Patents by Inventor Fukio Handa
Fukio Handa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9086828Abstract: When the user executes printing in a system to which plural printers are connected, the waiting time of each user is minimized, and the use of the plural printers is equalized. The print management device is connected to the terminal devices and the printers via a network, for example. The print management device saves the print jobs transmitted from each of the terminal devices. When receiving the print instruction from any one of the printers, the print management device transmits the print job corresponding thereto to the printer and makes the printer execute the printing. Also, the print management device collects and manages the print execution status of the printers. When receiving a new print instruction from the printer which is already executing the print job, the print management device calculates the waiting time of each of the printers and notifies the printer having the shortest waiting time.Type: GrantFiled: March 22, 2013Date of Patent: July 21, 2015Assignees: DAI NIPPON PRINTING CO., LTD., COMPUTER ENGINEERING & CONSULTING, LTD.Inventors: Yoshihiro Yano, Fukio Handa, Tadashi Fujita, Shigeo Hachiki
-
Publication number: 20150062623Abstract: When the user executes printing in a system to which plural printers are connected, the waiting time of each user is minimized, and the use of the plural printers is equalized. The print management device is connected to the terminal devices and the printers via a network, for example. The print management device saves the print jobs transmitted from each of the terminal devices. When receiving the print instruction from any one of the printers, the print management device transmits the print job corresponding thereto to the printer and makes the printer execute the printing. Also, the print management device collects and manages the print execution status of the printers. When receiving a new print instruction from the printer which is already executing the print job, the print management device calculates the waiting time of each of the printers and notifies the printer having the shortest waiting time.Type: ApplicationFiled: March 22, 2013Publication date: March 5, 2015Inventors: Yoshihiro Yano, Fukio Handa, Tadashi Fujita, Shigeo Hachiki
-
Patent number: 8646058Abstract: IC cards (R11, R12, and R21) are issued respectively to users ?, ?, and ?. An identification code (ID(11)) of a computer (11) supplied to user ? and environment information (ENV(11)) that indicates a normal network environment of the computer (11) are recorded in the IC card (R11) issued to user ?. When in order to use a computer, a user connects his/her IC card, the identification code and the network environment of the computer to be used are compared with the identification code and environment information recorded in the IC card and different access rights are provided in accordance to the degree of matching. The identification code may be a MAC address of a LAN circuit incorporated in the computer, and the environment information may be a default gateway address or the like. Different access rights can thus be set according to the computer or the network environment that is used.Type: GrantFiled: January 20, 2005Date of Patent: February 4, 2014Assignee: Dai Nippon Printing Co., Ltd.Inventors: Syouzou Niwata, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Kazutoshi Kichikawa
-
Patent number: 8595813Abstract: It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff ? and a staff ? belonging to the same project group, ? of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). ? of the reception side writes the variable code V(1) received from ? in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.Type: GrantFiled: April 29, 2011Date of Patent: November 26, 2013Assignee: Dai Nippon Printing Co., Ltd.Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
-
Patent number: 8099771Abstract: It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff ? inputs a unique personal code P(?) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(?) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(?) in the IC card. Even if the company staff ? loses the IC card, it is possible to obtain the IC card having the same encryption key information K(?) as before by performing initialization again by using the IC card delivered by the IC card provider X.Type: GrantFiled: May 19, 2011Date of Patent: January 17, 2012Assignee: Dai Nippon Printing Co., Ltd.Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
-
Patent number: 8082325Abstract: An agent program (12) installed in a terminal device (10) is used to upload data, which are to be stored, to a data storage device (100) via a first network (N1). Data uploaded to a first data storage unit (110) are stored therein as they are. On the other hand, data uploaded to a second data storage unit (120) are transferred, by the function of a data transferring unit (130), to any of external storage sites (210-230) via a second network (N2), and management information, which includes the URL of the storage site that is the transfer destination, is stored into an IC card (11). When the data stored in the data storage unit (120) are required, the management information in the IC card (11) is given to the data transferring unit (130) and the relevant data are forwarded from the storage site that was the transfer destination to the data storage unit (120) and then downloaded to the terminal device (10). The limit of the storage capacity can thereby be overcome and damages due to viruses can be suppressed.Type: GrantFiled: June 9, 2011Date of Patent: December 20, 2011Assignee: Dai Nippon Printing Co., Ltd.Inventors: Yoshihiro Yano, Fukio Handa
-
Publication number: 20110238729Abstract: An agent program (12) installed in a terminal device (10) is used to upload data, which are to be stored, to a data storage device (100) via a first network (N1). Data uploaded to a first data storage unit (110) are stored therein as they are. On the other hand, data uploaded to a second data storage unit (120) are transferred, by the function of a data transferring unit (130), to any of external storage sites (210-230) via a second network (N2), and management information, which includes the URL of the storage site that is the transfer destination, is stored into an IC card (11). When the data stored in the data storage unit (120) are required, the management information in the IC card (11) is given to the data transferring unit (130) and the relevant data are forwarded from the storage site that was the transfer destination to the data storage unit (120) and then downloaded to the terminal device (10). The limit of the storage capacity can thereby be overcome and damages due to viruses can be suppressed.Type: ApplicationFiled: June 9, 2011Publication date: September 29, 2011Inventors: Yoshihiro YANO, Fukio Handa
-
Publication number: 20110222686Abstract: It is possible to issue an. IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff ? inputs a unique personal code P(?) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(?) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(?) in the IC card. Even if the company staff ? loses the IC card, it is possible to obtain the IC card having the same encryption key information K(?) as before by performing initialization again by using the IC card delivered by the IC card provider X.Type: ApplicationFiled: May 19, 2011Publication date: September 15, 2011Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
-
Publication number: 20110213973Abstract: It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff ? and a staff ? belonging to the same project group, ? of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). ? of the reception side writes the variable code V(1) received from ? in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.Type: ApplicationFiled: April 29, 2011Publication date: September 1, 2011Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
-
Patent number: 7620585Abstract: In order to give sufficient evidential admissibility to the content of a contract made online, contractual terms data C that shows a character string of contractual terms is prepared and stored by a processor on the side of a transacting party A. The data C is then transmitted to a processor on the side of a transacting party B, and is stored. A hash value ID2 of the contractual terms data C is calculated by the B-side processor, and a signature Sig2 of the party B is added and transmitted to the A-side processor as formal contractual proposal information. The signature Sig2 is verified by the A-side processor. A coincidence is verified between a hash value ID1 of the data C and the ID2 that has been transmitted. A signature Sig1 of the party A is added to a coinciding hash value ID, and is transmitted to the B-side processor as formal contractual acceptance information.Type: GrantFiled: June 11, 2003Date of Patent: November 17, 2009Assignee: Dai Nippon Printing Co., Ltd.Inventors: Yoshihiro Yano, Fukio Handa
-
Patent number: 7574440Abstract: When a user, who has logged onto an information processing apparatus (100), executes a logoff procedure, a saving unit (160) executes the following processes. Firstly, from among the files residing in a data storage unit (110), any files that are recognized as requiring a security protection and hence are to be saved are copied into an external storage device (300) via a network (200), and the original files in the data storage unit (110) are then deleted. At this moment, the address of the copy destination is stored, as management information, into a portable information recording medium (400) possessed by the user. When the user logs onto the information processing apparatus (100) again, a restoring unit (170) restores, based on the management information stored in the portable information recording medium (400), the files saved in the external storage device (300) into the data storage unit (110).Type: GrantFiled: January 20, 2005Date of Patent: August 11, 2009Assignee: Dai Nippon Printing Co., Ltd.Inventors: Kazutoshi Kichikawa, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Syouzou Niwata
-
Publication number: 20080276307Abstract: IC cards (R11, R12, and R21) are issued respectively to users ?, ?, and ?. An identification code (ID(11)) of a computer (11) supplied to user ? and environment information (ENV(11)) that indicates a normal network environment of the computer (11) are recorded in the IC card (R11) issued to user ?. When in order to use a computer, a user connects his/her IC card, the identification code and the network environment of the computer to be used are compared with the identification code and environment information recorded in the IC card and different access rights are provided in accordance to the degree of matching. The identification code may be a MAC address of a LAN circuit incorporated in the computer, and the environment information may be a default gateway address or the like. Different access rights can thus be set according to the computer or the network environment that is used.Type: ApplicationFiled: January 20, 2005Publication date: November 6, 2008Inventors: Syouzou Niwata, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Kazutoshi Kichikawa
-
Publication number: 20070282977Abstract: An agent program (12) installed in a terminal device (10) is used to upload data, which are to be stored, to a data storage device (100) via a first network (N1). Data uploaded to a first data storage unit (110) are stored therein as they are. On the other hand, data uploaded to a second data storage unit (120) are transferred, by the function of a data transferring unit (130), to any of external storage sites (210-230) via a second network (N2), and management information, which includes the URL of the storage site that is the transfer destination, is stored into an IC card (11). When the data stored in the data storage unit (120) are required, the management information in the IC card (11) is given to the data transferring unit (130) and the relevant data are forwarded from the storage site that was the transfer destination to the data storage unit (120) and then downloaded to the terminal device (10). The limit of the storage capacity can thereby be overcome and damages due to viruses can be suppressed.Type: ApplicationFiled: December 12, 2004Publication date: December 6, 2007Inventors: Yoshihiro Yano, Fukio Handa
-
Publication number: 20070226513Abstract: It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff ? and a staff ? belonging to the same project group, ? of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). ? of the reception side writes the variable code V(1) received from a in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.Type: ApplicationFiled: May 2, 2005Publication date: September 27, 2007Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
-
Publication number: 20070165860Abstract: It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff ? inputs a unique personal code P(?) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(?) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(?) in the IC card. Even if the company staff ? loses the IC card, it is possible to obtain the IC card having the same encryption key information K(?) as before by performing initialization again by using the IC card delivered by the IC card provider X.Type: ApplicationFiled: May 2, 2005Publication date: July 19, 2007Inventors: Fukio Handa, Yoshihiro Yana, Takayuki Chikada, Syouzou Niwata
-
Publication number: 20070143288Abstract: When a user, who has logged onto an information processing apparatus (100), executes a logoff procedure, a saving unit (160) executes the following processes. Firstly, from among the files residing in a data storage unit (110), any files that are recognized as requiring a security protection and hence are to be saved are copied into an external storage device (300) via a network (200), and the original files in the data storage unit (110) are then deleted. At this moment, the address of the copy destination is stored, as management information, into a portable information recording medium (400) possessed by the user. When the user logs onto the information processing apparatus (100) again, a restoring unit (170) restores, based on the management information stored in the portable information recording medium (400), the files saved in the external storage device (300) into the data storage unit (110).Type: ApplicationFiled: January 20, 2005Publication date: June 21, 2007Inventors: Kazutoshi Kichikawa, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Syouzou Niwata
-
Publication number: 20040111331Abstract: In order to give sufficient evidential admissibility to the content of a contract made online, contractual terms data C that shows a character string of contractual terms is prepared and stored by a processor on the side of a transacting party A. The data C is then transmitted to a processor on the side of a transacting party B, and is stored. A hash value ID2 of the contractual terms data C is calculated by the B-side processor, and a signature Sig2 of the party B is added and transmitted to the A-side processor as formal contractual proposal information. The signature Sig2 is verified by the A-side processor. A coincidence is verified between a hash value ID1 of the data C and the ID2 that has been transmitted. A signature Sig1 of the party A is added to a coinciding hash value ID, and is transmitted to the B-side processor as formal contractual acceptance information.Type: ApplicationFiled: June 11, 2003Publication date: June 10, 2004Applicant: DAI NIPPON PRINTING CO., LTD.Inventors: Yoshihiro Yano, Fukio Handa
-
Patent number: 6711594Abstract: A distributed data archive device (1) is placed on an arbitrary location on a network (3) so that data can be saved and extracted. During data saving, a to-be-saved data file (F1) is given to the archive device (1), and a division/encryption means (13) carries out division/encryption, and individual divided files are distributed and saved onto data servers (2a, 2b, 2c) by a network communication means (16). A data management means (15) forms management data that shows a division/encryption method and a depository-destination data server, and records it onto a portable recording medium (10) during the data saving. During data extraction, the portable recording medium (10) is connected to an arbitrary archive device (1), and the management data is read. Based on this management data, the divided files are extracted from the depository destinations, and are reconstituted into the original data file (F1) by a decryption/integration means (14).Type: GrantFiled: August 13, 2001Date of Patent: March 23, 2004Assignee: Dai Nippon Printing Co., Ltd.Inventors: Yoshihiro Yano, Naoyuki Oshima, Fukio Handa
-
Publication number: 20020138504Abstract: A distributed data archive device (1) is placed on an arbitrary location on a network (3) so that data can be saved and extracted. During data saving, a to-be-saved data file (F1) is given to the archive device (1), and a division/encryption means (13) carries out division/encryption, and individual divided files are distributed and saved onto data servers (2a, 2b, 2c) by a network communication means (16). A data management means (15) forms management data that shows a division/encryption method and a depository-destination data server, and records it onto a portable recording medium (10) during the data saving. During data extraction, the portable recording medium (10) is connected to an arbitrary archive device (1), and the management data is read. Based on this management data, the divided files are extracted from the depository destinations, and are reconstituted into the original data file (F1) by a decryption/integration means (14).Type: ApplicationFiled: August 13, 2001Publication date: September 26, 2002Inventors: Yoshihiro Yano, Naoyuki Oshima, Fukio Handa