Patents by Inventor Neil Y. Iwamoto
Neil Y. Iwamoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8964089Abstract: Systems and methods for simulating an image exposure capture a first set of images of a scene; and generate a flash preview image based on the first set of images, an estimated scene spectral reflectance, an estimated spectral power distribution of the scene, and one or more flash device settings, wherein the flash preview image approximates a brightness and a color appearance of a final image of the scene captured while the scene is illuminated by a flash device according to the one or more flash device settings.Type: GrantFiled: May 9, 2012Date of Patent: February 24, 2015Assignee: Canon Kabushiki KaishaInventors: Francisco Imai, Neil Y. Iwamoto, Eric Riggert
-
Patent number: 8705070Abstract: Systems and methods for managing access to a device configured to capture images store trust information that is generated in response to the creation of a trust relationship with an identity provider, capture an image of indicia on the device configured to capture images, wherein the indicia are provided to a user by the identity provider in response to a user authentication operation with the identity provider, determine if the indicia are valid based on the trust information, and allow operation of other functions of the device configured to capture images in response to determining that the indicia are valid or not allowing operation of the other functions of the device configured to capture images in response to determining that the indicia are invalid.Type: GrantFiled: February 24, 2012Date of Patent: April 22, 2014Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Royce Earle Slick
-
Publication number: 20130300894Abstract: Systems and methods for simulating an image exposure capture a first set of images of a scene; and generate a flash preview image based on the first set of images, an estimated scene spectral reflectance, an estimated spectral power distribution of the scene, and one or more flash device settings, wherein the flash preview image approximates a brightness and a color appearance of a final image of the scene captured while the scene is illuminated by a flash device according to the one or more flash device settingsType: ApplicationFiled: May 9, 2012Publication date: November 14, 2013Applicant: CANON KABUSHIKI KAISHAInventors: Francisco Imai, Neil Y. Iwamoto, Eric Riggert
-
Publication number: 20130222835Abstract: Systems and methods for managing access to a device configured to capture images store trust information that is generated in response to the creation of a trust relationship with an identity provider, capture an image of indicia on the device configured to capture images, wherein the indicia are provided to a user by the identity provider in response to a user authentication operation with the identity provider, determine if the indicia are valid based on the trust information, and allow operation of other functions of the device configured to capture images in response to determining that the indicia are valid or not allowing operation of the other functions of the device configured to capture images in response to determining that the indicia are invalid.Type: ApplicationFiled: February 24, 2012Publication date: August 29, 2013Applicant: CANON KABUSHIKI KAISHAInventors: Neil Y. Iwamoto, Royce Earle Slick
-
Patent number: 7946481Abstract: A method and system for registering a card that is used to enable configurations of an application and/or a device. The method and system includes initializing into an administrative card setup mode, providing information for at least one card to be registered, storing the information for the at least one card to be registered, and exiting the administrative card setup mode.Type: GrantFiled: July 14, 2006Date of Patent: May 24, 2011Assignee: Canon Kabushiki KaishaInventors: Don H. Matsubayashi, Craig Mazzagatte, Neil Y. Iwamoto, Royce E. Slick, Dariusz Dusberger, Kevin F. Piazza
-
Patent number: 7925767Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: GrantFiled: January 21, 2009Date of Patent: April 12, 2011Assignee: Canon Kabushiki KaishaInventors: Neil Y Iwamoto, Attullah Seikh, Jeanette Y Paek, Martin Martinez, Royce E Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Patent number: 7646874Abstract: The invention provides for installing encryption keys on a device not having any previous security credentials. An installation authority generates a security token to be used by the device for secure communications, and an installation credential for the device, and stores them in association with one another. A user of the device is provided with the installation credential, whereby the user inputs the installation credential into the device. The device utilizes the installation credential as a temporary security key, establishes a secure communication channel with the installation authority and requests provision of the security token. The installation authority provides the security token associated with the installation credential to the device over the established secure communication channel, and the device installs the security token, after which the device erases the installation credential from the device.Type: GrantFiled: December 22, 2005Date of Patent: January 12, 2010Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Royce E. Slick, Craig Mazzagatte, Martin Martinez
-
Patent number: 7552239Abstract: The mimicking of network devices in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network. The invention includes receiving an incoming message from a client network device residing on the external network, the incoming message being directed to a legacy network device residing on the local network, and determining if the incoming message requires a function provided by an application module residing in the computing device. In the case that the incoming message requires a function provided by the application module, the incoming message is redirected to the application module which performs the required function in response to the incoming message.Type: GrantFiled: May 14, 2001Date of Patent: June 23, 2009Assignee: Canon Information Systems, Inc.Inventors: Sebastien A. Jean, Don Francis Purpura, Neil Y. Iwamoto
-
Patent number: 7552476Abstract: Security against replay of a message by generating a list of unique message enabling codes (TATs) in a first device and storing the list in a second device. A message generated in the first device, which includes at least one of the unique message enabling codes from the list, is transmitted to the second device. The unique message enabling code of the received message is compared with the list stored in the second device to determine whether or not to enable processing of the message by the second device. If the unique message enabling code received with the message is included in the stored list, processing of the message is enabled and, the corresponding unique message enabling code is deleted from the stored list. If the unique message enabling code received with the message is not included in the stored list, processing of the message is rejected.Type: GrantFiled: June 25, 2004Date of Patent: June 23, 2009Assignee: Canon Kabushiki KaishaInventors: Royce E. Slick, Neil Y. Iwamoto, Martin Martinez
-
Publication number: 20090133104Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: ApplicationFiled: January 21, 2009Publication date: May 21, 2009Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Patent number: 7487233Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.Type: GrantFiled: December 5, 2001Date of Patent: February 3, 2009Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Publication number: 20080011826Abstract: A method and system for registering a card that is used to enable configurations of an application and/or a device. The method and system includes initializing into an administrative card setup mode, providing information for at least one card to be registered, storing the information for the at least one card to be registered, and exiting the administrative card setup mode.Type: ApplicationFiled: July 14, 2006Publication date: January 17, 2008Applicant: CANON U.S.A., INC.Inventors: Don H. Matsubayashi, Craig Mazzagatte, Neil Y. Iwamoto, Royce E. Slick, Dariusz Dusberger, Kevin F. Piazza
-
Patent number: 7305556Abstract: Securely storing a public key for encryption of data in a computing device by using a user-specific key pair which is securely stored in the computing device, including receiving a target public key corresponding to a target device, obtaining a user-specific key pair from a secure registry, using a user-specific private key from the user-specific key pair to create a target key verifier based on the target public key, storing the target key verifier and the target public key in a storage area, retrieving the target key verifier and the target public key from the storage area, applying a user-specific public key from the user-specific key pair to the target key verifier for verifying the authenticity of the target public key, and encrypting data with the target public key, if authenticity of the target public key is verified, thereby creating encrypted data for transmission to the target device.Type: GrantFiled: December 5, 2001Date of Patent: December 4, 2007Assignee: Canon Kabushiki KaishaInventors: Royce E. Slick, William Zhang, Don Francis Purpura, Neil Y. Iwamoto, Craig Mazzagatte
-
Patent number: 7173730Abstract: A data storage and reproduction system is provided using a computer network that comprises a server, at least one attachment unit that is coupled to the server and first and second reproduction devices. The server storing data to be reproduced. At least one attachment unit comprising means for interfacing with a portable memory device having a reference to the reproduction data. The first reproduction device capable of performing a first data reproduction of the reproduction data and the second reproduction device capable of performing a second data reproduction of the reproduction data, the second data reproduction being different than the first data reproduction. A rule processing means for processing a rule set to determine whether the reproduction data satisfies selection criteria of the rule set, wherein the at least one attachment unit requests the reproduction data from the server for use by the reproduction device, if the reproduction data satisfies the selection criteria.Type: GrantFiled: September 13, 2000Date of Patent: February 6, 2007Assignee: Canon Information Systems, Inc.Inventors: Stephanie Ann Suzuki, Neil Y. Iwamoto, Don Francis Purpura, Martin Martinez, QuocCuong Thong Bui
-
Patent number: 7167919Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.Type: GrantFiled: December 5, 2002Date of Patent: January 23, 2007Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
-
Patent number: 7113299Abstract: Printing over a network by inputting print data to be printed and associated credit card information at a host terminal, uploading a print job comprising the print data to be printed and the associated credit card information to a print data storage server, inputting credit card information at an input device that communicates with the print data storage server, transmitting print data stored in the print data storage server having associated credit card information that corresponds to the credit card information input at the input device, and printing the print data on a printing device. The uploaded print job may be marked as ready for printing such that the print data transmitted to the printing device is that which has been marked as ready for printing. In addition, a display of pending print jobs may be provided for a user to select a print job to print prior to the print data being transmitted to the input device.Type: GrantFiled: July 12, 2001Date of Patent: September 26, 2006Assignee: Canon Development Americas, Inc.Inventors: Stephanie Ann Suzuki, Rajini Bala Giridharagopal, Neil Y. Iwamoto, Vladimir Sevastyanov, Royce E. Slick, Martin Ervin Page, Katayoun Shoa, Yokichi Joe Tanaka, Paul Chen, Stephen Keung
-
Patent number: 7003667Abstract: Secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient. The data is encrypted using a first key. The first key is then encrypted using a second key and a third key. The second key is a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device. The third key is a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image. The encrypted data and the twice-encrypted first key are transmitted to the intended image output device.Type: GrantFiled: October 4, 1999Date of Patent: February 21, 2006Assignee: Canon Kabushiki KaishaInventors: Royce E. Slick, Craig Mazzagatte, Neil Y. Iwamoto
-
Patent number: 6930788Abstract: Secure printing of print data from a client application residing on a data network to a set top box which has a printer, the set top box residing on a digital cable network which has a cable head end for interfacing the digital cable network to the data network, wherein print data is generated in the client application after which it is determined whether a secure communication path exists between the client application and the set top box. If the secure communication path exists, the print data is transmitted from the client application to the set top box. The print data is then sent from the set top box to the printer for printing.Type: GrantFiled: July 20, 1999Date of Patent: August 16, 2005Assignee: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Don Francis Purpura, George Koppich, Paul Nicholas Gacek
-
Publication number: 20040111610Abstract: A file format for a secure file having a secure client header and a data block appended to the secure client header. The client header has a client information block comprised of a public information block and a private information block, wherein at least a portion of the private information block is encrypted, and a client information block integrity check value appended to the client information block, the client information block integrity check value being obtained by performing an integrity check on the client information block. The data block is preferably encrypted and is comprised of a plurality of encrypted data blocks each appended with its own respective integrity check result value.Type: ApplicationFiled: December 5, 2002Publication date: June 10, 2004Applicant: CANON KABUSHIKI KAISHAInventors: Royce E. Slick, Neil Y. Iwamoto, Craig Mazzagatte
-
Publication number: 20030167336Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.Type: ApplicationFiled: December 5, 2002Publication date: September 4, 2003Applicant: Canon Kabushiki KaishaInventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang