Patents by Inventor Masana Murase

Masana Murase has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10825013
    Abstract: Methods and arrangements for processing face-to-face mobile phone transactions. An agreed-upon price for a product is accepted from a buyer mobile phone and a seller mobile phone. Distinct random numbers are assigned to each of the buyer and seller mobile phones. The random number assigned to the seller mobile phone is received from the buyer mobile phone, and the random number assigned to the buyer mobile phone is received from the seller mobile phone. A match is ascertained between the buyer and seller mobile phones based on receipt from the buyer mobile phone the random number assigned to the seller mobile phone and receipt from the seller mobile phone the random number assigned to the buyer mobile phone.
    Type: Grant
    Filed: November 17, 2010
    Date of Patent: November 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Toru Aihara, Shivkumar Kalyanaraman, Noboru Kamijo, Koichi Kamijo, Kiran Appasaheb Kate, Alwyn R. Lobo, Masana Murase
  • Patent number: 9798696
    Abstract: Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on.
    Type: Grant
    Filed: November 23, 2012
    Date of Patent: October 24, 2017
    Assignee: International Business Machines Corporation
    Inventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
  • Patent number: 9794138
    Abstract: Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on.
    Type: Grant
    Filed: April 21, 2011
    Date of Patent: October 17, 2017
    Assignee: International Business Machines Corporation
    Inventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
  • Publication number: 20170194040
    Abstract: A memory having stacked memory modules in which heat generated during memory read/write operations can be effectively dissipated, thus avoiding an undesirable localized temperature rise. The storage device is provided with a plurality of stacked memory modules. When a data write request is received, a data processing device that fulfills the role of a memory controller sequentially selects a memory module that is to be a write destination in such a manner that memory modules to which data is written simultaneously are not adjacent to each other, and in a series of write sequences, the memory module to which data is to be written at a subsequent write timing is not adjacent to the memory module to which data is written at a preceding write timing. As a result, the locations of heat generation among the plurality of stacked memory modules are distributed, reducing a rise in temperature.
    Type: Application
    Filed: November 11, 2014
    Publication date: July 6, 2017
    Applicant: FIXSTARS CORPORATION
    Inventors: Satoshi Yoneya, Ryoji Tsuchiyama, Masana Murase, Noriyuki Futatsugi
  • Patent number: 9141732
    Abstract: A technique for increasing the speed of parallel running of logical processes without sacrificing the accuracy of data update timing in a parallel discrete event simulation system. A logical process involving a longer receiving time lag than that of sending is executed by an amount of initial shift for a predetermined period before the simulation. The initial shift is set to be one-half of a value of difference between the receiving time lag and the sending time lag. The logical process executed with timing displaced by the amount of initial shift runs by exchanging null messages with each other. Each null message is delivered to a correspondent logical process after the predetermined time lag, and each logical process further sends the correspondent logical process a null message upon receipt of the null message. Thus, there is a progression of simulation by synchronizing them through the null messages.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: September 22, 2015
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Shu Shimizu, Gang Zhang
  • Patent number: 8881298
    Abstract: A server apparatus includes: an output detector for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shared area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data. The client apparatus includes: a reading detection section for detecting reading-processing which is processing of reading data from the shared area; and a reading control section which reads the instruction information from the shared area in response to the detection of the reading-processing, and which acquires the output data by the acquisition method specified by the instruction information.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: November 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Yuriko Sawatani, Masana Murase, Taskuku Otani
  • Patent number: 8683199
    Abstract: Whenever a drawing command is executed, a computer system having a graphic user interface such as a multi-window system determines, from the logical operation pattern of the drawing command, what kind of information is inherited by a drawing result from the drawing command, preferably without performing a complicated step such as an image process. At the same time, the computer system controls information flow of an image outputted to a screen by managing labeled area maps which correspond one to one to images on the screen and in a memory.
    Type: Grant
    Filed: July 18, 2008
    Date of Patent: March 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Masana Murase
  • Publication number: 20140040908
    Abstract: A system processing an application in a hybrid system includes a database comprising a plurality of libraries, each library comprising sub-program components, wherein two or more of the components are combined by an end user into a stream flow defining an application. The system also includes a plurality of resources configured to process the stream flow, architecture of at least one of the plurality of resources being different from architecture of another of the plurality of resources. The system also includes a compiler configured to generate a resource assignment assigning the plurality of resources to the two or more of the components in the stream flow, at least two of the two or more of the components in the stream flow sharing at least one of the plurality of resources according to the resource assignment.
    Type: Application
    Filed: August 8, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Munehiro Doi, Kumiko Maeda, Masana Murase
  • Publication number: 20140040907
    Abstract: A system processing an application in a hybrid system includes a database comprising a plurality of libraries, each library comprising sub-program components, wherein two or more of the components are combined by an end user into a stream flow defining an application. The system also includes a plurality of resources configured to process the stream flow, architecture of at least one of the plurality of resources being different from architecture of another of the plurality of resources. The system also includes a compiler configured to generate a resource assignment assigning the plurality of resources to the two or more of the components in the stream flow, at least two of the two or more of the components in the stream flow sharing at least one of the plurality of resources according to the resource assignment.
    Type: Application
    Filed: August 1, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Munehiro Doi, Kumiko Maeda, Masana Murase
  • Publication number: 20130103829
    Abstract: Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on.
    Type: Application
    Filed: April 21, 2011
    Publication date: April 25, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
  • Patent number: 8422674
    Abstract: A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 8380937
    Abstract: A system including a server apparatus executes an application program and a client apparatus enabling a user to utilize the application program by communicating with the server apparatus based on an instruction of the user. The server apparatus includes: an output detection section for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shares area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data.
    Type: Grant
    Filed: November 28, 2006
    Date of Patent: February 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Yuriko Kanai, Masana Murase, Tasuku Otani
  • Publication number: 20130031354
    Abstract: A server apparatus includes: an output detector for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shared area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data. The client apparatus includes: a reading detection section for detecting reading-processing which is processing of reading data from the shared area; and a reading control section which reads the instruction information from the shared area in response to the detection of the reading-processing, and which acquires the output data by the acquisition method specified by the instruction information.
    Type: Application
    Filed: September 13, 2012
    Publication date: January 31, 2013
    Applicant: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Yuriko Sawatani, Masana Murase, Tasuku Otani
  • Patent number: 8332636
    Abstract: A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for users to execute software from independent software developers, an administrative user may disable the above-described vendor key-checking as an option.
    Type: Grant
    Filed: October 2, 2007
    Date of Patent: December 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 8245054
    Abstract: An information processing apparatus includes a storage device having an access-restricted area accessible if the password is properly authenticated and an access-unrestricted area accessible regardless of whether or not the password is authenticated. The information processing apparatus allows a password to be registered in a registration server beforehand, prompts a user to enter the password when accessing the access-restricted area and, if the password is not entered, reads from the access-unrestricted area a password retrieval program for retrieving the password from the registration server, activates and executes the password retrieval program to retrieve the password from the registration server, and causes the storage device to authenticate the retrieved password to place the access-restricted area in an accessible state.
    Type: Grant
    Filed: August 26, 2005
    Date of Patent: August 14, 2012
    Assignee: Lenovo (Singapore) Pte., Ltd.
    Inventors: Hassan Hajji, Seiichi Kawano, Masana Murase, Susumu Shimetono
  • Publication number: 20120123887
    Abstract: Methods and arrangements for processing face-to-face mobile phone transactions. An agreed-upon price for a product is accepted from a buyer mobile phone and a seller mobile phone. Distinct random numbers are assigned to each of the buyer and seller mobile phones. The random number assigned to the seller mobile phone is received from the buyer mobile phone, and the random number assigned to the buyer mobile phone is received from the seller mobile phone. A match is ascertained between the buyer and seller mobile phones based on receipt from the buyer mobile phone the random number assigned to the seller mobile phone and receipt from the seller mobile phone the random number assigned to the buyer mobile phone.
    Type: Application
    Filed: November 17, 2010
    Publication date: May 17, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Toru Aihara, Shivkumar Kalyanaraman, Noboru Kamijo, Koichi Kamijo, Kiran Appasaheb Kate, Alwyn R. Lobo, Masana Murase
  • Patent number: 8166304
    Abstract: A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for independent developers to develop software for the herein-described platform, a “global key pair” is provided in which both the public and private keys of the pair are publicly known, so that anyone may sign an application with the global key. Such an application may be allowed to execute by including the global key pair's public key in the key ring as a “vendor key” or, conversely, it may be disallowed by excluding the global public key from the key ring.
    Type: Grant
    Filed: October 2, 2007
    Date of Patent: April 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 8010804
    Abstract: A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: August 30, 2011
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Kanna Shimizu, Wilfred Edmund Plouffe, Jr.
  • Publication number: 20110131554
    Abstract: A method, system and computer program product for optimizing performance of an application running on a hybrid system. The method includes the steps of: selecting a first user defined operator from a library component within the application; determining at least one available hardware resource; generating at least one execution pattern for the first user defined operator based on the available hardware resource; compiling the execution pattern; measuring the execution speed of the execution pattern on the available hardware resource; and storing the execution speed and the execution pattern in an optimization table; where at least one of the steps is carried out using a computer device so that performance of said application is optimized on the hybrid system.
    Type: Application
    Filed: November 29, 2010
    Publication date: June 2, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
  • Patent number: 7937575
    Abstract: A boot block that contains a first public key is activated and a system Basic Input/Output System (BIOS) that contains a second public key and a first digital signature is verified, the verifying being performed by confirming that the first and second public keys match. In response to a determination that the first and second public keys match, the BIOS is activated and a system image is loaded to a real device. The system image is verified by confirming that the first digital signature that is stored in the system BIOS matches a second digital signature that is stored in a mass storage device. In response to the first and second digital signatures matching, a virtual mass storage device is created. Control of the virtual mass storage device is transferred to a boot strap code in an operating system image and the operating system image is booted from the virtual mass storage device.
    Type: Grant
    Filed: December 19, 2005
    Date of Patent: May 3, 2011
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Hassan Hajji, Seiichi Kawano, Masana Murase, Susumu Shimotono