Patents by Inventor Iwao Hatanaka

Iwao Hatanaka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10783141
    Abstract: A method includes: receiving, by a computing device, an initial question from a first user device; receiving, by the computing device, a plurality of additional questions from a plurality of additional user devices; decomposing, by the computing device, the initial question and each of the plurality of additional questions using natural language processing; determining, by the computing device, an overall ranking for each of a plurality of words in the plurality of decomposed questions; and generating, by the computing device, a new question by combining words based on the overall ranking.
    Type: Grant
    Filed: April 19, 2018
    Date of Patent: September 22, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary F. Diamanti, Mauro Marzorati, Aaron K. Baughman, Iwao Hatanaka
  • Patent number: 10585784
    Abstract: A mechanism is provided in a data processing system for performing regression testing on a question answering system instance. The mechanism trains a machine learning model for a question answering system using a ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a set of test questions, an answer to each test question, and a confidence level range for each answer to a corresponding test question. The mechanism runs regression test buckets across system nodes with domain-specific corpora and receiving results from the system nodes. Each system node implements a question answering system instance of the question answering system by executing in accordance with the machine learning model and by accessing domain-specific corpora. Each test bucket includes a set of questions matching a subset of questions in the ground truth virtual checksum.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gary F. Diamanti, Iwao Hatanaka, Mauro Marzorati, William A. Mills
  • Publication number: 20190325050
    Abstract: Methods and systems for natural language processing are disclosed. A method includes: receiving, by a computing device, an initial question from a first user device; receiving, by the computing device, a plurality of additional questions from a plurality of additional user devices; decomposing, by the computing device, the initial question and each of the plurality of additional questions using natural language processing; determining, by the computing device, an overall ranking for each of a plurality of words in the plurality of decomposed questions; and generating, by the computing device, a new question by combining words based on the overall ranking.
    Type: Application
    Filed: April 19, 2018
    Publication date: October 24, 2019
    Inventors: Gary F. DIAMANTI, Mauro MARZORATI, Aaron K. BAUGHMAN, Iwao HATANAKA
  • Patent number: 10425771
    Abstract: A cognitive security service receives, as input to a recurrent neural network, a matrix of regular locations and usage for a user at multiple times as reported by one or more mobile devices for the user via a network. The cognitive security service applies the matrix in the recurrent neural network to predict one or more next device locations for a next step in time, each of the one or more next device locations weighted with a separate probability. The cognitive security service generates, through the recurrent neural network, an alert in response to one or more selected location and selected usage weighted with the highest probability deviating from a current location of the one or more mobile devices beyond a threshold specified by the user.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: September 24, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary F. Diamanti, Iwao Hatanaka, Stephen J. Kenna, Mauro Marzorati
  • Publication number: 20190166466
    Abstract: A cognitive security service receives, as input to a recurrent neural network, a matrix of regular locations and usage for a user at multiple times as reported by one or more mobile devices for the user via a network. The cognitive security service applies the matrix in the recurrent neural network to predict one or more next device locations for a next step in time, each of the one or more next device locations weighted with a separate probability. The cognitive security service generates, through the recurrent neural network, an alert in response to one or more selected location and selected usage weighted with the highest probability deviating from a current location of the one or more mobile devices beyond a threshold specified by the user.
    Type: Application
    Filed: November 29, 2018
    Publication date: May 30, 2019
    Inventors: GARY F. DIAMANTI, IWAO HATANAKA, STEPHEN J. KENNA, MAURO MARZORATI
  • Publication number: 20190014441
    Abstract: A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and usage information reported by the one or more mobile devices via a network. The cognitive security service forecasts one or more selected locations and selected usage by the user with a highest probability of predictability at one or more future sequential times from among the regular locations and usage. The cognitive security service, responsive to detecting a current location of the one or more mobile devices for the user deviates from the one or more selected locations and selected usage beyond a threshold, triggers, via the network, one or more secondary levels of authentication at the one or more mobile devices, wherein the one or more secondary levels of authentication prevent data breaches on the one or more mobile devices through real-time, location aware data security.
    Type: Application
    Filed: October 24, 2017
    Publication date: January 10, 2019
    Inventors: GARY F. DIAMANTI, IWAO HATANAKA, STEPHEN J. KENNA, MAURO MARZORATI
  • Patent number: 10178508
    Abstract: A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and usage information reported by the one or more mobile devices via a network. The cognitive security service forecasts one or more selected locations and selected usage by the user with a highest probability of predictability at one or more future sequential times from among the regular locations and usage. The cognitive security service, responsive to detecting a current location of the one or more mobile devices for the user deviates from the one or more selected locations and selected usage beyond a threshold, triggers, via the network, one or more secondary levels of authentication at the one or more mobile devices, wherein the one or more secondary levels of authentication prevent data breaches on the one or more mobile devices through real-time, location aware data security.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: January 8, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary F. Diamanti, Iwao Hatanaka, Stephen J. Kenna, Mauro Marzorati
  • Patent number: 10142794
    Abstract: A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and usage information reported by the one or more mobile devices via a network. The cognitive security service forecasts one or more selected locations and selected usage by the user with a highest probability of predictability at one or more future sequential times from among the regular locations and usage. The cognitive security service, responsive to detecting a current location of the one or more mobile devices for the user deviates from the one or more selected locations and selected usage beyond a threshold, triggers, via the network, one or more secondary levels of authentication at the one or more mobile devices, wherein the one or more secondary levels of authentication prevent data breaches on the one or more mobile devices through real-time, location aware data security.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: November 27, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary F. Diamanti, Iwao Hatanaka, Stephen J. Kenna, Mauro Marzorati
  • Publication number: 20170169354
    Abstract: A mechanism is provided in a data processing system for performing regression testing on a question answering system instance. The mechanism trains a machine learning model for a question answering system using a ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a set of test questions, an answer to each test question, and a confidence level range for each answer to a corresponding test question. The mechanism runs regression test buckets across system nodes with domain-specific corpora and receiving results from the system nodes. Each system node implements a question answering system instance of the question answering system by executing in accordance with the machine learning model and by accessing domain-specific corpora. Each test bucket includes a set of questions matching a subset of questions in the ground truth virtual checksum.
    Type: Application
    Filed: December 10, 2015
    Publication date: June 15, 2017
    Inventors: Gary F. Diamanti, Iwao Hatanaka, Mauro Marzorati, William A. Mills
  • Patent number: 9471877
    Abstract: A mechanism is provided in a data processing system for performing a health check on a question answering system instance. The mechanism embeds a ground truth virtual checksum in a shared library accessible by the question answering system instance. The question answering system instance is trained using the ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a test question, an answer to the test question, and a confidence level range for the answer to the test question. Responsive to a health check monitor triggering a health check servlet executing on the question answering system instance, the health check servlet submits a test question from the ground truth virtual checksum to the question answering system instance and receives a result answer and a result confidence value.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gary F. Diamanti, Iwao Hatanaka, Mauro Marzorati, William A. Mills
  • Publication number: 20120327084
    Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.
    Type: Application
    Filed: April 25, 2012
    Publication date: December 27, 2012
    Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murali Menon
  • Patent number: 8194069
    Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: June 5, 2012
    Assignee: Gemvara, Inc.
    Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murali Menon
  • Patent number: 8140679
    Abstract: Systems and methods for automatically managing session resources in a distributed network of processors are disclosed. In one embodiment of the invention, a system for managing the use of resources in a system where a remote client uses resources at a server for a limited duration includes: a stored listing of at least one resource being used at the server and the client using that resource; a system which identifies that a remote client is no longer using resources at the server; and in response to the system identifying that the client is no longer using resources at the server, a mechanism which removes the resources which had been used by the client when the client was connected to the server, whereby the resources being used by a client may be used by other clients after the client has disconnected from the server.
    Type: Grant
    Filed: January 2, 2009
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventor: Iwao Hatanaka
  • Patent number: 8120489
    Abstract: An RFID workflow module can use metadata to indicate configurable elements. An administration console can use the metadata to produce a configuration page for the RFID workflow module. The configuration page can allow a user to configure the RFID workflow module.
    Type: Grant
    Filed: June 7, 2007
    Date of Patent: February 21, 2012
    Assignee: Oracle International Corporation
    Inventors: Iwao Hatanaka, Marc H. Horowitz, Rajesh Patel, Marina Yurievna Popova, Kenneth R. Traub
  • Publication number: 20110216062
    Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.
    Type: Application
    Filed: May 19, 2011
    Publication date: September 8, 2011
    Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murall Menon
  • Patent number: 7853983
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. Telemetry data is communicated between a data producing device and a data receiving device. The telemetry data sent from the data producing device is identified using the identity identifier of the data producing device.
    Type: Grant
    Filed: February 25, 2003
    Date of Patent: December 14, 2010
    Assignee: BEA Systems, Inc.
    Inventors: Scott D. Abrutyn, Linda Bernardi, David C. Douglas, Iwao Hatanaka, Kenneth R. Traub
  • Publication number: 20100169059
    Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.
    Type: Application
    Filed: January 7, 2010
    Publication date: July 1, 2010
    Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murali Menon
  • Patent number: 7528697
    Abstract: First and second RFID edge servers can interact with RFID tag readers. The first and second RFID edge servers can arbitrate which of the first and second RFID edge servers will be active upon start up or edge server failure.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: May 5, 2009
    Assignee: BEA Systems, Inc.
    Inventors: Iwao Hatanaka, Kenneth R. Traub
  • Publication number: 20090113050
    Abstract: A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. A session may terminate naturally because a program which is using the resource (such as a database) has completed its operation and ended normally. A session may also terminate unnaturally, e.g., because the connection between the client and the server has been broken for some reason or because a program has aborted or become hung in an inoperative state.
    Type: Application
    Filed: January 2, 2009
    Publication date: April 30, 2009
    Inventor: Iwao Hatanaka
  • Patent number: 7493391
    Abstract: A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. Because unnatural terminations do not normally provide a farewell message from the client to the server there is no way for the server to release the resource and no naturally occurring message to the server that the client is not present. The present invention overcomes these disadvantages by determining when a session has ended and releasing the resources associated with the client.
    Type: Grant
    Filed: February 12, 2001
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventor: Iwao Hatanaka