Patents by Inventor Iwao Hatanaka
Iwao Hatanaka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10783141Abstract: A method includes: receiving, by a computing device, an initial question from a first user device; receiving, by the computing device, a plurality of additional questions from a plurality of additional user devices; decomposing, by the computing device, the initial question and each of the plurality of additional questions using natural language processing; determining, by the computing device, an overall ranking for each of a plurality of words in the plurality of decomposed questions; and generating, by the computing device, a new question by combining words based on the overall ranking.Type: GrantFiled: April 19, 2018Date of Patent: September 22, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary F. Diamanti, Mauro Marzorati, Aaron K. Baughman, Iwao Hatanaka
-
Patent number: 10585784Abstract: A mechanism is provided in a data processing system for performing regression testing on a question answering system instance. The mechanism trains a machine learning model for a question answering system using a ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a set of test questions, an answer to each test question, and a confidence level range for each answer to a corresponding test question. The mechanism runs regression test buckets across system nodes with domain-specific corpora and receiving results from the system nodes. Each system node implements a question answering system instance of the question answering system by executing in accordance with the machine learning model and by accessing domain-specific corpora. Each test bucket includes a set of questions matching a subset of questions in the ground truth virtual checksum.Type: GrantFiled: December 10, 2015Date of Patent: March 10, 2020Assignee: International Business Machines CorporationInventors: Gary F. Diamanti, Iwao Hatanaka, Mauro Marzorati, William A. Mills
-
Publication number: 20190325050Abstract: Methods and systems for natural language processing are disclosed. A method includes: receiving, by a computing device, an initial question from a first user device; receiving, by the computing device, a plurality of additional questions from a plurality of additional user devices; decomposing, by the computing device, the initial question and each of the plurality of additional questions using natural language processing; determining, by the computing device, an overall ranking for each of a plurality of words in the plurality of decomposed questions; and generating, by the computing device, a new question by combining words based on the overall ranking.Type: ApplicationFiled: April 19, 2018Publication date: October 24, 2019Inventors: Gary F. DIAMANTI, Mauro MARZORATI, Aaron K. BAUGHMAN, Iwao HATANAKA
-
Patent number: 10425771Abstract: A cognitive security service receives, as input to a recurrent neural network, a matrix of regular locations and usage for a user at multiple times as reported by one or more mobile devices for the user via a network. The cognitive security service applies the matrix in the recurrent neural network to predict one or more next device locations for a next step in time, each of the one or more next device locations weighted with a separate probability. The cognitive security service generates, through the recurrent neural network, an alert in response to one or more selected location and selected usage weighted with the highest probability deviating from a current location of the one or more mobile devices beyond a threshold specified by the user.Type: GrantFiled: November 29, 2018Date of Patent: September 24, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary F. Diamanti, Iwao Hatanaka, Stephen J. Kenna, Mauro Marzorati
-
Publication number: 20190166466Abstract: A cognitive security service receives, as input to a recurrent neural network, a matrix of regular locations and usage for a user at multiple times as reported by one or more mobile devices for the user via a network. The cognitive security service applies the matrix in the recurrent neural network to predict one or more next device locations for a next step in time, each of the one or more next device locations weighted with a separate probability. The cognitive security service generates, through the recurrent neural network, an alert in response to one or more selected location and selected usage weighted with the highest probability deviating from a current location of the one or more mobile devices beyond a threshold specified by the user.Type: ApplicationFiled: November 29, 2018Publication date: May 30, 2019Inventors: GARY F. DIAMANTI, IWAO HATANAKA, STEPHEN J. KENNA, MAURO MARZORATI
-
Publication number: 20190014441Abstract: A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and usage information reported by the one or more mobile devices via a network. The cognitive security service forecasts one or more selected locations and selected usage by the user with a highest probability of predictability at one or more future sequential times from among the regular locations and usage. The cognitive security service, responsive to detecting a current location of the one or more mobile devices for the user deviates from the one or more selected locations and selected usage beyond a threshold, triggers, via the network, one or more secondary levels of authentication at the one or more mobile devices, wherein the one or more secondary levels of authentication prevent data breaches on the one or more mobile devices through real-time, location aware data security.Type: ApplicationFiled: October 24, 2017Publication date: January 10, 2019Inventors: GARY F. DIAMANTI, IWAO HATANAKA, STEPHEN J. KENNA, MAURO MARZORATI
-
Patent number: 10178508Abstract: A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and usage information reported by the one or more mobile devices via a network. The cognitive security service forecasts one or more selected locations and selected usage by the user with a highest probability of predictability at one or more future sequential times from among the regular locations and usage. The cognitive security service, responsive to detecting a current location of the one or more mobile devices for the user deviates from the one or more selected locations and selected usage beyond a threshold, triggers, via the network, one or more secondary levels of authentication at the one or more mobile devices, wherein the one or more secondary levels of authentication prevent data breaches on the one or more mobile devices through real-time, location aware data security.Type: GrantFiled: October 24, 2017Date of Patent: January 8, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary F. Diamanti, Iwao Hatanaka, Stephen J. Kenna, Mauro Marzorati
-
Patent number: 10142794Abstract: A cognitive security service learns regular locations and usage of one or more mobile devices for a user at multiple times based on aggregated location and usage information reported by the one or more mobile devices via a network. The cognitive security service forecasts one or more selected locations and selected usage by the user with a highest probability of predictability at one or more future sequential times from among the regular locations and usage. The cognitive security service, responsive to detecting a current location of the one or more mobile devices for the user deviates from the one or more selected locations and selected usage beyond a threshold, triggers, via the network, one or more secondary levels of authentication at the one or more mobile devices, wherein the one or more secondary levels of authentication prevent data breaches on the one or more mobile devices through real-time, location aware data security.Type: GrantFiled: July 10, 2017Date of Patent: November 27, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary F. Diamanti, Iwao Hatanaka, Stephen J. Kenna, Mauro Marzorati
-
Publication number: 20170169354Abstract: A mechanism is provided in a data processing system for performing regression testing on a question answering system instance. The mechanism trains a machine learning model for a question answering system using a ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a set of test questions, an answer to each test question, and a confidence level range for each answer to a corresponding test question. The mechanism runs regression test buckets across system nodes with domain-specific corpora and receiving results from the system nodes. Each system node implements a question answering system instance of the question answering system by executing in accordance with the machine learning model and by accessing domain-specific corpora. Each test bucket includes a set of questions matching a subset of questions in the ground truth virtual checksum.Type: ApplicationFiled: December 10, 2015Publication date: June 15, 2017Inventors: Gary F. Diamanti, Iwao Hatanaka, Mauro Marzorati, William A. Mills
-
Patent number: 9471877Abstract: A mechanism is provided in a data processing system for performing a health check on a question answering system instance. The mechanism embeds a ground truth virtual checksum in a shared library accessible by the question answering system instance. The question answering system instance is trained using the ground truth virtual checksum as part of a ground truth including domain-specific ground truth. The ground truth virtual checksum comprises a test question, an answer to the test question, and a confidence level range for the answer to the test question. Responsive to a health check monitor triggering a health check servlet executing on the question answering system instance, the health check servlet submits a test question from the ground truth virtual checksum to the question answering system instance and receives a result answer and a result confidence value.Type: GrantFiled: December 10, 2015Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Gary F. Diamanti, Iwao Hatanaka, Mauro Marzorati, William A. Mills
-
Publication number: 20120327084Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.Type: ApplicationFiled: April 25, 2012Publication date: December 27, 2012Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murali Menon
-
Patent number: 8194069Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.Type: GrantFiled: May 19, 2011Date of Patent: June 5, 2012Assignee: Gemvara, Inc.Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murali Menon
-
Method and system for automated session resource clean-up in a distributed client-server environment
Patent number: 8140679Abstract: Systems and methods for automatically managing session resources in a distributed network of processors are disclosed. In one embodiment of the invention, a system for managing the use of resources in a system where a remote client uses resources at a server for a limited duration includes: a stored listing of at least one resource being used at the server and the client using that resource; a system which identifies that a remote client is no longer using resources at the server; and in response to the system identifying that the client is no longer using resources at the server, a mechanism which removes the resources which had been used by the client when the client was connected to the server, whereby the resources being used by a client may be used by other clients after the client has disconnected from the server.Type: GrantFiled: January 2, 2009Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventor: Iwao Hatanaka -
Patent number: 8120489Abstract: An RFID workflow module can use metadata to indicate configurable elements. An administration console can use the metadata to produce a configuration page for the RFID workflow module. The configuration page can allow a user to configure the RFID workflow module.Type: GrantFiled: June 7, 2007Date of Patent: February 21, 2012Assignee: Oracle International CorporationInventors: Iwao Hatanaka, Marc H. Horowitz, Rajesh Patel, Marina Yurievna Popova, Kenneth R. Traub
-
Publication number: 20110216062Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.Type: ApplicationFiled: May 19, 2011Publication date: September 8, 2011Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murall Menon
-
Patent number: 7853983Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. Telemetry data is communicated between a data producing device and a data receiving device. The telemetry data sent from the data producing device is identified using the identity identifier of the data producing device.Type: GrantFiled: February 25, 2003Date of Patent: December 14, 2010Assignee: BEA Systems, Inc.Inventors: Scott D. Abrutyn, Linda Bernardi, David C. Douglas, Iwao Hatanaka, Kenneth R. Traub
-
Publication number: 20100169059Abstract: A computer system includes a three-dimensional model of an object such as a piece of jewelry. The model is divided into multiple layers, each of which contains one or more components of the object. Each layer is associated with one or more attribute types, each of which is associated with a corresponding plurality of possible attribute values. The system pre-renders each layer with each possible attribute type and each possible attribute value for that type and layer. The resulting layer renderings may be combined with each other to produce personalized renderings of the entire object without the need to pre-render all possible combinations of attribute values. Responsibility for rendering the layers and the final complete object personalization may be divided between client and server in a variety of ways to increase efficiency.Type: ApplicationFiled: January 7, 2010Publication date: July 1, 2010Inventors: Grant Thomas-Lepore, Iwao Hatanaka, Murali Menon
-
Patent number: 7528697Abstract: First and second RFID edge servers can interact with RFID tag readers. The first and second RFID edge servers can arbitrate which of the first and second RFID edge servers will be active upon start up or edge server failure.Type: GrantFiled: May 31, 2007Date of Patent: May 5, 2009Assignee: BEA Systems, Inc.Inventors: Iwao Hatanaka, Kenneth R. Traub
-
METHOD AND SYSTEM FOR AUTOMATED SESSION RESOURCE CLEAN-UP IN A DISTRIBUTED CLIENT-SERVER ENVIRONMENT
Publication number: 20090113050Abstract: A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. A session may terminate naturally because a program which is using the resource (such as a database) has completed its operation and ended normally. A session may also terminate unnaturally, e.g., because the connection between the client and the server has been broken for some reason or because a program has aborted or become hung in an inoperative state.Type: ApplicationFiled: January 2, 2009Publication date: April 30, 2009Inventor: Iwao Hatanaka -
Patent number: 7493391Abstract: A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. Because unnatural terminations do not normally provide a farewell message from the client to the server there is no way for the server to release the resource and no naturally occurring message to the server that the client is not present. The present invention overcomes these disadvantages by determining when a session has ended and releasing the resources associated with the client.Type: GrantFiled: February 12, 2001Date of Patent: February 17, 2009Assignee: International Business Machines CorporationInventor: Iwao Hatanaka