Patents by Inventor Haruto Hirose
Haruto Hirose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10412742Abstract: Technologies are generally described for providing a wireless local area network. In some examples, a method performed under control of a first device may include connecting to an access point that is configured to provide a wireless local area network, transmitting, to a second device, a request of connecting to the first device, receiving, from the second device, a response of connecting to the first device, configuring an ad-hoc network group including the first device and the second device based, at least in part, on a network load of the first device and a network load of the second device, and providing a wireless local area network to the second device included in the ad-hoc network group.Type: GrantFiled: March 3, 2017Date of Patent: September 10, 2019Assignee: Empire Technology Development LLCInventor: Haruto Hirose
-
Patent number: 10021211Abstract: A method performed under control of a cloud system including a first proxy terminal may include connecting the first proxy terminal with a first end device, receiving, from the first end device, a first information regarding the first end device, and estimating a second information regarding the first end device based at least in part on the first information regarding the first end device. The estimating is performed when the first end device is disconnected from the first proxy terminal.Type: GrantFiled: May 10, 2013Date of Patent: July 10, 2018Assignee: Empire Technology Development LLCInventor: Haruto Hirose
-
Patent number: 9967800Abstract: Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a cloud system may include receiving, from an end device, first information including at least one of a location of the end device, a location of an access point to which the end device accesses, a media access control (MAC) address of the end device and a MAC address of the access point; determining that the end device moves to around the location of the access point and returns to around the location of the end device based at least in part on the first information; and instructing the access point to provide a wireless local area network to the end device with suppressed channel hopping.Type: GrantFiled: May 30, 2013Date of Patent: May 8, 2018Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Publication number: 20170181171Abstract: Technologies are generally described for providing a wireless local area network. In some examples, a method performed under control of a first device may include connecting to an access point that is configured to provide a wireless local area network, transmitting, to a second device, a request of connecting to the first device, receiving, from the second device, a response of connecting to the first device, configuring an ad-hoc network group including the first device and the second device based, at least in part, on a network load of the first device and a network load of the second device, and providing a wireless local area network to the second device included in the ad-hoc network group.Type: ApplicationFiled: March 3, 2017Publication date: June 22, 2017Applicant: Empire Technology Development LLCInventor: Haruto HIROSE
-
Patent number: 9591691Abstract: Technologies are generally described for providing a wireless local area network. In some examples, a method performed under control of a first device may include connecting to an access point that is configured to provide a wireless local area network, transmitting, to a second device, a request of connecting to the first device, receiving, from the second device, a response of connecting to the first device, configuring an ad-hoc network group including the first device and the second device based, at least in part, on a network load of the first device and a network load of the second device, and providing a wireless local area network to the second device included in the ad-hoc network group.Type: GrantFiled: June 20, 2013Date of Patent: March 7, 2017Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Patent number: 9582509Abstract: Technologies are generally described for managing data migration between databases. In some examples, a data migration management system may include a data migration management unit configured to manage a migration of data stored in a first database to a second database, a game management unit configured to design a game for the migration of at least some of the data managed by the data migration management unit and to provide the designed game to a player, and a player management unit configured to manage participation of the player for the game designed by the game management unit.Type: GrantFiled: August 21, 2012Date of Patent: February 28, 2017Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Patent number: 9361450Abstract: Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image.Type: GrantFiled: August 14, 2014Date of Patent: June 7, 2016Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Patent number: 9305158Abstract: In some examples, a method of authenticating is described. The method may include sending first repair parameters representing one or more first repair operations applied to a first marked image to generate a first repaired image to a first entity. The method may also include receiving, from the first entity, a second repaired image. The method may also include authenticating the first entity when the second repaired image received from the first entity matches the first repaired image.Type: GrantFiled: October 8, 2014Date of Patent: April 5, 2016Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Publication number: 20150296038Abstract: A method performed under control of a cloud system including a first proxy terminal may include connecting the first proxy terminal with a first end device, receiving, from the first end device, a first information regarding the first end device, and estimating a second information regarding the first end device based at least in part on the first information regarding the first end device. The estimating is performed when the first end device is disconnected from the first proxy terminal.Type: ApplicationFiled: May 10, 2013Publication date: October 15, 2015Inventor: Haruto HIROSE
-
Publication number: 20150131639Abstract: Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a cloud system may include receiving, from an end device, first information including at least one of a location of the end device, a location of an access point to which the end device accesses, a media access control (MAC) address of the end device and a MAC address of the access point; determining that the end device moves to around the location of the access point and returns to around the location of the end device based at least in part on the first information; and instructing the access point to provide a wireless local area network to the end device with suppressed channel hopping.Type: ApplicationFiled: May 30, 2013Publication date: May 14, 2015Inventor: Haruto Hirose
-
Publication number: 20150026788Abstract: In some examples, a method of authenticating is described. The method may include sending first repair parameters representing one or more first repair operations applied to a first marked image to generate a first repaired image to a first entity. The method may also include receiving, from the first entity, a second repaired image. The method may also include authenticating the first entity when the second repaired image received from the first entity matches the first repaired image.Type: ApplicationFiled: October 8, 2014Publication date: January 22, 2015Inventor: Haruto HIROSE
-
Publication number: 20140379797Abstract: Technologies are generally described for providing a wireless local area network. In some examples, a method performed under control of a first device may include connecting to an access point that is configured to provide a wireless local area network, transmitting, to a second device, a request of connecting to the first device, receiving, from the second device, a response of connecting to the first device, configuring an ad-hoc network group including the first device and the second device based, at least in part, on a network load of the first device and a network load of the second device, and providing a wireless local area network to the second device included in the ad-hoc network group.Type: ApplicationFiled: June 20, 2013Publication date: December 25, 2014Inventor: Haruto HIROSE
-
Publication number: 20140359743Abstract: Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image.Type: ApplicationFiled: August 14, 2014Publication date: December 4, 2014Inventor: Haruto HIROSE
-
Patent number: 8887255Abstract: In some examples, a method of authenticating is described. The method may include sending first repair parameters representing one or more first repair operations applied to a first marked image to generate a first repaired image to a first entity. The method may also include receiving, from the first entity, a second repaired image. The method may also include authenticating the first entity when the second repaired image received from the first entity matches the first repaired image.Type: GrantFiled: March 16, 2012Date of Patent: November 11, 2014Assignee: Empire Technology Development LLCInventor: Haruto Hirose
-
Publication number: 20140236901Abstract: Technologies are generally described for managing data migration between databases. In some examples, a data migration management system may include a data migration management unit,configured to manage a migration of data stored in a first database to a second database, a game management unit configured to design a game for the migration of at least some of the data managed by the data migration management unit and to provide the designed game to a player, and a player management unit configured to manage participation of the player for the game designed by the game management unit.Type: ApplicationFiled: August 21, 2012Publication date: August 21, 2014Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Patent number: 8813184Abstract: Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image.Type: GrantFiled: February 24, 2011Date of Patent: August 19, 2014Assignee: Empire Technology Development LLCInventor: Haruto Hirose
-
Patent number: 8740703Abstract: Technologies are described for generating random data. In some examples, a gaming device may include a game execution module, an extraction module, and a data generator. The game execution module may be configured to provide at least one player with a gaming service by continuously determining a plurality of parameters associated with the at least one player in a game operated by the at least one player. The extraction module may be configured to extract individual parameters from the plurality of determined parameters, the individual parameters having decorrelation with each other from a probability distribution perspective. The data generator may be configured to generate data items based on one or more of the extracted individual parameters, the data items being the extracted individual parameters or results of processing performed on the extracted individual parameters.Type: GrantFiled: March 16, 2012Date of Patent: June 3, 2014Assignee: Empire Technology Development LLCInventor: Haruto Hirose
-
Publication number: 20130288796Abstract: Technologies are described for generating random data. In some examples, a gaming device may include a game execution module, an extraction module, and a data generator. The game execution module may be configured to provide at least one player with a gaming service by continuously determining a plurality of parameters associated with the at least one player in a game operated by the at least one player. The extraction module may be configured to extract individual parameters from the plurality of determined parameters, the individual parameters having decorrelation with each other from a probability distribution perspective. The data generator may be configured to generate data items based on one or more of the extracted individual parameters, the data items being the extracted individual parameters or results of processing performed on the extracted individual parameters.Type: ApplicationFiled: March 16, 2012Publication date: October 31, 2013Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Publication number: 20130243340Abstract: In some examples, a method of authenticating is described. The method may include sending first repair parameters representing one or more first repair operations applied to a first marked image to generate a first repaired image to a first entity. The method may also include receiving, from the first entity, a second repaired image. The method may also include authenticating the first entity when the second repaired image received from the first entity matches the first repaired image.Type: ApplicationFiled: March 16, 2012Publication date: September 19, 2013Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose
-
Publication number: 20120222102Abstract: Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image.Type: ApplicationFiled: February 24, 2011Publication date: August 30, 2012Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Haruto Hirose