Patents by Inventor Nobuyuki Yoshifuji

Nobuyuki Yoshifuji has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11711408
    Abstract: A method, computer system, and a computer program product for application sharing are provided. Setting information that includes a display preference of a receiver is received. Application content from a host computer is received. The application content includes at least one screen image. The at least one screen image is converted according to the setting information. The converted screen image is transmitted to a receiver computer for real-time screen sharing with the host computer. A host controller action signal is received. The host controller action signal represents a host controller action at the host computer. A content modification is transmitted to the receiver computer for the real-time screen sharing and for displaying with the converted at least one screen image. The content modification corresponds to the host controller action.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: July 25, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nobuyuki Yoshifuji, Mayumi Goto, Timothy Waileong Koh, Sho Ayuba
  • Patent number: 11647161
    Abstract: An embodiment for resolving visibility discrepancies of virtual objects in extended reality devices is provided. The embodiment may include receiving one or more virtual objects and a setting for each virtual object from one or more users during an extended reality meeting. The embodiment may also include identifying an owner of each virtual object. The embodiment may further include identifying a referenced virtual object. The embodiment may also include in response to determining the referenced virtual object is only visible to the owner, displaying a warning notification to the owner prior to sharing. The embodiment may further include querying the owner as to whether to share the referenced virtual object with the one or more users other than the owner. The embodiment may also include in response to determining the owner wants to share the referenced virtual object, sharing the referenced virtual object.
    Type: Grant
    Filed: May 11, 2022
    Date of Patent: May 9, 2023
    Assignee: INIERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nobuyuki Yoshifuji, Kenya Ishimoto, Koichi Omae
  • Publication number: 20230028495
    Abstract: A method, computer system, and a computer program product for application sharing are provided. Setting information that includes a display preference of a receiver is received. Application content from a host computer is received. The application content includes at least one screen image. The at least one screen image is converted according to the setting information. The converted screen image is transmitted to a receiver computer for real-time screen sharing with the host computer. A host controller action signal is received. The host controller action signal represents a host controller action at the host computer. A content modification is transmitted to the receiver computer for the real-time screen sharing and for displaying with the converted at least one screen image. The content modification corresponds to the host controller action.
    Type: Application
    Filed: July 26, 2021
    Publication date: January 26, 2023
    Inventors: Nobuyuki Yoshifuji, Mayumi Goto, Timothy Waileong Koh, SHO AYUBA
  • Patent number: 11561787
    Abstract: A computer-implemented method that includes determining that a first version of an operating system (OS) is updated to a second version of the OS. The method further includes determining that an application does not support the second version of the OS. The method further includes associating the first version of the OS with the application as a base OS. The method further includes invoking the application on the base OS by generating an isolated instance running the base OS on a user device, where the user device simultaneously runs the second version of the OS.
    Type: Grant
    Filed: May 13, 2021
    Date of Patent: January 24, 2023
    Assignee: International Business Machines Corporation
    Inventors: Sho Ayuba, Mayumi Goto, Timothy Waileong Koh, Nobuyuki Yoshifuji
  • Publication number: 20220365765
    Abstract: Described are techniques including a computer-implemented method comprising determining that a first version of an operating system (OS) is updated to a second version of the OS. The method further comprises determining that an application does not support the second version of the OS. The method further comprises associating the first version of the OS with the application as a base OS. The method further comprises invoking the application on the base OS by generating an isolated instance running the base OS on a user device, where the user device simultaneously runs the second version of the OS.
    Type: Application
    Filed: May 13, 2021
    Publication date: November 17, 2022
    Inventors: SHO AYUBA, Mayumi Goto, Timothy Waileong Koh, Nobuyuki Yoshifuji
  • Patent number: 10958638
    Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
  • Patent number: 10740308
    Abstract: According to an aspect, a method for key-value storage includes determining whether a data size of a first set comprising data and a key stored in a first area or a second area of a first storage unit is larger than a threshold determined for the first area or the second area in which the first set is stored, as a first execution condition. The method further includes determining whether a degree of collisions of a hash value indicating a storage location of the first set in the first area of the first storage unit is greater than a predetermined threshold, as a second execution condition. When the set satisfies either of the first or second execution conditions, the method includes the first set in the second area.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jie Ding, Tatsuyuki Shiomi, Yoshiko Yaegashi, Nobuyuki Yoshifuji
  • Patent number: 10592005
    Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
  • Publication number: 20190281044
    Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.
    Type: Application
    Filed: May 30, 2019
    Publication date: September 12, 2019
    Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
  • Publication number: 20190265805
    Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.
    Type: Application
    Filed: May 9, 2019
    Publication date: August 29, 2019
    Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
  • Patent number: 10367807
    Abstract: A computer program product and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: July 30, 2019
    Assignee: International Business Machines Corporation
    Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
  • Patent number: 10362025
    Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: July 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
  • Patent number: 10331226
    Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
  • Patent number: 10261600
    Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
  • Publication number: 20180262481
    Abstract: A computer program product and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.
    Type: Application
    Filed: October 24, 2017
    Publication date: September 13, 2018
    Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
  • Publication number: 20180262480
    Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.
    Type: Application
    Filed: March 7, 2017
    Publication date: September 13, 2018
    Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
  • Publication number: 20180046261
    Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.
    Type: Application
    Filed: August 9, 2016
    Publication date: February 15, 2018
    Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
  • Publication number: 20180046262
    Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.
    Type: Application
    Filed: June 23, 2017
    Publication date: February 15, 2018
    Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
  • Publication number: 20170220572
    Abstract: According to an aspect, a method for key-value storage includes determining whether a data size of a first set comprising data and a key stored in a first area or a second area of a first storage unit is larger than a threshold determined for the first area or the second area in which the first set is stored, as a first execution condition. The method further includes determining whether a degree of collisions of a hash value indicating a storage location of the first set in the first area of the first storage unit is greater than a predetermined threshold, as a second execution condition. When the set satisfies either of the first or second execution conditions, the method includes the first set in the second area.
    Type: Application
    Filed: April 19, 2017
    Publication date: August 3, 2017
    Inventors: Jie Ding, Tatsuyuki Shiomi, Yoshiko Yaegashi, Nobuyuki Yoshifuji
  • Patent number: 9659048
    Abstract: According to an aspect, a key-value store (KVS) system includes a data management unit that stores a data KVS storing a pair of a data KVS key including information on a storage location of application data to be an access target object and the application data; and a key KVS storing a pair of an application key and the data KVS key. The data KVS includes a normal partition in which a size of a record for storing one pair is a predetermined specific size; and a special partition in which the size of the record for storing one pair is a size set according to a data size of the pair to be stored. A data relocation unit relocates a pair of a relocation target object to the special partition having the record size suitable for the data size of the pair.
    Type: Grant
    Filed: September 19, 2014
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jie Ding, Tatsuyuki Shiomi, Yoshiko Yaegashi, Nobuyuki Yoshifuji