-implemented method further includes identifying the one or more objects. The computer-implemented method further includes, for each of the one or more objects identified, extracting an object tag. The computer-implemented method further includes, for each of the one or more text portions, extracting a text tag. The computer-implemented method further includes, for each text tag, determining whether the text tag describes any of the one or more objects based on the object tag extracted from each object to yield a determination. The computer-implemented method further includes, responsive to the determination: performing an image process to that of the one or more objects, and performing a text process to that of the one or more text portions. A corresponding computer program product and computer system are also disclosed.Type: GrantFiled: June 7, 2017Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Tomohiro Shioya, Masami Tada, Shoichiro Watanabe
-
Patent number: 9984100Abstract: A computer-implemented method includes receiving an image. The image includes one or more objects and one or more text portions. The computer-implemented method further includes identifying the one or more objects. The computer-implemented method further includes, for each of the one or more objects identified, extracting an object tag. The computer-implemented method further includes, for each of the one or more text portions, extracting a text tag. The computer-implemented method further includes, for each text tag, determining whether the text tag describes any of the one or more objects based on the object tag extracted from each object to yield a determination. The computer-implemented method further includes, responsive to the determination: performing an image process to that of the one or more objects, and performing a text process to that of the one or more text portions. A corresponding computer program product and computer system are also disclosed.Type: GrantFiled: September 29, 2015Date of Patent: May 29, 2018Assignee: International Business Machines CorporationInventors: Tomohiro Shioya, Masami Tada, Shoichiro Watanabe
-
Publication number: 20180128626Abstract: A request for a route guide to a destination in a building is received from a user terminal device. BIM data for the building is received, including material properties of the building elements, the material properties consisting of ease of slipping when wet, earthquake resistance, and flame retardancy base values. Security information for a route, real-time information for building status, and a user profile are received. A route guide to the destination in the building is created, based the BIM data, security information, real-time building status, and the user profile. Information from one or more environmental sensors is received indicating that an environmental event has been detected. Its current position is received from the user terminal device. The route guide from the user terminal device's current position is updated based on the environmental event, and the material properties of the building elements that are related to the environmental event.Type: ApplicationFiled: December 18, 2017Publication date: May 10, 2018Inventors: Yasutaka Nishimura, Masami Tada, Akihiko Takajo, Takahito Tashiro
-
Patent number: 9940442Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: GrantFiled: October 21, 2015Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Patent number: 9939274Abstract: Providing a route guide to a destination using building information modeling (BIM) data. A request from a user for a route guide to a destination in a building is received. BIM data for the building, security information for a route, and a user profile of the user that requested the route guide to the destination is received. A route guide to the destination in the building is created, based at least on the BIM data, security information, and the user profile. Creating the route guide may be further based on use restriction information, including time, weight, operation, impassable information, information related to the method of using the facility equipment, or precaution information when using the facility equipment. The route guide may include a method of using the facility equipment in the building, a method of operating, a direction of operation, a method of unlocking or locking, or precaution information.Type: GrantFiled: February 13, 2014Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Yasutaka Nishimura, Masami Tada, Akihiko Takajo, Takahito Tashiro
-
Patent number: 9940443Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: GrantFiled: December 1, 2016Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Publication number: 20180091477Abstract: A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further include collecting data associated with the devices based on the data requests. Additionally, the method may include identifying applications for receiving the collected data. The method may also include generating datasets based on the collected data and the identified applications, wherein the datasets include collected data that is combined based on a commonality for transmission to one or more common applications. The method may further include generating passwords for the datasets. The method may also include encrypting the passwords. The method may further include generating data blocks, including a dataset, the generated and encrypted passwords, and UUIDs for each application. The method may also include transmitting the data blocks to the identified applications.Type: ApplicationFiled: December 4, 2017Publication date: March 29, 2018Inventors: Sanehiro Furuichi, Masami Tada, Takahito Tashiro
-
Publication number: 20180091475Abstract: A method for reducing data transfer connections is provided. The method may include receiving data requests associated with devices. The method may further include collecting data associated with the devices based on the data requests. Additionally, the method may include identifying applications for receiving the collected data. The method may also include generating datasets based on the collected data and the identified applications, wherein the datasets include collected data that is combined based on a commonality for transmission to one or more common applications. The method may further include generating passwords for the datasets. The method may also include encrypting the passwords. The method may further include generating data blocks, including a dataset, the generated and encrypted passwords, and UUIDs for each application. The method may also include transmitting the data blocks to the identified applications.Type: ApplicationFiled: September 27, 2016Publication date: March 29, 2018Inventors: Sanehiro Furuichi, Masami Tada, Takahito Tashiro
-
Patent number: 9928489Abstract: When a split amount decided by a representative splitting, in a representative terminal, a total amount transmitted from a store terminal is notified from each member terminal to a credit company server as a payment amount, the credit company server holds information for payment settlement, and transmits payment permission information including encrypted information generated by encrypting the information for payment settlement, to each member terminal. Each member terminal transmits payment permission information of the same contents as the payment permission information to the representative terminal. The representative terminal transmits payment permission information obtained by concatenating the payment permission information, to the store terminal.Type: GrantFiled: November 25, 2013Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Yoriko Ohnishi, Masami Tada
-
Publication number: 20170270142Abstract: A computer-implemented method includes receiving an image. The image includes one or more objects and one or more text portions. The computer-implemented method further includes identifying the one or more objects. The computer-implemented method further includes, for each of the one or more objects identified, extracting an object tag. The computer-implemented method further includes, for each of the one or more text portions, extracting a text tag. The computer-implemented method further includes, for each text tag, determining whether the text tag describes any of the one or more objects based on the object tag extracted from each object to yield a determination. The computer-implemented method further includes, responsive to the determination: performing an image process to that of the one or more objects, and performing a text process to that of the one or more text portions. A corresponding computer program product and computer system are also disclosed.Type: ApplicationFiled: June 7, 2017Publication date: September 21, 2017Inventors: Tomohiro Shioya, Masami Tada, Shoichiro Watanabe
-
Publication number: 20170164198Abstract: A virtual machine (VM) server may be used to enforce a set of security criteria upon a remote client device. The VM server may be configured to host a VM that has features that can be utilized by a user at the remote client device. The VM server may receive sensor data collected by one or more sensors of a remote sensor device. The VM server may identify that the sensor data satisfies at least a portion of the set of security criteria. The VM server may further identify that the remote client device is within a predetermined proximity of the remote sensor device. The VM server may further enable a user at the remote client device to utilize the features of the VM hosted on the VM server.Type: ApplicationFiled: December 7, 2015Publication date: June 8, 2017Inventors: Sanehiro Furuichi, Masami Tada, Takahito Tashiro
-
Publication number: 20170161272Abstract: A computer identifies social media displayed by a social media platform. The computer determines that a user has viewed the social media and saves the viewed social media in associated with the view date/time. The computer identifies and saves the interests associated with the user at the date/time the social media post was viewed by referencing the user profile and recent social media activity of both the user and associated users. The computer receives a social media query and cluster period from the user in regards to a previously viewed social media post. The computer displays the viewed social media that matches the search query as well as the interests associated with the user during each cluster period in which a matching social media post was viewed.Type: ApplicationFiled: December 8, 2015Publication date: June 8, 2017Inventors: Masami Tada, Shoichiro Watanabe
-
Publication number: 20170091224Abstract: A computer-implemented method includes receiving an image. The image includes one or more objects and one or more text portions. The computer-implemented method further includes identifying the one or more objects. The computer-implemented method further includes, for each of the one or more objects identified, extracting an object tag. The computer-implemented method further includes, for each of the one or more text portions, extracting a text tag. The computer-implemented method further includes, for each text tag, determining whether the text tag describes any of the one or more objects based on the object tag extracted from each object to yield a determination. The computer-implemented method further includes, responsive to the determination: performing an image process to that of the one or more objects, and performing a text process to that of the one or more text portions. A corresponding computer program product and computer system are also disclosed.Type: ApplicationFiled: September 29, 2015Publication date: March 30, 2017Inventors: Tomohiro Shioya, Masami Tada, Shoichiro Watanabe
-
Patent number: 9607179Abstract: A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section.Type: GrantFiled: May 7, 2015Date of Patent: March 28, 2017Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Publication number: 20170083689Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: ApplicationFiled: December 1, 2016Publication date: March 23, 2017Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki