Patents by Inventor Makoto Fujiwara

Makoto Fujiwara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7419727
    Abstract: This invention has an objective to improve durability at elevated temperature in organic electroluminescent devices using coumarin derivatives as dopant in a luminescent layer. This invention attains the above objective by providing in the organic electroluminescent devices formed by laminating an anode, a hole injection layer, a hole transportation layer, a luminescent layer, an electron transportation layer and a cathode in this order, the luminescent layer which comprises as dopant the green light-emitting coumarin derivative and hole- and electron-transporting substances as host; said coumarin derivative consisting of a plurality of coumarin groups bound to an aromatic ring, heterocycle, or any combination thereof, and exhibiting a glass transition point of 150° C. or higher or a melting point of 297° C. or higher.
    Type: Grant
    Filed: February 12, 2004
    Date of Patent: September 2, 2008
    Assignee: Kabushiki Kaisha Hayashibara Seibutsu Kagaku Kenkyujo
    Inventors: Kazushige Kojima, Kojiro Tachi, Hisayoshi Fujikawa, Koji Noda, Masahiko Ishii, Yasunori Taga, Makoto Satsuki, Makoto Fujiwara, Natsuko Ishida, Sadaharu Suga
  • Publication number: 20080170686
    Abstract: The confidential information processing device according to the present invention includes: a stream analysis unit which determines the target data by analyzing the data stream; a cryptographic computation unit which holds a context including a key used for the cryptographic computation, an initial value, and intermediate information during cryptographic computation, and perform the cryptographic computation using the context that is being held; a context storage unit which stores a plurality of the contexts; a correspondence table storage unit which stores a correspondence table which indicates the number of cryptographic computations to be performed for the data stream and a context to be used for each of the cryptographic computations; a context control unit which, when the context held in the cryptographic computation unit does not match the context to be used indicated in the correspondence table, saves the context held in the cryptographic computation unit to the context storage unit and restore the con
    Type: Application
    Filed: January 8, 2008
    Publication date: July 17, 2008
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Yusuke NEMOTO, Yuishi TORISAKI, Makoto FUJIWARA, Satoru KURIKI, Masahiro SANO
  • Publication number: 20080144818
    Abstract: A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an external memory 100. In the encryption section 2, the operation of a private key arithmetic processing section 20 is prohibited with respect to a sequence whose execution is determined by a key-generation/update sequencer 30 to be impermissible. In the external I/F 50, a program processing section 51 and a data processing section 55 are structured independently from each other.
    Type: Application
    Filed: January 22, 2008
    Publication date: June 19, 2008
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Publication number: 20080131040
    Abstract: A bearing roller chain which is sealed by a seal mechanism which prevents entry of foreign substances from the outside and leakage of lubricating oil leakage from the inside to the outside, resulting in an improvement in wear resistance of the bearing roller and avoidance both of rotation failure of the roller and of increased traveling resistance of the chain. A seal mechanism is provided between an inner link plate of a bearing roller chain and a bearing roller assembly carried by the link plate. The bearing roller assembly is formed by a plurality of anti-friction rollers between a hollow roller and a bush. The seal mechanism comprises an inner annular oil seal member, a spacer and a disk-shaped seal member having a flange extended toward an outer side surface of the hollow roller loosely into an outer circumferential concave groove on an end surface of the hollow roller. The disk-shaped seal member slidably comes into close contact with the inner link plate and the spacer, respectively.
    Type: Application
    Filed: September 27, 2007
    Publication date: June 5, 2008
    Inventors: Makoto Fujiwara, Makoto Tanimura, Tetsuo Imamoto
  • Publication number: 20080124015
    Abstract: A bearing roller chain having a seal mechanism preventing entry of foreign substance from the outside, and leaking of lubricating oil leakage to the outside and the like, thereby improving wear resistance of the bearing roller and reducing both the likelihood of rotation failure and the traveling resistance of the chain. The seal mechanism is provided between an inner link plate of the chain and the hollow bearing roller, which has a plurality of internal anti-friction rollers rotatable between the hollow bearing roller and a bush mounted between opposed inner link plates. The seal mechanism encloses the internal anti-friction rollers and comprises two parts, i.e a seal ring having an annular lip portion, which comes into close contact with an outer side surface of the bearing roller and an annular metallic seal member.
    Type: Application
    Filed: September 26, 2007
    Publication date: May 29, 2008
    Inventors: Makoto FUJIWARA, Makoto Tanimura, Tetsuo Imamoto
  • Publication number: 20080104396
    Abstract: In an authentication method which carries out two-stage authentication operation processing constituted with a first authentication operation processing and a second authentication processing, authentication becomes authorized illegally if the same key as that of the first authentication operation processing is given to the second authentication processing. [MEANS FOR SOLVING PROBLEMS] Whether the authentication operation processing in action is the first authentication operation processing or the second authentication operation processing is clearly distinguished through judging the number of necessary authentication times and judging what number of the authentication operation processing the one under action is. Further, the values of each authentication intermediate key generated in the two-stage authentication operation processing are compared through a comparing circuit.
    Type: Application
    Filed: October 21, 2005
    Publication date: May 1, 2008
    Inventors: Tomoya Sato, Makoto Fujiwara
  • Publication number: 20080061512
    Abstract: In a seal chain, a seal mechanism disposed between opposed surfaces of inner and outer link plates comprises an elastic ring, a seal ring adhered to the outer link plate, an annular resin seal having a base adhered to the inner link plate, a tongue on the annular resin seal in abutting relationship with the outer link plate, and a ring-shaped plate adhered to the outer link plate. The elastic ring is held between an inclined surface formed on an end of a bushing that protrudes past the inner link plate, and an inclined inner surface of the seal ring. The inner circumferential surface of base of the annular resin seal slides on the outer circumferential surface of the seal ring.
    Type: Application
    Filed: July 18, 2007
    Publication date: March 13, 2008
    Applicant: Tsubakimoto Chain Co.
    Inventors: Kentaro Yamane, Makoto Fujiwara
  • Publication number: 20080058973
    Abstract: A first LSI moves to an energy saving state after saving the header analysis result from a header information analysis unit in a header analysis result storage unit. While the first LSI is in the energy-saving state, a second LSI reads and plays back audio data that is stored in a memory device based on the header analysis result that is saved in the header analysis result storage unit.
    Type: Application
    Filed: August 29, 2007
    Publication date: March 6, 2008
    Inventors: Tomohiro Hirata, Makoto Fujiwara, Kenichiro Uda
  • Patent number: 7340614
    Abstract: A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an external memory 100. In the encryption section 2, the operation of a private key arithmetic processing section 20 is prohibited with respect to a sequence whose execution is determined by a key-generation/update sequencer 30 to be impermissible. In the external I/F 50, a program processing section 51 and a data processing section 55 are structured independently from each other.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: March 4, 2008
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Publication number: 20080046759
    Abstract: In an LSI, a decoding section decodes an ID signal received externally and outputs the decoded signal. A fuse circuit writes the value represented by the decoded signal therein when an operation setting signal is active, and holds the written value when the operation setting signal is inactive. An ID RAM stores the value held in the fuse circuit as the ID. This enables installation of IDs of various values in LSIs only by changing the value of the ID signal.
    Type: Application
    Filed: August 15, 2007
    Publication date: February 21, 2008
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Makoto Fujiwara, Akira Motohara
  • Publication number: 20080034222
    Abstract: A mobile terminal adapted to reproduce an encrypted contents file stored in a predetermined storage area as an alert of an incoming call includes: a storage section for holding first plaintext data corresponding to a head portion of the encrypted contents file; decryption means for decrypting the encrypted contents file to generate second plaintext data; reproduction means for reproducing the first and second plaintext data; and authentication means for performing authentication processing related to use of the encrypted contents file. The reproduction means reproduces the first plaintext data and in succession to reproduction of the first plaintext data reproduces the second plaintext data when the mobile terminal receives a call. The authentication means performs the authentication processing simultaneously and in parallel with the reproduction of the first plaintext data by the reproduction means.
    Type: Application
    Filed: December 5, 2006
    Publication date: February 7, 2008
    Inventors: Yuishi Torisaki, Makoto Fujiwara
  • Publication number: 20080028233
    Abstract: An encryption process is employed in the LSI design so as to improve confidentiality of the circuit design data over conventional examples. In the encryption process, confidential circuit design data is encrypted to produce encrypted design data and a cipher key. The encrypted design data is provided to the user who conducts a design/verification process. The key is also provided as required. In the design/verification process, the encrypted design data is subjected to various processes without disclosing the contents of the original circuit. In a decoding process, the encrypted design data subjected to the design/verification process is decoded to produce original circuit design data.
    Type: Application
    Filed: November 20, 2006
    Publication date: January 31, 2008
    Applicant: Matsushita Electric Industrial Co., Ltd.
    Inventors: Kentaro Shiomi, Akira Motohara, Makoto Fujiwara, Toshiyuki Yokoyama, Katsuya Fujimura
  • Publication number: 20080010686
    Abstract: A secret information processing apparatus including: a control unit 102 storing access control levels assigned to resources in the apparatus and used as a standard in judging whether to permit an access to any resource from any external apparatus; a secret information storage unit 105 storing an update target program; and an internal CPU 103 that performs an update process for updating the update target program if an update request is received. The control unit 102 determines whether to permit accesses to the resources from the external apparatus, in accordance with the access control levels. The internal CPU 103 changes, during the update process, access control levels of resources, which are to be accessed by the update unit during the update process and whose access control levels indicate that accesses are permitted, to levels indicating that accesses are not permitted.
    Type: Application
    Filed: November 7, 2005
    Publication date: January 10, 2008
    Inventors: Yusuke Nemoto, Yuishi Torisaki, Makoto Fujiwara
  • Publication number: 20080000758
    Abstract: A wear resistant, heat resistant conveyor chain comprising a series of links, each having a heat resistant roller rotatably fitted onto a bush between inner plates. The links are interconnected in the longitudinal direction of the chain by outer plates, and connecting pins rotatably inserted into the bush. A wear resistant, heat resistant sleeve-shaped spacer protrudes beyond the end surfaces of the heat resistant rollers toward the right and left inner plates to eliminate any sliding contact between the end surface of the heat resistant roller and the inner side surface of the inner plate.
    Type: Application
    Filed: June 19, 2007
    Publication date: January 3, 2008
    Inventors: Takashi Nakagawa, Hiroki Ishida, Makoto Fujiwara, Ryutaro Nakamura
  • Patent number: 7304407
    Abstract: A linear oscillating actuator gives a smooth reciprocatory movement with a minimum of incidental vibrations or stresses. The actuator includes an oscillator carrying a permanent magnet as well as an output shaft which is adapted to be connected to drive a load, and a stator assembly carrying an electromagnet. The electromagnet generates a magnetic field which interacts with the permanent magnet to reciprocate the oscillator relative to the stator assembly in a linear path. A spring link is provided to resiliently support the oscillator to the stator assembly with a gap distance left therebetween for allowing the oscillator to reciprocate in the linear path. The spring link is configured to deform resiliently also in a direction other than along the linear path so as to allow the oscillator to move to and away from the stator assembly or to twist relative to the stator assembly.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: December 4, 2007
    Assignee: Matsushita Electric Works, Ltd.
    Inventors: Wataru Sanematsu, Satoshi Nakayama, Makoto Fujiwara, Chizuko Mishima, Youhei Ishigami
  • Patent number: 7284134
    Abstract: In an LSI, a decoding section decodes an ID signal received externally and outputs the decoded signal. A fuse circuit writes the value represented by the decoded signal therein when an operation setting signal is active, and holds the written value when the operation setting signal is inactive. An ID RAM stores the value held in the fuse circuit as the ID. This enables installation of IDs of various values in LSIs only by changing the value of the ID signal.
    Type: Grant
    Filed: August 30, 2002
    Date of Patent: October 16, 2007
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Makoto Fujiwara, Akira Motohara
  • Patent number: 7281136
    Abstract: An encryption process is employed in the LSI design so as to improve confidentiality of the circuit design data over conventional examples. In the encryption process, confidential circuit design data is encrypted to produce encrypted design data and a cipher key. The encrypted design data is provided to the user who conducts a design/verification process. The key is also provided as required. In the design/verification process, the encrypted design data is subjected to various processes without disclosing the contents of the original circuit. In a decoding process, the encrypted design data subjected to the design/verification process is decoded to produce original circuit design data.
    Type: Grant
    Filed: February 9, 2001
    Date of Patent: October 9, 2007
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Kentaro Shiomi, Akira Motohara, Makoto Fujiwara, Toshiyuki Yokoyama, Katsuya Fujimura
  • Publication number: 20070234138
    Abstract: A check computation circuit executes a computation corresponding to a computation for generating confidential CRC data, with respect to confidential data read from a non-volatile device. A comparison circuit compares the result of the computation in the check computation circuit with confidential CRC data read from the non-volatile device. When the result of the comparison indicates a mismatch, i.e., an error is detected, an encryption circuit encrypts the confidential data and the confidential CRC data using a secret key registered in a secret key register, and outputs the encrypted confidential data and confidential CRC data to the outside of a semiconductor integrated circuit.
    Type: Application
    Filed: February 8, 2007
    Publication date: October 4, 2007
    Inventors: Yuishi Torisaki, Makoto Fujiwara, Yusuke Nemoto
  • Publication number: 20070217785
    Abstract: A lens barrel comprising bayonet type mount projections to detachably attach to a lens-fitting unit of a camera body having a photographic region, wherein mount projections are formed to avoid cross-section of light path area where object light is introduced in the camera body.
    Type: Application
    Filed: March 15, 2007
    Publication date: September 20, 2007
    Applicant: NIKON CORPORATION
    Inventors: Makoto Fujiwara, Yuuichi Katagishi
  • Publication number: 20070217614
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Application
    Filed: May 14, 2007
    Publication date: September 20, 2007
    Applicant: Matsushita Electric Industrial Co., Ltd
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue