Patents by Inventor Nobuyuki Yoshifuji
Nobuyuki Yoshifuji has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11711408Abstract: A method, computer system, and a computer program product for application sharing are provided. Setting information that includes a display preference of a receiver is received. Application content from a host computer is received. The application content includes at least one screen image. The at least one screen image is converted according to the setting information. The converted screen image is transmitted to a receiver computer for real-time screen sharing with the host computer. A host controller action signal is received. The host controller action signal represents a host controller action at the host computer. A content modification is transmitted to the receiver computer for the real-time screen sharing and for displaying with the converted at least one screen image. The content modification corresponds to the host controller action.Type: GrantFiled: July 26, 2021Date of Patent: July 25, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nobuyuki Yoshifuji, Mayumi Goto, Timothy Waileong Koh, Sho Ayuba
-
Patent number: 11647161Abstract: An embodiment for resolving visibility discrepancies of virtual objects in extended reality devices is provided. The embodiment may include receiving one or more virtual objects and a setting for each virtual object from one or more users during an extended reality meeting. The embodiment may also include identifying an owner of each virtual object. The embodiment may further include identifying a referenced virtual object. The embodiment may also include in response to determining the referenced virtual object is only visible to the owner, displaying a warning notification to the owner prior to sharing. The embodiment may further include querying the owner as to whether to share the referenced virtual object with the one or more users other than the owner. The embodiment may also include in response to determining the owner wants to share the referenced virtual object, sharing the referenced virtual object.Type: GrantFiled: May 11, 2022Date of Patent: May 9, 2023Assignee: INIERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nobuyuki Yoshifuji, Kenya Ishimoto, Koichi Omae
-
Publication number: 20230028495Abstract: A method, computer system, and a computer program product for application sharing are provided. Setting information that includes a display preference of a receiver is received. Application content from a host computer is received. The application content includes at least one screen image. The at least one screen image is converted according to the setting information. The converted screen image is transmitted to a receiver computer for real-time screen sharing with the host computer. A host controller action signal is received. The host controller action signal represents a host controller action at the host computer. A content modification is transmitted to the receiver computer for the real-time screen sharing and for displaying with the converted at least one screen image. The content modification corresponds to the host controller action.Type: ApplicationFiled: July 26, 2021Publication date: January 26, 2023Inventors: Nobuyuki Yoshifuji, Mayumi Goto, Timothy Waileong Koh, SHO AYUBA
-
Patent number: 11561787Abstract: A computer-implemented method that includes determining that a first version of an operating system (OS) is updated to a second version of the OS. The method further includes determining that an application does not support the second version of the OS. The method further includes associating the first version of the OS with the application as a base OS. The method further includes invoking the application on the base OS by generating an isolated instance running the base OS on a user device, where the user device simultaneously runs the second version of the OS.Type: GrantFiled: May 13, 2021Date of Patent: January 24, 2023Assignee: International Business Machines CorporationInventors: Sho Ayuba, Mayumi Goto, Timothy Waileong Koh, Nobuyuki Yoshifuji
-
Publication number: 20220365765Abstract: Described are techniques including a computer-implemented method comprising determining that a first version of an operating system (OS) is updated to a second version of the OS. The method further comprises determining that an application does not support the second version of the OS. The method further comprises associating the first version of the OS with the application as a base OS. The method further comprises invoking the application on the base OS by generating an isolated instance running the base OS on a user device, where the user device simultaneously runs the second version of the OS.Type: ApplicationFiled: May 13, 2021Publication date: November 17, 2022Inventors: SHO AYUBA, Mayumi Goto, Timothy Waileong Koh, Nobuyuki Yoshifuji
-
Patent number: 10958638Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.Type: GrantFiled: May 30, 2019Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
-
Patent number: 10740308Abstract: According to an aspect, a method for key-value storage includes determining whether a data size of a first set comprising data and a key stored in a first area or a second area of a first storage unit is larger than a threshold determined for the first area or the second area in which the first set is stored, as a first execution condition. The method further includes determining whether a degree of collisions of a hash value indicating a storage location of the first set in the first area of the first storage unit is greater than a predetermined threshold, as a second execution condition. When the set satisfies either of the first or second execution conditions, the method includes the first set in the second area.Type: GrantFiled: April 19, 2017Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Jie Ding, Tatsuyuki Shiomi, Yoshiko Yaegashi, Nobuyuki Yoshifuji
-
Patent number: 10592005Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.Type: GrantFiled: May 9, 2019Date of Patent: March 17, 2020Assignee: International Business Machines CorporationInventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
-
Publication number: 20190281044Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.Type: ApplicationFiled: May 30, 2019Publication date: September 12, 2019Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
-
Publication number: 20190265805Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.Type: ApplicationFiled: May 9, 2019Publication date: August 29, 2019Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
-
Patent number: 10367807Abstract: A computer program product and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.Type: GrantFiled: October 24, 2017Date of Patent: July 30, 2019Assignee: International Business Machines CorporationInventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
-
Patent number: 10362025Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.Type: GrantFiled: March 7, 2017Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
-
Patent number: 10331226Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.Type: GrantFiled: June 23, 2017Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
-
Patent number: 10261600Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.Type: GrantFiled: August 9, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
-
Publication number: 20180262481Abstract: A computer program product and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.Type: ApplicationFiled: October 24, 2017Publication date: September 13, 2018Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
-
Publication number: 20180262480Abstract: A method, a computer program product, and a computer system for securely sharing confidential information in a document. A first computer sets one or more confidential attributes of the confidential information in the document and creates metadata of the confidential information. The first computer creates a first file including the confidential information and the metadata. The first computer creates a second file including non-confidential information in the document and the metadata; the metadata in the second file is as a reference to the confidential information. The confidential information in the first file is displayed by a second computer at a confidential information visibility level in accordance with an authorization level of an authorized user of the second computer. The second file is displayed at a visibility level without showing the confidential information and is accessible by all users.Type: ApplicationFiled: March 7, 2017Publication date: September 13, 2018Inventors: Masashi Doi, Kenya Ishimoto, Nobuyuki Yoshifuji
-
Publication number: 20180046261Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.Type: ApplicationFiled: August 9, 2016Publication date: February 15, 2018Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
-
Publication number: 20180046262Abstract: The embodiments of the present invention provide systems and methods for remotely operating a target device. A camera image is obtained, including a target screen image (which is an image of a screen of the target device). The camera image is transmitted to and displayed in a second device. Operational information is obtained on the screen of the second device, which displays the camera image. The operational information is transmitted to a first device. Human device data, which derives from the operational information, is inputted from the first device to the target device.Type: ApplicationFiled: June 23, 2017Publication date: February 15, 2018Inventors: Kenya Ishimoto, Hideo Takeda, Nobuyuki Yoshifuji
-
Publication number: 20170220572Abstract: According to an aspect, a method for key-value storage includes determining whether a data size of a first set comprising data and a key stored in a first area or a second area of a first storage unit is larger than a threshold determined for the first area or the second area in which the first set is stored, as a first execution condition. The method further includes determining whether a degree of collisions of a hash value indicating a storage location of the first set in the first area of the first storage unit is greater than a predetermined threshold, as a second execution condition. When the set satisfies either of the first or second execution conditions, the method includes the first set in the second area.Type: ApplicationFiled: April 19, 2017Publication date: August 3, 2017Inventors: Jie Ding, Tatsuyuki Shiomi, Yoshiko Yaegashi, Nobuyuki Yoshifuji
-
Patent number: 9659048Abstract: According to an aspect, a key-value store (KVS) system includes a data management unit that stores a data KVS storing a pair of a data KVS key including information on a storage location of application data to be an access target object and the application data; and a key KVS storing a pair of an application key and the data KVS key. The data KVS includes a normal partition in which a size of a record for storing one pair is a predetermined specific size; and a special partition in which the size of the record for storing one pair is a size set according to a data size of the pair to be stored. A data relocation unit relocates a pair of a relocation target object to the special partition having the record size suitable for the data size of the pair.Type: GrantFiled: September 19, 2014Date of Patent: May 23, 2017Assignee: International Business Machines CorporationInventors: Jie Ding, Tatsuyuki Shiomi, Yoshiko Yaegashi, Nobuyuki Yoshifuji