Patents by Inventor Masana Murase
Masana Murase has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10825013Abstract: Methods and arrangements for processing face-to-face mobile phone transactions. An agreed-upon price for a product is accepted from a buyer mobile phone and a seller mobile phone. Distinct random numbers are assigned to each of the buyer and seller mobile phones. The random number assigned to the seller mobile phone is received from the buyer mobile phone, and the random number assigned to the buyer mobile phone is received from the seller mobile phone. A match is ascertained between the buyer and seller mobile phones based on receipt from the buyer mobile phone the random number assigned to the seller mobile phone and receipt from the seller mobile phone the random number assigned to the buyer mobile phone.Type: GrantFiled: November 17, 2010Date of Patent: November 3, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Toru Aihara, Shivkumar Kalyanaraman, Noboru Kamijo, Koichi Kamijo, Kiran Appasaheb Kate, Alwyn R. Lobo, Masana Murase
-
Patent number: 9798696Abstract: Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on.Type: GrantFiled: November 23, 2012Date of Patent: October 24, 2017Assignee: International Business Machines CorporationInventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
-
Patent number: 9794138Abstract: Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on.Type: GrantFiled: April 21, 2011Date of Patent: October 17, 2017Assignee: International Business Machines CorporationInventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
-
Publication number: 20170194040Abstract: A memory having stacked memory modules in which heat generated during memory read/write operations can be effectively dissipated, thus avoiding an undesirable localized temperature rise. The storage device is provided with a plurality of stacked memory modules. When a data write request is received, a data processing device that fulfills the role of a memory controller sequentially selects a memory module that is to be a write destination in such a manner that memory modules to which data is written simultaneously are not adjacent to each other, and in a series of write sequences, the memory module to which data is to be written at a subsequent write timing is not adjacent to the memory module to which data is written at a preceding write timing. As a result, the locations of heat generation among the plurality of stacked memory modules are distributed, reducing a rise in temperature.Type: ApplicationFiled: November 11, 2014Publication date: July 6, 2017Applicant: FIXSTARS CORPORATIONInventors: Satoshi Yoneya, Ryoji Tsuchiyama, Masana Murase, Noriyuki Futatsugi
-
Patent number: 9141732Abstract: A technique for increasing the speed of parallel running of logical processes without sacrificing the accuracy of data update timing in a parallel discrete event simulation system. A logical process involving a longer receiving time lag than that of sending is executed by an amount of initial shift for a predetermined period before the simulation. The initial shift is set to be one-half of a value of difference between the receiving time lag and the sending time lag. The logical process executed with timing displaced by the amount of initial shift runs by exchanging null messages with each other. Each null message is delivered to a correspondent logical process after the predetermined time lag, and each logical process further sends the correspondent logical process a null message upon receipt of the null message. Thus, there is a progression of simulation by synchronizing them through the null messages.Type: GrantFiled: November 30, 2012Date of Patent: September 22, 2015Assignee: International Business Machines CorporationInventors: Masana Murase, Shu Shimizu, Gang Zhang
-
Patent number: 8881298Abstract: A server apparatus includes: an output detector for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shared area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data. The client apparatus includes: a reading detection section for detecting reading-processing which is processing of reading data from the shared area; and a reading control section which reads the instruction information from the shared area in response to the detection of the reading-processing, and which acquires the output data by the acquisition method specified by the instruction information.Type: GrantFiled: September 13, 2012Date of Patent: November 4, 2014Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Yuriko Sawatani, Masana Murase, Taskuku Otani
-
Patent number: 8683199Abstract: Whenever a drawing command is executed, a computer system having a graphic user interface such as a multi-window system determines, from the logical operation pattern of the drawing command, what kind of information is inherited by a drawing result from the drawing command, preferably without performing a complicated step such as an image process. At the same time, the computer system controls information flow of an image outputted to a screen by managing labeled area maps which correspond one to one to images on the screen and in a memory.Type: GrantFiled: July 18, 2008Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Masana Murase
-
Publication number: 20140040907Abstract: A system processing an application in a hybrid system includes a database comprising a plurality of libraries, each library comprising sub-program components, wherein two or more of the components are combined by an end user into a stream flow defining an application. The system also includes a plurality of resources configured to process the stream flow, architecture of at least one of the plurality of resources being different from architecture of another of the plurality of resources. The system also includes a compiler configured to generate a resource assignment assigning the plurality of resources to the two or more of the components in the stream flow, at least two of the two or more of the components in the stream flow sharing at least one of the plurality of resources according to the resource assignment.Type: ApplicationFiled: August 1, 2012Publication date: February 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Munehiro Doi, Kumiko Maeda, Masana Murase
-
Publication number: 20140040908Abstract: A system processing an application in a hybrid system includes a database comprising a plurality of libraries, each library comprising sub-program components, wherein two or more of the components are combined by an end user into a stream flow defining an application. The system also includes a plurality of resources configured to process the stream flow, architecture of at least one of the plurality of resources being different from architecture of another of the plurality of resources. The system also includes a compiler configured to generate a resource assignment assigning the plurality of resources to the two or more of the components in the stream flow, at least two of the two or more of the components in the stream flow sharing at least one of the plurality of resources according to the resource assignment.Type: ApplicationFiled: August 8, 2012Publication date: February 6, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Munehiro Doi, Kumiko Maeda, Masana Murase
-
Publication number: 20130103829Abstract: Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on.Type: ApplicationFiled: April 21, 2011Publication date: April 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
-
Patent number: 8422674Abstract: A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.Type: GrantFiled: May 29, 2007Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
-
Patent number: 8380937Abstract: A system including a server apparatus executes an application program and a client apparatus enabling a user to utilize the application program by communicating with the server apparatus based on an instruction of the user. The server apparatus includes: an output detection section for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shares area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data.Type: GrantFiled: November 28, 2006Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Yuriko Kanai, Masana Murase, Tasuku Otani
-
Publication number: 20130031354Abstract: A server apparatus includes: an output detector for detecting output-processing which is processing of outputting data from the application program into a shared area; and an output control section for storing instruction information in the shared area, instead of storing the output data outputted from the application program therein, in response to the detection of the output-processing, the instruction information specifying an acquisition method by which an authorized client apparatus acquires the output data. The client apparatus includes: a reading detection section for detecting reading-processing which is processing of reading data from the shared area; and a reading control section which reads the instruction information from the shared area in response to the detection of the reading-processing, and which acquires the output data by the acquisition method specified by the instruction information.Type: ApplicationFiled: September 13, 2012Publication date: January 31, 2013Applicant: International Business Machines CorporationInventors: Sanehiro Furuichi, Yuriko Sawatani, Masana Murase, Tasuku Otani
-
Patent number: 8332636Abstract: A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for users to execute software from independent software developers, an administrative user may disable the above-described vendor key-checking as an option.Type: GrantFiled: October 2, 2007Date of Patent: December 11, 2012Assignee: International Business Machines CorporationInventors: Masana Murase, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky
-
Patent number: 8245054Abstract: An information processing apparatus includes a storage device having an access-restricted area accessible if the password is properly authenticated and an access-unrestricted area accessible regardless of whether or not the password is authenticated. The information processing apparatus allows a password to be registered in a registration server beforehand, prompts a user to enter the password when accessing the access-restricted area and, if the password is not entered, reads from the access-unrestricted area a password retrieval program for retrieving the password from the registration server, activates and executes the password retrieval program to retrieve the password from the registration server, and causes the storage device to authenticate the retrieved password to place the access-restricted area in an accessible state.Type: GrantFiled: August 26, 2005Date of Patent: August 14, 2012Assignee: Lenovo (Singapore) Pte., Ltd.Inventors: Hassan Hajji, Seiichi Kawano, Masana Murase, Susumu Shimetono
-
Publication number: 20120123887Abstract: Methods and arrangements for processing face-to-face mobile phone transactions. An agreed-upon price for a product is accepted from a buyer mobile phone and a seller mobile phone. Distinct random numbers are assigned to each of the buyer and seller mobile phones. The random number assigned to the seller mobile phone is received from the buyer mobile phone, and the random number assigned to the buyer mobile phone is received from the seller mobile phone. A match is ascertained between the buyer and seller mobile phones based on receipt from the buyer mobile phone the random number assigned to the seller mobile phone and receipt from the seller mobile phone the random number assigned to the buyer mobile phone.Type: ApplicationFiled: November 17, 2010Publication date: May 17, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Toru Aihara, Shivkumar Kalyanaraman, Noboru Kamijo, Koichi Kamijo, Kiran Appasaheb Kate, Alwyn R. Lobo, Masana Murase
-
Patent number: 8166304Abstract: A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for independent developers to develop software for the herein-described platform, a “global key pair” is provided in which both the public and private keys of the pair are publicly known, so that anyone may sign an application with the global key. Such an application may be allowed to execute by including the global key pair's public key in the key ring as a “vendor key” or, conversely, it may be disallowed by excluding the global public key from the key ring.Type: GrantFiled: October 2, 2007Date of Patent: April 24, 2012Assignee: International Business Machines CorporationInventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
-
Patent number: 8010804Abstract: A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key.Type: GrantFiled: August 8, 2008Date of Patent: August 30, 2011Assignee: International Business Machines CorporationInventors: Masana Murase, Kanna Shimizu, Wilfred Edmund Plouffe, Jr.
-
Publication number: 20110131554Abstract: A method, system and computer program product for optimizing performance of an application running on a hybrid system. The method includes the steps of: selecting a first user defined operator from a library component within the application; determining at least one available hardware resource; generating at least one execution pattern for the first user defined operator based on the available hardware resource; compiling the execution pattern; measuring the execution speed of the execution pattern on the available hardware resource; and storing the execution speed and the execution pattern in an optimization table; where at least one of the steps is carried out using a computer device so that performance of said application is optimized on the hybrid system.Type: ApplicationFiled: November 29, 2010Publication date: June 2, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Masana Murase, Takeo Yoshizawa
-
Patent number: 7937575Abstract: A boot block that contains a first public key is activated and a system Basic Input/Output System (BIOS) that contains a second public key and a first digital signature is verified, the verifying being performed by confirming that the first and second public keys match. In response to a determination that the first and second public keys match, the BIOS is activated and a system image is loaded to a real device. The system image is verified by confirming that the first digital signature that is stored in the system BIOS matches a second digital signature that is stored in a mass storage device. In response to the first and second digital signatures matching, a virtual mass storage device is created. Control of the virtual mass storage device is transferred to a boot strap code in an operating system image and the operating system image is booted from the virtual mass storage device.Type: GrantFiled: December 19, 2005Date of Patent: May 3, 2011Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Hassan Hajji, Seiichi Kawano, Masana Murase, Susumu Shimotono