Patents by Inventor Satoko Tonegawa

Satoko Tonegawa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9009158
    Abstract: The present invention is to support the retrieval of an ambiguous file stored on a computer. Desktop space images are generated at predetermined time intervals, and metadata for each desktop space image is created from internally used data and externally input data existing at the time. The metadata consists of multiple pieces of tag data, and part of tag data is a target file to be searched for. Upon searching for the target file, a user selects a desktop space image that evokes the target file from among the multiple desktop space images initially displayed. The selected desktop space image is displayed and the target file is selected from the metadata associated with the desktop space image displayed. The desktop space image can refresh a user's recollection about the target file, and hence allows the user to narrow down the scope of search.
    Type: Grant
    Filed: October 11, 2010
    Date of Patent: April 14, 2015
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Satoko Tonegawa, Kunihiko Miwa
  • Patent number: 7996854
    Abstract: A method executed in an information processing apparatus for controlling resource access by an application program running on the information processing apparatus is provided. A change in connection statuses or operating statuses of a device connected to the information processing apparatus is first detected. In response to the detection, a resource access condition to be applied to the information processing apparatus is selected based on certain criterion. The selected resource access condition is stored in a condition storage unit. Then, in response to capture of a function call for resource access issued to an operating system by the application program, the resource access condition is read from the condition storage unit, and it is determined on the basis of the resource access condition whether the captured function call is allowed. If it is determined that the captured function call is not allowed, the function call is rejected.
    Type: Grant
    Filed: December 11, 2007
    Date of Patent: August 9, 2011
    Assignee: International Business Machines Corporation
    Inventors: Sanehiro Furuichi, Akihiro Ogura, Satoko Tonegawa
  • Publication number: 20110087663
    Abstract: The present invention is to support the retrieval of an ambiguous file stored on a computer. Desktop space images are generated at predetermined time intervals, and metadata for each desktop space image is created from internally used data and externally input data existing at the time. The metadata consists of multiple pieces of tag data, and part of tag data is a target file to be searched for. Upon searching for the target file, a user selects a desktop space image that evokes the target file from among the multiple desktop space images initially displayed. The selected desktop space image is displayed and the target file is selected from the metadata associated with the desktop space image displayed. The desktop space image can refresh a user's recollection about the target file, and hence allows the user to narrow down the scope of search.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 14, 2011
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: Satoko Tonegawa, Kunihiko Miwa
  • Publication number: 20080172466
    Abstract: It is an object of the present invention to send information accurately to a target person having a plurality of e-mail addresses or contact points. A delivery server 10 is provided for sending an e-mail selectively to a target person having a plurality of e-mail addresses. The delivery server 10 predicts a target person's condition when sending the e-mail, orders the plurality of e-mail addresses in descending order of likelihood that the target person will receive the e-mail, and sends the e-mail according to the ordering. Furthermore, it is configured so that the next ordering reflects the e-mail address where the target person has received the message as a result of sending the e-mail.
    Type: Application
    Filed: December 19, 2003
    Publication date: July 17, 2008
    Applicant: International Business Machines Corporation
    Inventors: Satoko Tonegawa, Nobuhiro Asai
  • Publication number: 20080163242
    Abstract: A method executed in an information processing apparatus for controlling resource access by an application program running on the information processing apparatus is provided. A change in connection statuses or operating statuses of a device connected to the information processing apparatus is first detected. In response to the detection, a resource access condition to be applied to the information processing apparatus is selected based on certain criterion. The selected resource access condition is stored in a condition storage unit. Then, in response to capture of a function call for resource access issued to an operating system by the application program, the resource access condition is read from the condition storage unit, and it is determined on the basis of the resource access condition whether the captured function call is allowed. If it is determined that the captured function call is not allowed, the function call is rejected.
    Type: Application
    Filed: December 11, 2007
    Publication date: July 3, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanehiro Furuichi, Akihiro Ogura, Satoko Tonegawa
  • Patent number: 7046817
    Abstract: It is one object of the present invention to prevent embedded verification information from being lost even when a quantization process is performed after verification information has been embedded. A pre-embedding portion 32 converts a image data value so that quantized values not changing by error introduced through the embedding process. A hash value calculator 300 calculates a hash value using image data and key information, and a hash value embedding portion 302 embeds the hash value in the image data. An output format converter 304 quantizes the image data in which the hash value is embedded, and generates JPEG data.
    Type: Grant
    Filed: January 18, 2001
    Date of Patent: May 16, 2006
    Assignee: International Business Machines Corporation
    Inventors: Kohichi Kamijoh, Norishiqe Morimoto, Satoko Tonegawa
  • Patent number: 6963655
    Abstract: The present invention is directed to the detection of what part of an image alteration was added to by embedding an electronic watermark in the image. More particularly, embedding part 30 renders as pairs two each of DCT blocks of luminance component Y of an image, randomly selects, by using a random number, mutually corresponding DCT coefficients from each DCT block contained in the pairs, and manipulates so that the relationship among these DCT coefficients represent data according to a certain rule, and then embeds the data. If alteration is added to this image, the DCT coefficients contained in the pairs in the altered part do not observe the above rule and represent different values from the original data. Extraction part 40 extracts data from the image, and makes decision by majority to estimate the initially embedded data to detect and display the pairs from which different data form the estimated data was extracted as those to which alteration was added.
    Type: Grant
    Filed: April 12, 2000
    Date of Patent: November 8, 2005
    Assignee: International Business Machines Corporation
    Inventors: Satoko Tonegawa, Norishige Morimoto, Kohichi Kamijoh
  • Patent number: 6829367
    Abstract: Content data is judged to determine whether data prepared by a digital device were altered by performing an authentication process using a medium on which content data are recorded; reading the content data from the medium; embedding, in the content data, data for verifying the pertinent content; extracting, from the content data, the data for verifying the pertinent contents; using the results of the extraction to determine whether the content data were altered. Preferably, the means includes means for identifying any portion containing altered data.
    Type: Grant
    Filed: June 16, 2000
    Date of Patent: December 7, 2004
    Assignee: International Business Machines Corporation
    Inventors: Kazuhara Toyokawa, Norishige Morimoto, Satoko Tonegawa
  • Publication number: 20010010729
    Abstract: It is one object of the present invention to prevent embedded verification information from being lost even when a quantization process is performed after verification information has been embedded. A pre-embedding portion 32 converts a image data value so that quantized values not changing by error introduced through the embedding process. A hash value calculator 300 calculates a hash value using image data and key information, and a hash value embedding portion 302 embeds the hash value in the image data. An output format converter 304 quantizes the image data in which the hash value is embedded, and generates JPEG data.
    Type: Application
    Filed: January 18, 2001
    Publication date: August 2, 2001
    Inventors: Kohichi Kamijoh, Norishiqe Morimoto, Satoko Tonegawa