Patents by Inventor Akira Ohkado

Akira Ohkado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10992632
    Abstract: Evaluating messaging content on a computer-based communications network includes classifying, using computer hardware, a response to a message previously rated by a user. The message, the response to the message, and the rating by the user can each be provided on the computer-based communications network. Evaluating messaging content also includes automatically changing, with the computer hardware, the rating of the message when the classifying of the response results in a classification that satisfies a predefined rating change condition.
    Type: Grant
    Filed: January 3, 2019
    Date of Patent: April 27, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Masami Tada, Sanehiro Furuichi, Akira Ohkado, Satoshi Kawase
  • Patent number: 10776475
    Abstract: A method, computer system, and computer program product. Input element layout data based on a layout of input elements of an input device is retrieved in response to a received password input request. A positioning marker and a visualized overlay input device including an altered layout of input elements is generated based on the retrieved input element layout data. The visualized overlay input device and the positioning marker are rendered for display by a see-through display device for viewing of the visualized overlay input device in superposition with respect to the input device. An effective input configuration of the layout of input elements of the input device is generated to correspond to the altered layout of input elements for entry of the password input.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: September 15, 2020
    Assignee: International Business Machines Corporation
    Inventor: Akira Ohkado
  • Publication number: 20200220832
    Abstract: Evaluating messaging content on a computer-based communications network includes classifying, using computer hardware, a response to a message previously rated by a user. The message, the response to the message, and the rating by the user can each be provided on the computer-based communications network. Evaluating messaging content also includes automatically changing, with the computer hardware, the rating of the message when the classifying of the response results in a classification that satisfies a predefined rating change condition.
    Type: Application
    Filed: January 3, 2019
    Publication date: July 9, 2020
    Inventors: Masami Tada, Sanehiro Furuichi, Akira Ohkado, Satoshi Kawase
  • Patent number: 10636011
    Abstract: A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: April 28, 2020
    Assignee: International Business Machines Corproation
    Inventors: Yasutaka Nishimura, Takashi Ogura, Akira Ohkado, Tadashi Tsumura
  • Patent number: 10621551
    Abstract: A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring.
    Type: Grant
    Filed: August 2, 2012
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Yasutaka Nishimura, Takashi Ogura, Akira Ohkado, Tadashi Tsumura
  • Publication number: 20190147158
    Abstract: A method, computer system, and computer program product. Input element layout data based on a layout of input elements of an input device is retrieved in response to a received password input request. A positioning marker and a visualized overlay input device including an altered layout of input elements is generated based on the retrieved input element layout data. The visualized overlay input device and the positioning marker are rendered for display by a see-through display device for viewing of the visualized overlay input device in superposition with respect to the input device. An effective input configuration of the layout of input elements of the input device is generated to correspond to the altered layout of input elements for entry of the password input.
    Type: Application
    Filed: November 13, 2017
    Publication date: May 16, 2019
    Inventor: AKIRA OHKADO
  • Patent number: 9940442
    Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.
    Type: Grant
    Filed: October 21, 2015
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
  • Patent number: 9940443
    Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
  • Patent number: 9910998
    Abstract: A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventor: Akira Ohkado
  • Patent number: 9607179
    Abstract: A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada
  • Publication number: 20170083689
    Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.
    Type: Application
    Filed: December 1, 2016
    Publication date: March 23, 2017
    Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
  • Patent number: 9600658
    Abstract: A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity.
    Type: Grant
    Filed: January 28, 2015
    Date of Patent: March 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eisuke Kanzaki, Akira Ohkado, Tomohiro Shioya, Masami Tada
  • Publication number: 20160371499
    Abstract: A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.
    Type: Application
    Filed: September 2, 2016
    Publication date: December 22, 2016
    Inventor: Akira Ohkado
  • Patent number: 9460295
    Abstract: A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: October 4, 2016
    Assignee: International Business Machines Corporation
    Inventor: Akira Ohkado
  • Patent number: 9354625
    Abstract: A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: May 31, 2016
    Assignee: International Business Machines Corporation
    Inventors: Akira Ohkado, Yukihiko Sohda, Masami Tada, Tadashi Tsumura
  • Publication number: 20160117489
    Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.
    Type: Application
    Filed: October 21, 2015
    Publication date: April 28, 2016
    Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
  • Publication number: 20150324553
    Abstract: A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section.
    Type: Application
    Filed: May 7, 2015
    Publication date: November 12, 2015
    Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada
  • Publication number: 20150294109
    Abstract: A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity.
    Type: Application
    Filed: January 28, 2015
    Publication date: October 15, 2015
    Inventors: Eisuke Kanzaki, Akira Ohkado, Tomohiro Shioya, Masami Tada
  • Patent number: 9075410
    Abstract: A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation.
    Type: Grant
    Filed: February 3, 2012
    Date of Patent: July 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Akira Ohkado, Yukihiko Sohda, Masami Tada, Tadashi Tsumura
  • Patent number: 9069944
    Abstract: Disclosed embodiments include a method for receiving, at a configuration information server, an encrypted password associated with a configuration item, where the encrypted password is encrypted using an encryption key. The method further includes encrypting a decrypted password to generate a reencrypted password, where the decrypted password is derived from the encrypted password. The method further includes transmitting the reencrypted password to the configuration item and removing the decrypted password from the configuration information collection server.
    Type: Grant
    Filed: February 14, 2012
    Date of Patent: June 30, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Akira Ohkado