Patents by Inventor Danny Kumamoto

Danny Kumamoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120198381
    Abstract: A GUI for displaying a main document image and multiple thumbnail images in a more space-efficient manner. One unified pane displays both a page of the document as a main image and multiple thumbnail images each corresponding to a document page. At least some of the thumbnail images overlap with the main image, with the main image displayed either as a transparent image (transparent display mode) or a solid image (solid display mode) in front of the overlapped thumbnail images. When a user selects a thumbnail image, the corresponding document page is displayed in the main image. The use may switch between the two display modes. In the transparent display mode, overlapped thumbnail images are visible and selectable, and the main image is not editable. In the solid display mode, overlapped thumbnail images are not visible and not selectable, and the main image is editable.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: KONICA MINOLTA LABORATORY U.S.A., INC.
    Inventor: Danny KUMAMOTO
  • Publication number: 20120198384
    Abstract: A GUI layout for displaying a main document image and multiple thumbnail images in a more space-efficient manner. One unified pane displays both a selected page of the document in a main image area and multiple thumbnail images each corresponding to a document page. The thumbnails and the main image area do not overlap. In some embodiments, the thumbnails include multiple groups of thumbnails having different sizes. When a user selects a thumbnail image, the corresponding document page is displayed in the main image area. The pane is provided with functions that allow the user to integrate the page viewing and selection process and to customize the pane, such as: scrolling of the thumbnail images, moving the document content displayed in the main image area, changing the physical size of the main image area, changing the zoom size of the document content in the main image area, etc.
    Type: Application
    Filed: January 28, 2011
    Publication date: August 2, 2012
    Applicant: KONICA MINOLTA LABORATORY U.S.A., INC.
    Inventor: Danny KUMAMOTO
  • Patent number: 7392404
    Abstract: A smart card which includes a non-volatile read/write memory and a processor connected to the memory, and further configured to cause the processor to perform a method for enhancing data security and managing the contents of memory during periods when the computational power of the processor is underutilized. The method includes steps for determining if a command or character has been received, processing and/or responding to the command or character once received, implementing a security measure and/or managing memory, and performing a tamper protocol in response to detecting a security breach, all of which is performed while waiting to receive the next command or character.
    Type: Grant
    Filed: December 20, 2002
    Date of Patent: June 24, 2008
    Inventors: Michael A. Montgomery, Anshuman Sinha, Danny Kumamoto
  • Publication number: 20070011656
    Abstract: Systems and methods for debugging software and/or hardware are disclosed. A processor may execute a program for a certain amount of time. The context of the processor at the end of that time may then be made available to a simulator operable to simulate the processor. The program can then be executed from that point on the simulator using the context. Additionally, a context resulting from the execution of the program on the simulator may result and be restored to the processor for continued execution.
    Type: Application
    Filed: June 16, 2005
    Publication date: January 11, 2007
    Inventor: Danny Kumamoto
  • Publication number: 20060212840
    Abstract: Systems and methods for the efficient utilization of threads in a processor with multiple execution paths are disclosed. These systems and methods alleviate the need to perform context switching in one or more threads while simultaneously allowing these threads to run useful tasks. One or more of these threads may run tasks in a privileged mode, thus there may be no need to save and restore context in these threads. Additionally, by keeping the threads executing in privileged mode at a lower priority, these privileged mode tasks can run exclusively on one or more of these threads without significantly delaying the execution of other threads.
    Type: Application
    Filed: March 16, 2005
    Publication date: September 21, 2006
    Inventors: Danny Kumamoto, Michael Day
  • Publication number: 20060015855
    Abstract: Systems and method for replacing NOP instructions in a first program with instructions from a second program to enable execution of the second program during execution of the first program without requiring any additional processing resources. Execution of the two programs is accomplished without switching execution contexts and without causing any interference with the execution of the first program. In one embodiment, all processing resources are available to the first program, and are only used to execute the second program if they are unused by the first program. In another embodiment, a small amount of resources could be allocated to the second program. The replacement of the NOP instructions may be performed at compile-time, at run-time, or at some intermediate time, and may be performed by a compiler, a processor, or various other tools.
    Type: Application
    Filed: July 13, 2004
    Publication date: January 19, 2006
    Inventor: Danny Kumamoto
  • Publication number: 20040123132
    Abstract: A smart card which includes a non-volatile read/write memory and a processor connected to the memory, and further configured to cause the processor to perform a method for enhancing data security and managing the contents of memory during periods when the computational power of the processor is underutilized. The method includes steps for determining if a command or character has been received, processing and/or responding to the command or character once received, implementing a security measure and/or managing memory, and performing a tamper protocol in response to detecting a security breach, all of which is performed while waiting to receive the next command or character.
    Type: Application
    Filed: December 20, 2002
    Publication date: June 24, 2004
    Inventors: Michael A. Montgomery, Anshuman Sinha, Danny Kumamoto