Patents by Inventor Hideyuki Hirano
Hideyuki Hirano has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11948958Abstract: The solid-state imaging element includes a photoelectric converter, a first separator, and a second separator. The photoelectric converter is configured to perform photoelectric conversion of incident light. The first separator configured to separate the photoelectric converter is formed in a first trench formed from a first surface side. The second separator configured to separate the photoelectric converter is formed in a second trench formed from a second surface side facing a first surface. The present technology is applicable to an individual imaging element mounted on, e.g., a camera and configured to acquire an image of an object.Type: GrantFiled: June 9, 2022Date of Patent: April 2, 2024Assignee: SONY GROUP CORPORATIONInventors: Hideyuki Honda, Tetsuya Uchida, Toshifumi Wakano, Yusuke Tanaka, Yoshiharu Kudoh, Hirotoshi Nomura, Tomoyuki Hirano, Shinichi Yoshida, Yoichi Ueda, Kosuke Nakanishi
-
Publication number: 20220291472Abstract: An optical fiber (10) capable of minimizing strength deterioration includes a core (11) and a clad (12) arranged around the core (11) such that part of the core (11) is exposed. A rough surface portion is provided at least at part of an outer surface of the exposed portion (11a) of the core (11) exposed through the clad (12). The arithmetic surface roughness Ra of the rough surface portion is equal to or greater than 0.2 ?m. The average length Rsm of a rough curve element of the rough surface portion is equal to or greater than 17 ?m.Type: ApplicationFiled: August 28, 2020Publication date: September 15, 2022Inventors: Hideyuki HIRANO, Keiichiro HIROSE, Syoji NAKAZONO, Akihiko KOYAMA, Takaya KONISHI, Ai TAKAHASHI, Masakatsu SETOGUCHI
-
Patent number: 7925882Abstract: Data application method enabling evaluations to be properly received while content is being protected, enabling content users to use only what they want to use in the amount they want to use it, and enabling advertising providers in certainty to have users use ads. The method includes: a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key; a step of generating watermarked second data in which the encryption key is embedded, as an invisible electronic watermark, into second data for permitting use unconditionally; and a step of compositing and distributing the encrypted first data and the watermarked second data.Type: GrantFiled: February 12, 2003Date of Patent: April 12, 2011Assignee: Fujitsu LimitedInventor: Hideyuki Hirano
-
Patent number: 7894092Abstract: A print image generating program is capable of printing information that discourages fraudulent distribution of printed documents, irrespective of the type of printer. A print image generating apparatus has an application, a printer driver, a print management unit, and a virtual driver, and is designed to add tracking information that discourages distribution of printed documents when print data is printed. The print management unit monitors print requests from the application. When detecting a print request which was output from the application to the printer driver, the print management unit acquires and interrupts the print request destined for the printer driver. When the virtual driver receives a command from the print management unit, it acquires print data and tracking information, and generates tracking print image data by adding the tracking information to the print data, and gives the generated data to the printer driver.Type: GrantFiled: April 22, 2008Date of Patent: February 22, 2011Assignees: Fujitsu Limited, Fujitsu Advanced Engineering LimitedInventors: Satoshi Kasai, Michihiro Hokamura, Teruo Kumakiri, Katsutoshi Sekimoto, Hideyuki Hirano, Tomohisa Misawa, Kensuke Tsurumaki
-
Patent number: 7506365Abstract: A document distributing method is proposed using access control information separated into invisible data embedded as an electronic watermark and visible data described in a structured document to achieve prevention of unauthorized alteration of document data, authentication thereof, and prevention of unauthorized access thereto.Type: GrantFiled: November 22, 2002Date of Patent: March 17, 2009Assignee: Fujitsu LimitedInventors: Hideyuki Hirano, Shinji Hashimoto
-
Publication number: 20080239362Abstract: A print image generating program is capable of printing information that discourages fraudulent distribution of printed documents, irrespective of the type of printer. A print image generating apparatus has an application, a printer driver, a print management unit, and a virtual driver, and is designed to add tracking information that discourages distribution of printed documents when print data is printed. The print management unit monitors print requests from the application. When detecting a print request which was output from the application to the printer driver, the print management unit acquires and interrupts the print request destined for the printer driver. When the virtual driver receives a command from the print management unit, it acquires print data and tracking information, and generates tracking print image data by adding the tracking information to the print data, and gives the generated data to the printer driver.Type: ApplicationFiled: April 22, 2008Publication date: October 2, 2008Applicants: FUJITSU LIMITED, FFC LIMITEDInventors: Satoshi Kasai, Michihiro Hokamura, Teruo Kumakiri, Katsutoshi Sekimoto, Hideyuki Hirano, Tomohisa Misawa, Kensuke Tsurumaki
-
Patent number: 7325247Abstract: An information management method restoring electronic data using backup information upon the loss of electronic data stored on a recording medium. Information stored in a predetermined area of the recording medium having medium-specific information is encrypted using medium-specific information or a key generated therefrom and is derived outside the predetermined area.Type: GrantFiled: March 8, 2001Date of Patent: January 29, 2008Assignee: Fujitsu LimitedInventors: Seigo Kotani, Takayuki Hasebe, Hideyuki Hirano
-
Patent number: 7145492Abstract: A data management method that by encrypting and distributing digital content prevents copyright infringement, and that prevents authorization information for decrypting the encrypted digital content from being damaged or otherwise lost. Encrypted content 45 is prepared by encrypting digital content 11 with a content key 44. A portion of the digital content 11 is extracted as sample data 41. A secret key 46, by which the content key 44 is encrypted with user information 14, is embedded as invisible information into the sample data 41, thus preparing watermarked sample data 47. The watermarked sample data 47 is synthesized with the encrypted content 45 to form synthesized data 48. The synthesized data 48 is distributed.Type: GrantFiled: April 27, 2000Date of Patent: December 5, 2006Assignee: Fujitsu LimitedInventors: Hideyuki Hirano, Seigo Kotani, Shinji Hashimoto
-
Patent number: 7046807Abstract: Data administration method which prevents the infringement of a copyright by encrypting and distributing digital content, and readily grasps which contents are contained in the digital content included in the data. Preparing symbol information symbolized so as to visually and auditorily recognize the contents of the digital content that conduct distribution (Step S12), embedding the symbol information in a header data section (Step S13), encrypting the digital content (Step S15), embedding consent information including the information on the contents key in the header data section as an electronic watermark (Step S16), and compositing the real data section and the consent-information-added header data section and distributing the composite data (Step S17).Type: GrantFiled: March 20, 2001Date of Patent: May 16, 2006Assignee: Fujitsu LimitedInventors: Hideyuki Hirano, Shinji Hashimoto, Eiki Hattori, Shigetoshi Mochizuki
-
Patent number: 6999947Abstract: There is provided a license devolution system for devolving the right of using as to contents. The license devolution system makes it possible to copy or distribute contents while contributing to a protection of the copyright for the contents. Contents is encrypted with a first key. The first key and use information are encrypted with a second key consisting of a media ID for identifying a first storage medium in which the first key and the use information are stored. In order to devolve the right of using as to the contents, the contents is transferred to a second storage medium of a destination of devolution in the form of encryption. The first key and the use information are decoded with the media ID of the first storage medium, and further encrypted with the media ID of the second storage medium of the destination of devolution into storage in the second storage medium of the destination of devolution.Type: GrantFiled: November 9, 1998Date of Patent: February 14, 2006Assignee: Fujitsu LimitedInventors: Kenichi Utsumi, Hideyuki Hirano, Seigo Kotani
-
Patent number: 6965996Abstract: Method of data operation facilitating utilization of legitimate users without violating the copyright and literary property of digital content. A part of digital content (11) is duplicated to create discrete data unit (43), and is encrypted with content key (45). Content key (45) and image-compositing information (42) are encrypted with secret key (47) to create authorization information (48). Content information (41) is visibly embedded in digital content (11). Authorization information-added data unit (50) in which authorization information (48) is embedded as invisible information and encrypted discrete data unit information (46) are composited into composite data (60), which is then distributed.Type: GrantFiled: November 30, 2000Date of Patent: November 15, 2005Assignee: Fujitsu LimitedInventors: Hideyuki Hirano, Seigo Kotani, Shinji Hashimoto, Kazuhiko Muramoto
-
Publication number: 20050144134Abstract: A data handling method is presented, which prevents unauthorized use of digital content, and in particular, prevents unauthorized secondary use of cache files stored in PCs of users who have downloaded digital content from a web server, and prevents secondary use by dead-copying of image data that is presented on a display. The data handling method includes a step of associating display content of data to be distributed with user environment information, and generating data generation information related to a method for reproducing data based on the display content; a step of processing the data to be distributed based on the data generation information, storing the data generation information in the data to be distributed, and layering and distributing the data; a step of obtaining the user environment information and looking up the data generation information included in the distributed data to select a data reproduction method; and a step of reproducing the distributed data.Type: ApplicationFiled: May 10, 2004Publication date: June 30, 2005Applicant: Fujitsu LimitedInventor: Hideyuki Hirano
-
Publication number: 20040044576Abstract: Document location information indicating a location of a document on a network is embedded in an image, which is included in an advertisement placed in a printed matter, by using an electronic watermark. The document includes detailed information about the advertisement. The electronic watermark is decoded with terminals TR used by readers R. The terminals TR access an information providing device SC based on the document location information included in the decoded information, and receive the document from the information providing device SC. An access totaling unit within the information providing device SC counts the number of accesses made from the terminals TR, whereby an effect of the advertisement is measured.Type: ApplicationFiled: August 29, 2003Publication date: March 4, 2004Applicant: Fujitsu LimitedInventors: Shinichirou Kurihara, Shouichi Yoshikawa, Hideyuki Hirano, Tomohisa Misawa, Maki Kubota
-
Patent number: 6687827Abstract: A method of using a series of data DT by a data processor is provided. The data are recorded over plural sections that can be managed on a recording medium. The method includes the steps of storing plural kinds of link information LA, LB for designating one or more sections of the data DT that enables the use in the recording medium ST in accordance with license levels, and enabling the use of the link information LA or LB corresponding to the license level that was selected by a user.Type: GrantFiled: November 29, 1999Date of Patent: February 3, 2004Assignee: Fujitsu LimitedInventor: Hideyuki Hirano
-
Patent number: 6687835Abstract: A command authorization method that prevents a command issued by a third party from impersonating a command issued by a legitimate user, thereby maintaining high security. An authorization code stored in a command transmitted from a host is collated in a command authorization code parser. If the authorization code coincides with collating information therein, a command parser generates a predetermined access command, which is executed by a command controller.Type: GrantFiled: July 6, 1999Date of Patent: February 3, 2004Assignee: Fujitsu LimitedInventors: Hideyuki Hirano, Takayuki Hasebe, Seigo Kotani
-
Publication number: 20030177093Abstract: A data management method that by encrypting and distributing digital content prevents copyright infringement, and that prevents authorization information for decrypting the encrypted digital content from being damaged or otherwise lost. Encrypted content 45 is prepared by encrypting digital content 11 with a content key 44. A portion of the digital content 11 is extracted as sample data 41. A secret key 46, by which the content key 44 is encrypted with user information 14, is embedded as invisible information into the sample data 41, thus preparing watermarked sample data 47. The watermarked sample data 47 is synthesized with the encrypted content 45 to form synthesized data 48. The synthesized data 48 is distributed.Type: ApplicationFiled: April 27, 2000Publication date: September 18, 2003Applicant: FUJITSU LIMITEDInventors: Hideyuki Hirano, Seigo Kotani, Shinji Hashimoto
-
Publication number: 20030154378Abstract: Data application method enabling evaluations to be properly received while content is being protected, enabling content users to use only what they want to use in the amount they want to use it, and enabling advertising providers in certainty to have users use ads. The method includes: a step of converting first data for permitting use based on predetermined conditions, into encrypted first data by means of a predetermined encryption key; a step of generating watermarked second data in which the encryption key is embedded, as an invisible electronic watermark, into second data for permitting use unconditionally; and a step of compositing and distributing the encrypted first data and the watermarked second data.Type: ApplicationFiled: February 12, 2003Publication date: August 14, 2003Applicant: Fujitsu LimitedInventor: Hideyuki Hirano
-
Publication number: 20030105950Abstract: A document distributing method is proposed using access control information separated into invisible data embedded as an electronic watermark and visible data described in a structured document to achieve prevention of unauthorized alteration of document data, authentication thereof, and prevention of unauthorized access thereto.Type: ApplicationFiled: November 22, 2002Publication date: June 5, 2003Applicant: Fujitsu LimitedInventors: Hideyuki Hirano, Shinji Hashimoto
-
Publication number: 20020059522Abstract: Data administration method which prevents the infringement of a copyright by encrypting and distributing digital content, and readily grasps which contents are contained in the digital content included in the data. Preparing symbol information symbolized so as to visually and auditorily recognize the contents of the digital content that conduct distribution (Step S12), embedding the symbol information in a header data section (Step S13), encrypting the digital content (Step S15), embedding consent information including the information on the contents key in the header data section as an electronic watermark (Step S16), and compositing the real data section and the consent-information-added header data section and distributing the composite data (Step S17).Type: ApplicationFiled: March 20, 2001Publication date: May 16, 2002Inventors: Hideyuki Hirano, Shinji Hashimoto, Eiki Hattori, Shigetoshi Mochizuki
-
Publication number: 20010032088Abstract: There is provided a license devolution system for devolving the right of using as to contents. The license devolution system makes it possible to copy or distribute contents while contributing to a protection of the copyright for the contents. Contents is encrypted with a first key. The first key and use information are encrypted with a second key consisting of a media ID for identifying a first storage medium in which the first key and the use information are stored. In order to devolve the right of using as to the contents, the contents is transferred to a second storage medium of a destination of devolution in the form of encryption. The first key and the use information are decoded with the media ID of the first storage medium, and further encrypted with the media ID of the second storage medium of the destination of devolution into storage in the second storage medium of the destination of devolution.Type: ApplicationFiled: November 9, 1998Publication date: October 18, 2001Applicant: FUJITSU LIMITEDInventors: Kenichi UTSUMI , Hideyuki Hirano , Seigo Kotani