Patents by Inventor Akira Ohkado
Akira Ohkado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10992632Abstract: Evaluating messaging content on a computer-based communications network includes classifying, using computer hardware, a response to a message previously rated by a user. The message, the response to the message, and the rating by the user can each be provided on the computer-based communications network. Evaluating messaging content also includes automatically changing, with the computer hardware, the rating of the message when the classifying of the response results in a classification that satisfies a predefined rating change condition.Type: GrantFiled: January 3, 2019Date of Patent: April 27, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Masami Tada, Sanehiro Furuichi, Akira Ohkado, Satoshi Kawase
-
Patent number: 10776475Abstract: A method, computer system, and computer program product. Input element layout data based on a layout of input elements of an input device is retrieved in response to a received password input request. A positioning marker and a visualized overlay input device including an altered layout of input elements is generated based on the retrieved input element layout data. The visualized overlay input device and the positioning marker are rendered for display by a see-through display device for viewing of the visualized overlay input device in superposition with respect to the input device. An effective input configuration of the layout of input elements of the input device is generated to correspond to the altered layout of input elements for entry of the password input.Type: GrantFiled: November 13, 2017Date of Patent: September 15, 2020Assignee: International Business Machines CorporationInventor: Akira Ohkado
-
Publication number: 20200220832Abstract: Evaluating messaging content on a computer-based communications network includes classifying, using computer hardware, a response to a message previously rated by a user. The message, the response to the message, and the rating by the user can each be provided on the computer-based communications network. Evaluating messaging content also includes automatically changing, with the computer hardware, the rating of the message when the classifying of the response results in a classification that satisfies a predefined rating change condition.Type: ApplicationFiled: January 3, 2019Publication date: July 9, 2020Inventors: Masami Tada, Sanehiro Furuichi, Akira Ohkado, Satoshi Kawase
-
Patent number: 10636011Abstract: A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring.Type: GrantFiled: September 21, 2011Date of Patent: April 28, 2020Assignee: International Business Machines CorproationInventors: Yasutaka Nishimura, Takashi Ogura, Akira Ohkado, Tadashi Tsumura
-
Patent number: 10621551Abstract: A method, system and computer program of managing an access right to at least one asset associated with at least one digital work order, or to at least one element associated with the asset, and provides a system and a computer program for the same. The method includes the steps of: loading a security policy associated with the work order, the asset, or the element; starting to monitor location information of the asset or the element and a moving object, or a elapsed time of the moving object at the location; and issuing an event for managing the asset, the element or the moving object in response to the start of the work order or in response to the fact that the loaded security policy is violated by any of the locations, a change in the location, or the elapsed time at the location obtained by the monitoring.Type: GrantFiled: August 2, 2012Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Yasutaka Nishimura, Takashi Ogura, Akira Ohkado, Tadashi Tsumura
-
Publication number: 20190147158Abstract: A method, computer system, and computer program product. Input element layout data based on a layout of input elements of an input device is retrieved in response to a received password input request. A positioning marker and a visualized overlay input device including an altered layout of input elements is generated based on the retrieved input element layout data. The visualized overlay input device and the positioning marker are rendered for display by a see-through display device for viewing of the visualized overlay input device in superposition with respect to the input device. An effective input configuration of the layout of input elements of the input device is generated to correspond to the altered layout of input elements for entry of the password input.Type: ApplicationFiled: November 13, 2017Publication date: May 16, 2019Inventor: AKIRA OHKADO
-
Patent number: 9940442Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: GrantFiled: October 21, 2015Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Patent number: 9940443Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: GrantFiled: December 1, 2016Date of Patent: April 10, 2018Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Patent number: 9910998Abstract: A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.Type: GrantFiled: September 2, 2016Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventor: Akira Ohkado
-
Patent number: 9607179Abstract: A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section.Type: GrantFiled: May 7, 2015Date of Patent: March 28, 2017Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Publication number: 20170083689Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: ApplicationFiled: December 1, 2016Publication date: March 23, 2017Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Patent number: 9600658Abstract: A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity.Type: GrantFiled: January 28, 2015Date of Patent: March 21, 2017Assignee: International Business Machines CorporationInventors: Eisuke Kanzaki, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Publication number: 20160371499Abstract: A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.Type: ApplicationFiled: September 2, 2016Publication date: December 22, 2016Inventor: Akira Ohkado
-
Patent number: 9460295Abstract: A method, system, mediation server, client, and computer program for deleting a copied file in which a master file is duplicated while maintaining a certain level of security. A mediation server receives and stores a copied file in which a master file stored in a server is duplicated, generates private-key information and public-key information, and transmits the generated public-key information and the copied file to a client. The client receives and stores the copied file and the public-key information. In a case where the copied file is updated, the client encrypts difference information on the difference arising in the updating using the public-key information and transmits the difference information to the mediation server. The client determines whether the condition for being secure is satisfied when a process for updating the copied file becomes possible. When determining that the condition is not satisfied, the client deletes the copied file.Type: GrantFiled: August 1, 2012Date of Patent: October 4, 2016Assignee: International Business Machines CorporationInventor: Akira Ohkado
-
Patent number: 9354625Abstract: A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation.Type: GrantFiled: February 13, 2013Date of Patent: May 31, 2016Assignee: International Business Machines CorporationInventors: Akira Ohkado, Yukihiko Sohda, Masami Tada, Tadashi Tsumura
-
Publication number: 20160117489Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: ApplicationFiled: October 21, 2015Publication date: April 28, 2016Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Publication number: 20150324553Abstract: A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section.Type: ApplicationFiled: May 7, 2015Publication date: November 12, 2015Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Publication number: 20150294109Abstract: A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity.Type: ApplicationFiled: January 28, 2015Publication date: October 15, 2015Inventors: Eisuke Kanzaki, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Patent number: 9075410Abstract: A mechanism is provided for effectively detecting an abnormality occurring in a control system and isolating the control system in which abnormality is acknowledged. The mechanism receives, from one or more control systems in the plurality of control systems, respective abnormality notifications for respective counter control systems to be monitored by the plurality of control systems. The mechanism adds up abnormality notifications transmitted from respective monitoring sections of the plurality of control systems so as to evaluate the reputation of a control system suspected to have an abnormality. The mechanism causes a protected area for operating the control system suspected to have an abnormality to restrict outbound traffic from at least the inside of the protected area, when an indication is identified that the control system is abnormal according to criteria from a result of the evaluation.Type: GrantFiled: February 3, 2012Date of Patent: July 7, 2015Assignee: International Business Machines CorporationInventors: Akira Ohkado, Yukihiko Sohda, Masami Tada, Tadashi Tsumura
-
Patent number: 9069944Abstract: Disclosed embodiments include a method for receiving, at a configuration information server, an encrypted password associated with a configuration item, where the encrypted password is encrypted using an encryption key. The method further includes encrypting a decrypted password to generate a reencrypted password, where the decrypted password is derived from the encrypted password. The method further includes transmitting the reencrypted password to the configuration item and removing the decrypted password from the configuration information collection server.Type: GrantFiled: February 14, 2012Date of Patent: June 30, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Akira Ohkado