Patents by Inventor Neil Y. Iwamoto

Neil Y. Iwamoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8964089
    Abstract: Systems and methods for simulating an image exposure capture a first set of images of a scene; and generate a flash preview image based on the first set of images, an estimated scene spectral reflectance, an estimated spectral power distribution of the scene, and one or more flash device settings, wherein the flash preview image approximates a brightness and a color appearance of a final image of the scene captured while the scene is illuminated by a flash device according to the one or more flash device settings.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: February 24, 2015
    Assignee: Canon Kabushiki Kaisha
    Inventors: Francisco Imai, Neil Y. Iwamoto, Eric Riggert
  • Patent number: 8705070
    Abstract: Systems and methods for managing access to a device configured to capture images store trust information that is generated in response to the creation of a trust relationship with an identity provider, capture an image of indicia on the device configured to capture images, wherein the indicia are provided to a user by the identity provider in response to a user authentication operation with the identity provider, determine if the indicia are valid based on the trust information, and allow operation of other functions of the device configured to capture images in response to determining that the indicia are valid or not allowing operation of the other functions of the device configured to capture images in response to determining that the indicia are invalid.
    Type: Grant
    Filed: February 24, 2012
    Date of Patent: April 22, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Royce Earle Slick
  • Publication number: 20130300894
    Abstract: Systems and methods for simulating an image exposure capture a first set of images of a scene; and generate a flash preview image based on the first set of images, an estimated scene spectral reflectance, an estimated spectral power distribution of the scene, and one or more flash device settings, wherein the flash preview image approximates a brightness and a color appearance of a final image of the scene captured while the scene is illuminated by a flash device according to the one or more flash device settings
    Type: Application
    Filed: May 9, 2012
    Publication date: November 14, 2013
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Francisco Imai, Neil Y. Iwamoto, Eric Riggert
  • Publication number: 20130222835
    Abstract: Systems and methods for managing access to a device configured to capture images store trust information that is generated in response to the creation of a trust relationship with an identity provider, capture an image of indicia on the device configured to capture images, wherein the indicia are provided to a user by the identity provider in response to a user authentication operation with the identity provider, determine if the indicia are valid based on the trust information, and allow operation of other functions of the device configured to capture images in response to determining that the indicia are valid or not allowing operation of the other functions of the device configured to capture images in response to determining that the indicia are invalid.
    Type: Application
    Filed: February 24, 2012
    Publication date: August 29, 2013
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Neil Y. Iwamoto, Royce Earle Slick
  • Patent number: 7946481
    Abstract: A method and system for registering a card that is used to enable configurations of an application and/or a device. The method and system includes initializing into an administrative card setup mode, providing information for at least one card to be registered, storing the information for the at least one card to be registered, and exiting the administrative card setup mode.
    Type: Grant
    Filed: July 14, 2006
    Date of Patent: May 24, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventors: Don H. Matsubayashi, Craig Mazzagatte, Neil Y. Iwamoto, Royce E. Slick, Dariusz Dusberger, Kevin F. Piazza
  • Patent number: 7925767
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Grant
    Filed: January 21, 2009
    Date of Patent: April 12, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y Iwamoto, Attullah Seikh, Jeanette Y Paek, Martin Martinez, Royce E Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Patent number: 7646874
    Abstract: The invention provides for installing encryption keys on a device not having any previous security credentials. An installation authority generates a security token to be used by the device for secure communications, and an installation credential for the device, and stores them in association with one another. A user of the device is provided with the installation credential, whereby the user inputs the installation credential into the device. The device utilizes the installation credential as a temporary security key, establishes a secure communication channel with the installation authority and requests provision of the security token. The installation authority provides the security token associated with the installation credential to the device over the established secure communication channel, and the device installs the security token, after which the device erases the installation credential from the device.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: January 12, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Royce E. Slick, Craig Mazzagatte, Martin Martinez
  • Patent number: 7552239
    Abstract: The mimicking of network devices in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network. The invention includes receiving an incoming message from a client network device residing on the external network, the incoming message being directed to a legacy network device residing on the local network, and determining if the incoming message requires a function provided by an application module residing in the computing device. In the case that the incoming message requires a function provided by the application module, the incoming message is redirected to the application module which performs the required function in response to the incoming message.
    Type: Grant
    Filed: May 14, 2001
    Date of Patent: June 23, 2009
    Assignee: Canon Information Systems, Inc.
    Inventors: Sebastien A. Jean, Don Francis Purpura, Neil Y. Iwamoto
  • Patent number: 7552476
    Abstract: Security against replay of a message by generating a list of unique message enabling codes (TATs) in a first device and storing the list in a second device. A message generated in the first device, which includes at least one of the unique message enabling codes from the list, is transmitted to the second device. The unique message enabling code of the received message is compared with the list stored in the second device to determine whether or not to enable processing of the message by the second device. If the unique message enabling code received with the message is included in the stored list, processing of the message is enabled and, the corresponding unique message enabling code is deleted from the stored list. If the unique message enabling code received with the message is not included in the stored list, processing of the message is rejected.
    Type: Grant
    Filed: June 25, 2004
    Date of Patent: June 23, 2009
    Assignee: Canon Kabushiki Kaisha
    Inventors: Royce E. Slick, Neil Y. Iwamoto, Martin Martinez
  • Publication number: 20090133104
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Application
    Filed: January 21, 2009
    Publication date: May 21, 2009
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Patent number: 7487233
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
    Type: Grant
    Filed: December 5, 2001
    Date of Patent: February 3, 2009
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Y. Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Publication number: 20080011826
    Abstract: A method and system for registering a card that is used to enable configurations of an application and/or a device. The method and system includes initializing into an administrative card setup mode, providing information for at least one card to be registered, storing the information for the at least one card to be registered, and exiting the administrative card setup mode.
    Type: Application
    Filed: July 14, 2006
    Publication date: January 17, 2008
    Applicant: CANON U.S.A., INC.
    Inventors: Don H. Matsubayashi, Craig Mazzagatte, Neil Y. Iwamoto, Royce E. Slick, Dariusz Dusberger, Kevin F. Piazza
  • Patent number: 7305556
    Abstract: Securely storing a public key for encryption of data in a computing device by using a user-specific key pair which is securely stored in the computing device, including receiving a target public key corresponding to a target device, obtaining a user-specific key pair from a secure registry, using a user-specific private key from the user-specific key pair to create a target key verifier based on the target public key, storing the target key verifier and the target public key in a storage area, retrieving the target key verifier and the target public key from the storage area, applying a user-specific public key from the user-specific key pair to the target key verifier for verifying the authenticity of the target public key, and encrypting data with the target public key, if authenticity of the target public key is verified, thereby creating encrypted data for transmission to the target device.
    Type: Grant
    Filed: December 5, 2001
    Date of Patent: December 4, 2007
    Assignee: Canon Kabushiki Kaisha
    Inventors: Royce E. Slick, William Zhang, Don Francis Purpura, Neil Y. Iwamoto, Craig Mazzagatte
  • Patent number: 7173730
    Abstract: A data storage and reproduction system is provided using a computer network that comprises a server, at least one attachment unit that is coupled to the server and first and second reproduction devices. The server storing data to be reproduced. At least one attachment unit comprising means for interfacing with a portable memory device having a reference to the reproduction data. The first reproduction device capable of performing a first data reproduction of the reproduction data and the second reproduction device capable of performing a second data reproduction of the reproduction data, the second data reproduction being different than the first data reproduction. A rule processing means for processing a rule set to determine whether the reproduction data satisfies selection criteria of the rule set, wherein the at least one attachment unit requests the reproduction data from the server for use by the reproduction device, if the reproduction data satisfies the selection criteria.
    Type: Grant
    Filed: September 13, 2000
    Date of Patent: February 6, 2007
    Assignee: Canon Information Systems, Inc.
    Inventors: Stephanie Ann Suzuki, Neil Y. Iwamoto, Don Francis Purpura, Martin Martinez, QuocCuong Thong Bui
  • Patent number: 7167919
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.
    Type: Grant
    Filed: December 5, 2002
    Date of Patent: January 23, 2007
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang
  • Patent number: 7113299
    Abstract: Printing over a network by inputting print data to be printed and associated credit card information at a host terminal, uploading a print job comprising the print data to be printed and the associated credit card information to a print data storage server, inputting credit card information at an input device that communicates with the print data storage server, transmitting print data stored in the print data storage server having associated credit card information that corresponds to the credit card information input at the input device, and printing the print data on a printing device. The uploaded print job may be marked as ready for printing such that the print data transmitted to the printing device is that which has been marked as ready for printing. In addition, a display of pending print jobs may be provided for a user to select a print job to print prior to the print data being transmitted to the input device.
    Type: Grant
    Filed: July 12, 2001
    Date of Patent: September 26, 2006
    Assignee: Canon Development Americas, Inc.
    Inventors: Stephanie Ann Suzuki, Rajini Bala Giridharagopal, Neil Y. Iwamoto, Vladimir Sevastyanov, Royce E. Slick, Martin Ervin Page, Katayoun Shoa, Yokichi Joe Tanaka, Paul Chen, Stephen Keung
  • Patent number: 7003667
    Abstract: Secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient. The data is encrypted using a first key. The first key is then encrypted using a second key and a third key. The second key is a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device. The third key is a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image. The encrypted data and the twice-encrypted first key are transmitted to the intended image output device.
    Type: Grant
    Filed: October 4, 1999
    Date of Patent: February 21, 2006
    Assignee: Canon Kabushiki Kaisha
    Inventors: Royce E. Slick, Craig Mazzagatte, Neil Y. Iwamoto
  • Patent number: 6930788
    Abstract: Secure printing of print data from a client application residing on a data network to a set top box which has a printer, the set top box residing on a digital cable network which has a cable head end for interfacing the digital cable network to the data network, wherein print data is generated in the client application after which it is determined whether a secure communication path exists between the client application and the set top box. If the secure communication path exists, the print data is transmitted from the client application to the set top box. The print data is then sent from the set top box to the printer for printing.
    Type: Grant
    Filed: July 20, 1999
    Date of Patent: August 16, 2005
    Assignee: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Don Francis Purpura, George Koppich, Paul Nicholas Gacek
  • Publication number: 20040111610
    Abstract: A file format for a secure file having a secure client header and a data block appended to the secure client header. The client header has a client information block comprised of a public information block and a private information block, wherein at least a portion of the private information block is encrypted, and a client information block integrity check value appended to the client information block, the client information block integrity check value being obtained by performing an integrity check on the client information block. The data block is preferably encrypted and is comprised of a plurality of encrypted data blocks each appended with its own respective integrity check result value.
    Type: Application
    Filed: December 5, 2002
    Publication date: June 10, 2004
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Royce E. Slick, Neil Y. Iwamoto, Craig Mazzagatte
  • Publication number: 20030167336
    Abstract: Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.
    Type: Application
    Filed: December 5, 2002
    Publication date: September 4, 2003
    Applicant: Canon Kabushiki Kaisha
    Inventors: Neil Y. Iwamoto, Attaullah Seikh, Jeanette Yang Paek, Martin Martinez, Royce E. Slick, Wei-Jhy Chern, Eliza Khosrova, Joseph Yang