Patents by Inventor Fukio Handa

Fukio Handa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9086828
    Abstract: When the user executes printing in a system to which plural printers are connected, the waiting time of each user is minimized, and the use of the plural printers is equalized. The print management device is connected to the terminal devices and the printers via a network, for example. The print management device saves the print jobs transmitted from each of the terminal devices. When receiving the print instruction from any one of the printers, the print management device transmits the print job corresponding thereto to the printer and makes the printer execute the printing. Also, the print management device collects and manages the print execution status of the printers. When receiving a new print instruction from the printer which is already executing the print job, the print management device calculates the waiting time of each of the printers and notifies the printer having the shortest waiting time.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: July 21, 2015
    Assignees: DAI NIPPON PRINTING CO., LTD., COMPUTER ENGINEERING & CONSULTING, LTD.
    Inventors: Yoshihiro Yano, Fukio Handa, Tadashi Fujita, Shigeo Hachiki
  • Publication number: 20150062623
    Abstract: When the user executes printing in a system to which plural printers are connected, the waiting time of each user is minimized, and the use of the plural printers is equalized. The print management device is connected to the terminal devices and the printers via a network, for example. The print management device saves the print jobs transmitted from each of the terminal devices. When receiving the print instruction from any one of the printers, the print management device transmits the print job corresponding thereto to the printer and makes the printer execute the printing. Also, the print management device collects and manages the print execution status of the printers. When receiving a new print instruction from the printer which is already executing the print job, the print management device calculates the waiting time of each of the printers and notifies the printer having the shortest waiting time.
    Type: Application
    Filed: March 22, 2013
    Publication date: March 5, 2015
    Inventors: Yoshihiro Yano, Fukio Handa, Tadashi Fujita, Shigeo Hachiki
  • Patent number: 8646058
    Abstract: IC cards (R11, R12, and R21) are issued respectively to users ?, ?, and ?. An identification code (ID(11)) of a computer (11) supplied to user ? and environment information (ENV(11)) that indicates a normal network environment of the computer (11) are recorded in the IC card (R11) issued to user ?. When in order to use a computer, a user connects his/her IC card, the identification code and the network environment of the computer to be used are compared with the identification code and environment information recorded in the IC card and different access rights are provided in accordance to the degree of matching. The identification code may be a MAC address of a LAN circuit incorporated in the computer, and the environment information may be a default gateway address or the like. Different access rights can thus be set according to the computer or the network environment that is used.
    Type: Grant
    Filed: January 20, 2005
    Date of Patent: February 4, 2014
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Syouzou Niwata, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Kazutoshi Kichikawa
  • Patent number: 8595813
    Abstract: It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff ? and a staff ? belonging to the same project group, ? of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). ? of the reception side writes the variable code V(1) received from ? in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: November 26, 2013
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
  • Patent number: 8099771
    Abstract: It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff ? inputs a unique personal code P(?) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(?) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(?) in the IC card. Even if the company staff ? loses the IC card, it is possible to obtain the IC card having the same encryption key information K(?) as before by performing initialization again by using the IC card delivered by the IC card provider X.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: January 17, 2012
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
  • Patent number: 8082325
    Abstract: An agent program (12) installed in a terminal device (10) is used to upload data, which are to be stored, to a data storage device (100) via a first network (N1). Data uploaded to a first data storage unit (110) are stored therein as they are. On the other hand, data uploaded to a second data storage unit (120) are transferred, by the function of a data transferring unit (130), to any of external storage sites (210-230) via a second network (N2), and management information, which includes the URL of the storage site that is the transfer destination, is stored into an IC card (11). When the data stored in the data storage unit (120) are required, the management information in the IC card (11) is given to the data transferring unit (130) and the relevant data are forwarded from the storage site that was the transfer destination to the data storage unit (120) and then downloaded to the terminal device (10). The limit of the storage capacity can thereby be overcome and damages due to viruses can be suppressed.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: December 20, 2011
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Yoshihiro Yano, Fukio Handa
  • Publication number: 20110238729
    Abstract: An agent program (12) installed in a terminal device (10) is used to upload data, which are to be stored, to a data storage device (100) via a first network (N1). Data uploaded to a first data storage unit (110) are stored therein as they are. On the other hand, data uploaded to a second data storage unit (120) are transferred, by the function of a data transferring unit (130), to any of external storage sites (210-230) via a second network (N2), and management information, which includes the URL of the storage site that is the transfer destination, is stored into an IC card (11). When the data stored in the data storage unit (120) are required, the management information in the IC card (11) is given to the data transferring unit (130) and the relevant data are forwarded from the storage site that was the transfer destination to the data storage unit (120) and then downloaded to the terminal device (10). The limit of the storage capacity can thereby be overcome and damages due to viruses can be suppressed.
    Type: Application
    Filed: June 9, 2011
    Publication date: September 29, 2011
    Inventors: Yoshihiro YANO, Fukio Handa
  • Publication number: 20110222686
    Abstract: It is possible to issue an. IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff ? inputs a unique personal code P(?) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(?) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(?) in the IC card. Even if the company staff ? loses the IC card, it is possible to obtain the IC card having the same encryption key information K(?) as before by performing initialization again by using the IC card delivered by the IC card provider X.
    Type: Application
    Filed: May 19, 2011
    Publication date: September 15, 2011
    Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
  • Publication number: 20110213973
    Abstract: It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff ? and a staff ? belonging to the same project group, ? of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). ? of the reception side writes the variable code V(1) received from ? in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.
    Type: Application
    Filed: April 29, 2011
    Publication date: September 1, 2011
    Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
  • Patent number: 7620585
    Abstract: In order to give sufficient evidential admissibility to the content of a contract made online, contractual terms data C that shows a character string of contractual terms is prepared and stored by a processor on the side of a transacting party A. The data C is then transmitted to a processor on the side of a transacting party B, and is stored. A hash value ID2 of the contractual terms data C is calculated by the B-side processor, and a signature Sig2 of the party B is added and transmitted to the A-side processor as formal contractual proposal information. The signature Sig2 is verified by the A-side processor. A coincidence is verified between a hash value ID1 of the data C and the ID2 that has been transmitted. A signature Sig1 of the party A is added to a coinciding hash value ID, and is transmitted to the B-side processor as formal contractual acceptance information.
    Type: Grant
    Filed: June 11, 2003
    Date of Patent: November 17, 2009
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Yoshihiro Yano, Fukio Handa
  • Patent number: 7574440
    Abstract: When a user, who has logged onto an information processing apparatus (100), executes a logoff procedure, a saving unit (160) executes the following processes. Firstly, from among the files residing in a data storage unit (110), any files that are recognized as requiring a security protection and hence are to be saved are copied into an external storage device (300) via a network (200), and the original files in the data storage unit (110) are then deleted. At this moment, the address of the copy destination is stored, as management information, into a portable information recording medium (400) possessed by the user. When the user logs onto the information processing apparatus (100) again, a restoring unit (170) restores, based on the management information stored in the portable information recording medium (400), the files saved in the external storage device (300) into the data storage unit (110).
    Type: Grant
    Filed: January 20, 2005
    Date of Patent: August 11, 2009
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Kazutoshi Kichikawa, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Syouzou Niwata
  • Publication number: 20080276307
    Abstract: IC cards (R11, R12, and R21) are issued respectively to users ?, ?, and ?. An identification code (ID(11)) of a computer (11) supplied to user ? and environment information (ENV(11)) that indicates a normal network environment of the computer (11) are recorded in the IC card (R11) issued to user ?. When in order to use a computer, a user connects his/her IC card, the identification code and the network environment of the computer to be used are compared with the identification code and environment information recorded in the IC card and different access rights are provided in accordance to the degree of matching. The identification code may be a MAC address of a LAN circuit incorporated in the computer, and the environment information may be a default gateway address or the like. Different access rights can thus be set according to the computer or the network environment that is used.
    Type: Application
    Filed: January 20, 2005
    Publication date: November 6, 2008
    Inventors: Syouzou Niwata, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Kazutoshi Kichikawa
  • Publication number: 20070282977
    Abstract: An agent program (12) installed in a terminal device (10) is used to upload data, which are to be stored, to a data storage device (100) via a first network (N1). Data uploaded to a first data storage unit (110) are stored therein as they are. On the other hand, data uploaded to a second data storage unit (120) are transferred, by the function of a data transferring unit (130), to any of external storage sites (210-230) via a second network (N2), and management information, which includes the URL of the storage site that is the transfer destination, is stored into an IC card (11). When the data stored in the data storage unit (120) are required, the management information in the IC card (11) is given to the data transferring unit (130) and the relevant data are forwarded from the storage site that was the transfer destination to the data storage unit (120) and then downloaded to the terminal device (10). The limit of the storage capacity can thereby be overcome and damages due to viruses can be suppressed.
    Type: Application
    Filed: December 12, 2004
    Publication date: December 6, 2007
    Inventors: Yoshihiro Yano, Fukio Handa
  • Publication number: 20070226513
    Abstract: It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff ? and a staff ? belonging to the same project group, ? of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). ? of the reception side writes the variable code V(1) received from a in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.
    Type: Application
    Filed: May 2, 2005
    Publication date: September 27, 2007
    Inventors: Fukio Handa, Yoshihiro Yano, Takayuki Chikada, Syouzou Niwata
  • Publication number: 20070165860
    Abstract: It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff ? inputs a unique personal code P(?) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(?) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(?) in the IC card. Even if the company staff ? loses the IC card, it is possible to obtain the IC card having the same encryption key information K(?) as before by performing initialization again by using the IC card delivered by the IC card provider X.
    Type: Application
    Filed: May 2, 2005
    Publication date: July 19, 2007
    Inventors: Fukio Handa, Yoshihiro Yana, Takayuki Chikada, Syouzou Niwata
  • Publication number: 20070143288
    Abstract: When a user, who has logged onto an information processing apparatus (100), executes a logoff procedure, a saving unit (160) executes the following processes. Firstly, from among the files residing in a data storage unit (110), any files that are recognized as requiring a security protection and hence are to be saved are copied into an external storage device (300) via a network (200), and the original files in the data storage unit (110) are then deleted. At this moment, the address of the copy destination is stored, as management information, into a portable information recording medium (400) possessed by the user. When the user logs onto the information processing apparatus (100) again, a restoring unit (170) restores, based on the management information stored in the portable information recording medium (400), the files saved in the external storage device (300) into the data storage unit (110).
    Type: Application
    Filed: January 20, 2005
    Publication date: June 21, 2007
    Inventors: Kazutoshi Kichikawa, Yoshihiro Yano, Takayuki Chikada, Fukio Handa, Syouzou Niwata
  • Publication number: 20040111331
    Abstract: In order to give sufficient evidential admissibility to the content of a contract made online, contractual terms data C that shows a character string of contractual terms is prepared and stored by a processor on the side of a transacting party A. The data C is then transmitted to a processor on the side of a transacting party B, and is stored. A hash value ID2 of the contractual terms data C is calculated by the B-side processor, and a signature Sig2 of the party B is added and transmitted to the A-side processor as formal contractual proposal information. The signature Sig2 is verified by the A-side processor. A coincidence is verified between a hash value ID1 of the data C and the ID2 that has been transmitted. A signature Sig1 of the party A is added to a coinciding hash value ID, and is transmitted to the B-side processor as formal contractual acceptance information.
    Type: Application
    Filed: June 11, 2003
    Publication date: June 10, 2004
    Applicant: DAI NIPPON PRINTING CO., LTD.
    Inventors: Yoshihiro Yano, Fukio Handa
  • Patent number: 6711594
    Abstract: A distributed data archive device (1) is placed on an arbitrary location on a network (3) so that data can be saved and extracted. During data saving, a to-be-saved data file (F1) is given to the archive device (1), and a division/encryption means (13) carries out division/encryption, and individual divided files are distributed and saved onto data servers (2a, 2b, 2c) by a network communication means (16). A data management means (15) forms management data that shows a division/encryption method and a depository-destination data server, and records it onto a portable recording medium (10) during the data saving. During data extraction, the portable recording medium (10) is connected to an arbitrary archive device (1), and the management data is read. Based on this management data, the divided files are extracted from the depository destinations, and are reconstituted into the original data file (F1) by a decryption/integration means (14).
    Type: Grant
    Filed: August 13, 2001
    Date of Patent: March 23, 2004
    Assignee: Dai Nippon Printing Co., Ltd.
    Inventors: Yoshihiro Yano, Naoyuki Oshima, Fukio Handa
  • Publication number: 20020138504
    Abstract: A distributed data archive device (1) is placed on an arbitrary location on a network (3) so that data can be saved and extracted. During data saving, a to-be-saved data file (F1) is given to the archive device (1), and a division/encryption means (13) carries out division/encryption, and individual divided files are distributed and saved onto data servers (2a, 2b, 2c) by a network communication means (16). A data management means (15) forms management data that shows a division/encryption method and a depository-destination data server, and records it onto a portable recording medium (10) during the data saving. During data extraction, the portable recording medium (10) is connected to an arbitrary archive device (1), and the management data is read. Based on this management data, the divided files are extracted from the depository destinations, and are reconstituted into the original data file (F1) by a decryption/integration means (14).
    Type: Application
    Filed: August 13, 2001
    Publication date: September 26, 2002
    Inventors: Yoshihiro Yano, Naoyuki Oshima, Fukio Handa