Patents by Inventor Kento TARUI

Kento TARUI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9746929
    Abstract: Aspects of the present disclosure provide a gesture recognition method and an apparatus for capturing gesture. The apparatus categorizes the raw data of a gesture into gesture elements, and utilizes the contextual dependency between the gesture elements to perform gesture recognition with a high degree of accuracy and small data size. A gesture may be formed by a sequence of one or more gesture elements.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: August 29, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Yoshihisa Maruya, Michael William Paddon, Matthew Christian Duggan, Kento Tarui
  • Patent number: 9578508
    Abstract: System, apparatus, and methods are provided for protecting against malicious infrastructure in a wireless communication network. A system determines a trust metric for an access point and decides to avoid communication with the access point based on the trust metric for the access point. The trust metric may, for example, be a numeric value such as a probability of trustworthiness or a categorization of trustworthiness. The system may determine the trust metric by receiving a list of access points and their corresponding trust metrics and matching a potential access point to its listed trust metric. The system may try to avoid using an untrustworthy access point's services unless it deems the services important enough to risk the communication.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: February 21, 2017
    Assignee: QUALCOMM INCORPORATED
    Inventors: Matthew C. Duggan, Michael William Paddon, Kento Tarui
  • Publication number: 20160371368
    Abstract: In an embodiment, search parameters in a series of search queries directed to a target node of a semi-structured database are categorized as frequently recurring parameters. A partial search query template is populated with shortcut information related to the search parameters, and then used to facilitate execution of a new search query that includes the same search parameters. In another embodiment, an index is generated that links search parameters that return intermediate search result values to search result values that are configured to be obtained when a search is conducted on the intermediate search result values. The index can be generated based upon monitoring of actual searches within the semi-structured database, or alternatively based upon an inspection of the semi-structured database itself.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Craig Matthew BROWN, Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI, Xavier Claude FRANC, Lei NI, Louis PAN, Joel Timothy BEACH
  • Publication number: 20160371392
    Abstract: In an embodiment, a server indexes, in a label-path indexed database, a first data entry at a first target node with a given node identifier in accordance with a label-path indexing protocol. After determining that a number of paths from the root node to non-root nodes that share the given node identifier exceeds a threshold, the server indexes a second data entry at a second target node with the given node identifier in a flat-indexed database in accordance with a flat indexing protocol. In an alternative embodiment, the server indexes the first data entry redundantly in both the label-path indexed database and the flat-indexed database while the path number does not exceed the threshold. When the path number exceeds the threshold, the second data entry is indexed in the flat-indexed database only.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Craig Matthew BROWN, Xavier Claude FRANC, Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI
  • Publication number: 20160232346
    Abstract: The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or some other suitable architecture. In some aspects, a taint checking mechanism is implemented within a register file, memory management, and an instruction set of such an architecture. To this end, an indication of whether the data stored in a given physical memory location is tainted is stored along with the physical memory location. For example, a register can include a bit for a corresponding taint flag, a memory page can include a bit for a corresponding taint flag, and an input/output (I/O) port can include a bit for a corresponding taint flag.
    Type: Application
    Filed: February 5, 2015
    Publication date: August 11, 2016
    Inventors: Michael William Paddon, Matthew Christian Duggan, Craig Brown, Kento Tarui
  • Publication number: 20160124512
    Abstract: Aspects of the present disclosure provide a gesture recognition method and an apparatus for capturing gesture. The apparatus categorizes the raw data of a gesture into gesture elements, and utilizes the contextual dependency between the gesture elements to perform gesture recognition with a high degree of accuracy and small data size. A gesture may be formed by a sequence of one or more gesture elements.
    Type: Application
    Filed: November 20, 2014
    Publication date: May 5, 2016
    Inventors: Yoshihisa Maruya, Michael William Paddon, Matthew Christian Duggan, Kento Tarui
  • Publication number: 20150127927
    Abstract: Embodiments of the disclosure provide efficient hardware dispatching of concurrent functions in multicore processors, and related processor systems, methods, and computer-readable media. In one embodiment, a first instruction indicating an operation requesting a concurrent transfer of program control is detected in a first hardware thread of a multicore processor. A request for the concurrent transfer of program control is enqueued in a hardware first-in-first-out (FIFO) queue. A second instruction indicating an operation dispatching the request for the concurrent transfer of program control in the hardware FIFO queue is detected in a second hardware thread of the multicore processor. The request for the concurrent transfer of program control is dequeued from the hardware FIFO queue, and the concurrent transfer of program control is executed in the second hardware thread.
    Type: Application
    Filed: March 25, 2014
    Publication date: May 7, 2015
    Applicant: QUALCOMM INCORPORATED
    Inventors: Michael William Paddon, Erik Asmussen de Castro Lopo, Matthew Christian Duggan, Kento Tarui, Craig Matthew Brown
  • Publication number: 20140267047
    Abstract: Methods, systems and devices for handling an inappropriate input method used on a text input device receiving a user input entered with a first input method active in the form of a first set of discrete interactions with the device. The text input device may receive the first user input through the first input method and a second input method. At least one of the first and second input methods provides a conversion of the first user input to a symbol associated with a character set not shown on the text input device. A first orthographical incompatibility between the first user input and at least one of the first input method and the second input method may be determined. An indication may be output that an inappropriate input method was used based on the orthographical incompatibility.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: QUALCOMM INCORPORATED
    Inventors: Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI
  • Publication number: 20140273949
    Abstract: System, apparatus, and methods are provided for protecting against malicious infrastructure in a wireless communication network. A system determines a trust metric for an access point and decides to avoid communication with the access point based on the trust metric for the access point. The trust metric may, for example, be a numeric value such as a probability of trustworthiness or a categorization of trustworthiness. The system may determine the trust metric by receiving a list of access points and their corresponding trust metrics and matching a potential access point to its listed trust metric. The system may try to avoid using an untrustworthy access point's services unless it deems the services important enough to risk the communication.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Matthew C. DUGGAN, Michael William PADDON, Kento TARUI