Patents by Inventor Masaharu Sakamoto

Masaharu Sakamoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110231803
    Abstract: Optical wave data for a semiconductor device design is divided into regions. First wavefront engineering is performed on the wave data of each region, accounting for just the wave data of each region and not accounting for the wave data of neighboring regions of each region. The optical wave data of each region is normalized based on results of the first wavefront engineering. Second wavefront engineering is performed on the wave data of each region, based at least on the wave data of each region as has been normalized. The second wavefront engineering takes into account the wave data of each region and a guard band around each region that includes the wave data of the neighboring regions of each region. The second wavefront engineering can be sequentially performed by organizing the regions into groups, and sequentially performing the second wavefront engineering on the regions of each group in parallel.
    Type: Application
    Filed: March 16, 2010
    Publication date: September 22, 2011
    Inventors: Tadanobu Inoue, David O. Melville, Hidemasa Muta, Alan E. Rosenbluth, Kehan Tian, Masaharu Sakamoto, Saeed Bagheri
  • Patent number: 7934063
    Abstract: A method of invoking power processor element (PPE) serviced C library functions on a synergistic processing element (SPE) running in isolated mode. When the SPE initiates a PPE-serviced function, an SPE stub routine allocates a parameter buffer in an open area of a local store (LS) memory within the SPE. The LS memory includes an open area accessible to the PPE, and an isolated area inaccessible to the PPE. The SPE stub routine copies function parameters corresponding to the PPE-serviced function to a buffer within the open area of the LS memory, and writes a message word, which contains an identification variable of the PPE-serviced function and a location variable of the function parameters, to the open area. When execution is temporarily suspended on the SPE, the PPE reads the message word from the open area of the LS memory and executes the PPE-serviced function.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: April 26, 2011
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Wilfred E. Plouffe, Jr., Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 7886162
    Abstract: A method, computer program product, and data processing system for executing larger-than-physical-memory applications while protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault or page fault detection are disclosed. Large applications are accommodated by providing a mechanism for secure program overlays, in which a single large application is broken into two or more smaller applications (overlays) that can be executed from the same memory space by overwriting one of the smaller applications with another of the smaller applications when the latter needs to be executed. So that the data may be shared among these smaller applications, each of the applications contains embedded cryptographic keys, which may be used to encrypt or decrypt information to be stored persistently while control is transferred from one application to the other.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: February 8, 2011
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Masaharu Sakamoto, Vladimir Zbarsky
  • Publication number: 20100153903
    Abstract: The manufacturability of a lithographic mask employed in fabricating instances of a semiconductor device is determined. Target edge pairs are selected from mask layout data of the lithographic mask, for determining a manufacturing penalty in making the lithographic mask. The mask layout data includes polygons, where each polygon has a number of edges. Each target edge pair is defined by two of the edges of one or more of the polygons. The manufacturability of the lithographic mask, including the manufacturing penalty in making the lithographic mask, is determined. Determining the manufacturing penalty is based on the target edge pairs as selected. Determining the manufacturability of the lithographic mask uses continuous derivatives characterizing the manufacturability of the lithographic mask on a continuous scale. The manufacturability of the lithographic mask is output. The manufacturability of the lithographic mask is dependent on the manufacturing penalty in making the lithographic mask.
    Type: Application
    Filed: December 14, 2008
    Publication date: June 17, 2010
    Inventors: Tadanobu Inoue, David O. Melville, Hidemasa Muta, Kehan Tian, Masaharu Sakamoto, Alan E. Rosenbluth
  • Publication number: 20100153902
    Abstract: The manufacturability of a lithographic mask employed in fabricating instances of a semiconductor device is determined. Target edges are selected from mask layout data of the lithographic mask. The mask layout data includes polygons distributed over cells, where each polygon has edges. The cells include a center cell, two vertical cells above and below the center cell, and two horizontal cells to the left and right of the center cell. Target edge pairs are selected for determining a manufacturing penalty in making the lithographic mask, in a manner that decreases the computational volume in determining the manufacturing penalty. The manufacturability of the lithographic mask, including the manufacturing penalty in making the lithographic mask, is determined based on the target edge pairs selected. The manufacturability of the lithographic mask is output. The manufacturability of the lithographic mask is dependent on the manufacturing penalty in making the lithographic mask.
    Type: Application
    Filed: December 14, 2008
    Publication date: June 17, 2010
    Inventors: Tadanobu Inoue, David O. Melville, Hidemasa Muta, Kehan Tian, Masaharu Sakamoto, Alan E. Rosenbluth
  • Publication number: 20100153901
    Abstract: The manufacturability of a lithographic mask employed in fabricating instances of a semiconductor device is determined. Target edge pairs are selected from mask layout data of the lithographic mask to determine a manufacturing penalty in making the lithographic mask. The mask layout data includes polygons, where each polygon has edges, and where each target edge pair is defined by two of the edges of one or more of the polygons. The number of the target edge pairs is reduced to decrease computational volume in determining the manufacturing penalty in making the lithographic mask. The manufacturability of the lithographic mask, including the manufacturing penalty in making the lithographic mask, is determined based on the target edge pairs as reduced in number. The manufacturability of the lithographic mask is output. The manufacturability of the lithographic mask is dependent on the manufacturing penalty in making the lithographic mask.
    Type: Application
    Filed: December 14, 2008
    Publication date: June 17, 2010
    Inventors: Tadanobu Inoue, David O. Melville, Hidemasa Muta, Kehan Tian, Masaharu Sakamoto, Alan E. Rosenbluth
  • Patent number: 7593528
    Abstract: To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: September 22, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kohichi Kamijoh, Masaharu Sakamoto
  • Patent number: 7590238
    Abstract: To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: September 15, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kohichi Kamijoh, Masaharu Sakamoto
  • Patent number: 7520443
    Abstract: A method for extracting invisible information from an object in which visible information overlaps with at least part of invisible information formed in stealth ink. The method includes the steps of: irradiating the object with light for making the stealth ink luminous; receiving reflected light from the object; extracting image information from the received reflected light; splitting the image information into a plurality of pieces of color-channel information; obtaining a correlation function between the pixel values of at least two color-channel information selected from the plurality of pieces of color-channel information; reducing a visible information component of selected one of the plurality of pieces of color-channel information to thereby interpolate the color-channel information; and extracting invisible information from the interpolated one piece of color-channel information.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: April 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: Koichi Kamijoh, Noboru Kamijoh, Junji Maeda, Masaharu Sakamoto
  • Publication number: 20090089579
    Abstract: A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for users to execute software from independent software developers, an administrative user may disable the above-described vendor key-checking as an option.
    Type: Application
    Filed: October 2, 2007
    Publication date: April 2, 2009
    Inventors: Masana Murase, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 7509629
    Abstract: To provide a UML design method by which architecture design pursuing optimal design parameters while viewing the overall target system on the UML model can be performed. A UML design method of the present invention is a UML design method for performing design by modeling a target system based on Unified Modeling Language (UML), using a profile storing a design parameter, the method including the steps of: storing a stereotype and a tagged value in the profile as the design parameters; annotating a UML model of the target system with the stored stereotype and tagged value; and associating the added stereotype and tagged value with each class constituting the UML model, and displaying the stereotype and tagged value and the UML model, which are associated, on a graphical user interface.
    Type: Grant
    Filed: May 11, 2005
    Date of Patent: March 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Masaharu Sakamoto, Takaaki Murao, Naoto Sato, Shin Saito
  • Patent number: 7502739
    Abstract: In generation of an intonation pattern of a speech synthesis, a speech synthesis system is capable of providing a highly natural speech and capable of reproducing speech characteristics of a speaker flexibly and accurately by effectively utilizing FO patterns of actual speech accumulated in a database. An intonation generation method generates an intonation of synthesized speech for text by estimating, based on language information of the text and based on the estimated outline of the intonation, and then selects an optimum intonation pattern from a database which stores intonation patterns of actual speech. Speech characteristics recorded in advance are reflected in an estimation of an outline of the intonation pattern and selection of a waveform element of a speech.
    Type: Grant
    Filed: January 24, 2005
    Date of Patent: March 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Takashi Saito, Masaharu Sakamoto
  • Publication number: 20090013376
    Abstract: Provided is a system which manages a user community provided in an information processing system, in which user community information provided by a user is made available to another user for reference. The system includes a storage section which stores an audit policy defining contents of information to be permitted to be registered in each of a plurality of communities, by associating the audit policy with each of the communities; a detection section which detects a community to which information is provided in response to provision of the information by a user; and a registration control section which inhibits registration of information, provided by a user, in a detected user community on condition that the information violates an audit policy corresponding to the user community.
    Type: Application
    Filed: September 8, 2008
    Publication date: January 8, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: HIDEAKI IWASAKI, KOICHI KAMIJOH, KAZUHISA MISONO, MAKOTO MIYAKAWA, MASAHARU SAKAMOTO
  • Publication number: 20080301468
    Abstract: A method, computer program product, and data processing system for executing larger-than-physical-memory applications while protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault or page fault detection are disclosed. Large applications are accommodated by providing a mechanism for secure program overlays, in which a single large application is broken into two or more smaller applications (overlays) that can be executed from the same memory space by overwriting one of the smaller applications with another of the smaller applications when the latter needs to be executed. So that the data may be shared among these smaller applications, each of the applications contains embedded cryptographic keys, which may be used to encrypt or decrypt information to be stored persistently while control is transferred from one application to the other.
    Type: Application
    Filed: May 29, 2007
    Publication date: December 4, 2008
    Inventors: Masana Murase, Wilfred E. Plouffe, JR., Kanna Shimizu, Masaharu Sakamoto, Vladimir Zbarsky
  • Publication number: 20080244612
    Abstract: A method of invoking power processor element (PPE) serviced C library functions on a synergistic processing element (SPE) running in isolated mode. When the SPE initiates a PPE-serviced function, an SPE stub routine allocates a parameter buffer in an open area of a local store (LS) memory within the SPE. The LS memory includes an open area accessible to the PPE, and an isolated area inaccessible to the PPE. The SPE stub routine copies function parameters corresponding to the PPE-serviced function to a buffer within the open area of the LS memory, and writes a message word, which contains an identification variable of the PPE-serviced function and a location variable of the function parameters, to the open area. When execution is temporarily suspended on the SPE, the PPE reads the message word from the open area of the LS memory and executes the PPE-serviced function.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 2, 2008
    Inventors: Masana Murase, Wilfred E. Plouffe, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky
  • Publication number: 20080075288
    Abstract: To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
    Type: Application
    Filed: September 12, 2007
    Publication date: March 27, 2008
    Applicant: International Business Machines Corporation
    Inventors: Kohichi Kamijoh, Masaharu Sakamoto
  • Publication number: 20080075291
    Abstract: To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
    Type: Application
    Filed: September 12, 2007
    Publication date: March 27, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kohichi Kamijoh, Masaharu Sakamoto
  • Publication number: 20070288848
    Abstract: An apparatus for controlling video signals to be presented on a display device associated with a first audible signals, the apparatus comprises an intensity controller for receiving the video signals having a plurality of video signal components, the intensity controller being arranged so that an intensity control voltage independently controls amplitude of at least one of the plurality of video component signals to vary intensity of the of the video singles, a filter for receiving the first audible signals and separating the first audible signals into a plurality of filtered audible signals, each filtered audible signal being characterized by different frequency ranges, and a regulating circuit for regulating the filtered audible signals to form the intensity control voltage.
    Type: Application
    Filed: June 8, 2006
    Publication date: December 13, 2007
    Inventors: Masaharu Sakamoto, Tadayuki Nakazawa
  • Publication number: 20070138286
    Abstract: A method for extracting invisible information from an object in which visible information overlaps with at least part of invisible information formed in stealth ink. The method includes the steps of: irradiating the object with light for making the stealth ink luminous; receiving reflected light from the object; extracting image information from the received reflected light; splitting the image information into a plurality of pieces of color-channel information; obtaining a correlation function between the pixel values of at least two color-channel information selected from the plurality of pieces of color-channel information; reducing a visible information component of selected one of the plurality of pieces of color-channel information to thereby interpolate the color-channel information; and extracting invisible information from the interpolated one piece of color-channel information.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 21, 2007
    Inventors: Koichi Kamijoh, Noboru Kamijoh, Junji Maeda, Masaharu Sakamoto
  • Publication number: 20070118513
    Abstract: Provided is a system which manages a user community provided in an information processing system, in which user community information provided by a user is made available to another user for reference. The system includes a storage section which stores an audit policy defining contents of information to be permitted to be registered in each of a plurality of communities, by associating the audit policy with each of the communities; a detection section which detects a community to which information is provided in response to provision of the information by a user; and a registration control section which inhibits registration of information, provided by a user, in a detected user community on condition that the information violates an audit policy corresponding to the user community.
    Type: Application
    Filed: November 14, 2006
    Publication date: May 24, 2007
    Inventors: Hideaki Iwasaki, Koichi Kamijoh, Kazuhisa Misono, Makoto Miyakawa, Masaharu Sakamoto