Patents by Inventor Mitsuru Chinen
Mitsuru Chinen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240426618Abstract: A computer implemented method provides transshipping. A number of processor units identifies destination information for a load for a first transport vehicle having a first destination and a second transport vehicle having a second destination. The number of processor units determines a lane definition for an ad-hoc transport node on a road based on predicted locations for the first transport vehicle bound for the first destination and the second transport vehicle bound for the second destination. The lane definition defines a set of transfer lanes for the ad-hoc transport node. The number of processor units transfers the load between the first transport vehicle and the second transport vehicle in response to the first transport vehicle and the second transport vehicle being within the ad-hoc transport node.Type: ApplicationFiled: June 21, 2023Publication date: December 26, 2024Inventors: Mitsuru Chinen, Tsend Ochir Bat Ulzii, Akira Saito, Hirotaka Matsumoto, Yohkichi Sasatani, Kenichi Takasaki, Takeshi Watanabe, Sanehiro Furuichi
-
Publication number: 20240422648Abstract: A method can include obtaining device data for a set of edge devices. The method can further include obtaining a predicted travel path of a focal entity. The method can further include determining, for a first edge device of the set of edge devices and based on the device data, a first proximity of the first edge device to the predicted travel path. The method can further include selecting the first edge device based, at least in part, on the first proximity. The method can further include transmitting, in response to the selecting the first edge device, a workload to the first edge device. The method can further include receiving, in response to the transmitting the workload, first captured data obtained by the first edge device. The method can further include transmitting the first captured data to an electronic user device.Type: ApplicationFiled: August 29, 2024Publication date: December 19, 2024Inventors: Akira Saito, Mitsuru Chinen, Takeshi Watanabe, Taku Sasaki, Takuya Matsunaga
-
Patent number: 12094332Abstract: In an approach for reducing economic loss due to traffic events, a processor receives a set of transportation operation information from one or more transportation service providers about a traffic event. A processor analyzes the set of transportation operation information to identify an area affected by the traffic event and one or more users affected by the traffic event. A processor gathers a set of information about each user of the one or more users affected by the traffic event. A processor prioritizes the one or more users affected by the traffic event. A processor determines an alternative plan for each user of the one or more users affected by the traffic event based on the set of information and a priority number given to each user. A processor proposes the alternative plan to each user of the one or more users affected by the traffic event.Type: GrantFiled: March 31, 2022Date of Patent: September 17, 2024Assignee: International Business Machines CorporationInventors: Mitsuru Chinen, Akira Saito, Sanehiro Furuichi, Takeshi Watanabe
-
Patent number: 12096332Abstract: A method can include obtaining device data for a set of edge devices. The method can further include obtaining a predicted travel path of a focal entity. The method can further include determining, for a first edge device of the set of edge devices and based on the device data, a first proximity of the first edge device to the predicted travel path. The method can further include selecting the first edge device based, at least in part, on the first proximity. The method can further include transmitting, in response to the selecting the first edge device, a workload to the first edge device. The method can further include receiving, in response to the transmitting the workload, first captured data obtained by the first edge device. The method can further include transmitting the first captured data to an electronic user device.Type: GrantFiled: March 22, 2022Date of Patent: September 17, 2024Assignee: International Business Machines CorporationInventors: Akira Saito, Mitsuru Chinen, Takeshi Watanabe, Taku Sasaki, Takuya Matsunaga
-
Publication number: 20230316901Abstract: In an approach for reducing economic loss due to traffic events, a processor receives a set of transportation operation information from one or more transportation service providers about a traffic event. A processor analyzes the set of transportation operation information to identify an area affected by the traffic event and one or more users affected by the traffic event. A processor gathers a set of information about each user of the one or more users affected by the traffic event. A processor prioritizes the one or more users affected by the traffic event. A processor determines an alternative plan for each user of the one or more users affected by the traffic event based on the set of information and a priority number given to each user. A processor proposes the alternative plan to each user of the one or more users affected by the traffic event.Type: ApplicationFiled: March 31, 2022Publication date: October 5, 2023Inventors: Mitsuru Chinen, Akira Saito, Sanehiro Furuichi, Takeshi Watanabe
-
Publication number: 20230308983Abstract: A method can include obtaining device data for a set of edge devices. The method can further include obtaining a predicted travel path of a focal entity. The method can further include determining, for a first edge device of the set of edge devices and based on the device data, a first proximity of the first edge device to the predicted travel path. The method can further include selecting the first edge device based, at least in part, on the first proximity. The method can further include transmitting, in response to the selecting the first edge device, a workload to the first edge device. The method can further include receiving, in response to the transmitting the workload, first captured data obtained by the first edge device. The method can further include transmitting the first captured data to an electronic user device.Type: ApplicationFiled: March 22, 2022Publication date: September 28, 2023Inventors: Akira Saito, Mitsuru Chinen, Takeshi Watanabe, Taku Sasaki, Takuya Matsunaga
-
Publication number: 20130124861Abstract: An apparatus for shielding a sensitive file includes a client computer having various units. An encryption-decryption unit performs a cryptographic operation on the sensitive file with a cryptographic key, which corresponds to the encryption key ID. An encryption key ID is associated with the sensitive file. A key storing unit stores the cryptographic key. A compliance requirements storing unit stores security compliance requirements from the server computer, which define a plurality of compliant operating conditions of the client computer. A security requirements monitoring unit determines whether the client computer complies with the security compliance requirements in response to a file access instruction for the sensitive file by application software, and passes the cryptographic key from the key storing unit to the encryption-decryption unit in response to a determination that the client computer complies with the security compliance requirements.Type: ApplicationFiled: May 7, 2012Publication date: May 16, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mitsuru Chinen, Shinsuke Noda
-
Patent number: 8245042Abstract: Embodiments of the invention provide for shielding a sensitive file on a computer that can connect to a server computer via a network. The computer may determine whether it complies with security compliance requirements sent from another computer or not in response to a read instruction or a write instruction of the sensitive file by application software, and encrypt the sensitive file with an encryption key.Type: GrantFiled: November 23, 2009Date of Patent: August 14, 2012Assignee: International Business Machines CorporationInventors: Mitsuru Chinen, Shinsuke Noda
-
Patent number: 8214673Abstract: A server system, method, and program product are provided for setting a power level of a central processing unit (CPU) included in the server computer system—the CPU being operable at a plurality of levels of power, and the server providing a service that follows a predetermined protocol identified by a port number to a client computer via a computer network. The method includes the steps of monitoring connection establishment or close of communication with the client computer and a port number for the established or closed communication, determining a power level to be set as the power level of the CPU in accordance with the port number, and setting the determined power level as the power level of the CPU.Type: GrantFiled: March 10, 2009Date of Patent: July 3, 2012Assignee: International Business Machines CorporationInventors: Mitsuru Chinen, Tomohiro Miyahira
-
Publication number: 20100138656Abstract: Embodiments of the invention provide for shielding a sensitive file on a computer that can connect to a server computer via a network. The computer may determine whether it complies with security compliance requirements sent from another computer or not in response to a read instruction or a write instruction of the sensitive file by application software, and encrypt the sensitive file with an encryption key.Type: ApplicationFiled: November 23, 2009Publication date: June 3, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mitsuru Chinen, Shinsuke Noda
-
Publication number: 20090228724Abstract: A server system, method, and program product are provided for setting a power level of a central processing unit (CPU) included in the server computer system—the CPU being operable at a plurality of levels of power, and the server providing a service that follows a predetermined protocol identified by a port number to a client computer via a computer network. The method includes the steps of monitoring connection establishment or close of communication with the client computer and a port number for the established or closed communication, determining a power level to be set as the power level of the CPU in accordance with the port number, and setting the determined power level as the power level of the CPU.Type: ApplicationFiled: March 10, 2009Publication date: September 10, 2009Applicant: International Business MachinesInventors: Mitsuru Chinen, Tomohiro Miyahira