Patents by Inventor Tomohiro Shioya
Tomohiro Shioya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160366555Abstract: A method for transferring data among communication devices. The method includes a first communication device receiving, from a second communication device, data to be transferred and a condition defining a range of data transfer. The first communication device then determines whether a third communication device satisfies the condition defining the range of data transfer. On condition that the first communication device determines that the third communication device satisfies the condition, the first communication device directly transfers the data and the condition to the third communication device.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Inventors: Hirofumi Nishikawa, Tomohiro Shioya, Kei Sugano, Shoichiro Watanabe
-
Publication number: 20160356878Abstract: Aspects of the present invention disclose a method, computer program product, and system for mobile computing device proximity notification. The method includes one or more processors acquiring location information for a plurality of mobile computing devices. The method further includes one or more processors creating a first group of mobile computing devices based on location proximity in the acquired location information of the plurality of mobile computing devices, wherein the created first group includes a first mobile computing device and a second mobile computing device. The method further includes one or more processors determining whether the first mobile computing device is within a predetermined distance to the second mobile computing device, and the first mobile computing device and the second mobile computing device are outside of an area associated with the first group.Type: ApplicationFiled: June 5, 2015Publication date: December 8, 2016Inventors: Tomoka Mochizuki, Tomohiro Shioya, Asuka Unno, Lianzi Wen
-
Publication number: 20160360363Abstract: Aspects of the present invention disclose a method, computer program product, and system for mobile computing device proximity notification. The method includes one or more processors acquiring location information for a plurality of mobile computing devices. The method further includes one or more processors creating a first group of mobile computing devices based on location proximity in the acquired location information of the plurality of mobile computing devices, wherein the created first group includes a first mobile computing device and a second mobile computing device. The method further includes one or more processors determining whether the first mobile computing device is within a predetermined distance to the second mobile computing device, and the first mobile computing device and the second mobile computing device are outside of an area associated with the first group.Type: ApplicationFiled: May 5, 2016Publication date: December 8, 2016Inventors: Tomoka Mochizuki, Tomohiro Shioya, Asuka Unno, Lianzi Wen
-
Patent number: 9479898Abstract: An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are provided in which the information processing device includes: an input unit for receiving a first password and a specified location from a user; a mode setting unit for switching to a restricted mode restricting at least some of the functions of the information processing device in response to receiving the first password and location; and a releasing unit for releasing the restricted mode on condition that the information processing device has reached the specified location.Type: GrantFiled: October 17, 2014Date of Patent: October 25, 2016Assignee: International Business Machines CorporationInventors: Taku Aratsu, Sanehiro Furuichi, Tomohiro Shioya
-
Patent number: 9464914Abstract: Information of landmark candidates, near a map route, is extracted. A recognizability score for the landmark candidates is assigned based on the extracted information of the landmark candidates. A landmark is selected, based on recognizability score, among the landmark candidates. And the map route is modified based the selected landmark.Type: GrantFiled: September 1, 2015Date of Patent: October 11, 2016Assignee: International Business Machines CorporationInventors: Takahisa Mizuno, Tomohiro Shioya, Sayaka Tamai
-
Patent number: 9336243Abstract: To inform a user that image data including an image of the user or the like is posted on a network, an information providing apparatus includes an acquisition unit for acquiring an action log including a history of a set of a user's positions and dates and times when the user was at the positions. The apparatus further includes a search unit for searching for image data that has been captured at a location and a date and time corresponding to a position of the user and a date and time included in the action log from image data posted on a network. The apparatus also includes a matching unit for detecting image data that includes an image relating to the user from pieces of image data found by the search unit.Type: GrantFiled: November 12, 2012Date of Patent: May 10, 2016Assignee: International Business Machines CorporationInventors: Kiriyama Hayato, Tomohiro Shioya, Tadashi Tsumura
-
Publication number: 20160117352Abstract: In a search server, a page collection unit collects Internet pages. An index generation unit generates an index of the pages. An index-tree generation unit generates an index tree representing the connection relationship among the pages in a tree structure, and in which a page linked from multiple pages is represented by different nodes in a duplicated manner. When a search word input unit inputs a search word in a client, a search-result generation unit of the search server generates a search result on the basis of the index. For the index tree, a search-result-tree generation unit, for example, highlights nodes containing the search word, and deletes nodes, each of which does not contain the search word and is not a branch point into multiple branches which contain the search word. The search-result-tree generation unit outputs the resulting search result to a search result display unit of the client.Type: ApplicationFiled: April 6, 2015Publication date: April 28, 2016Inventors: Hiroshi Kurokawa, Takahisa Mizuno, Tomohiro Shioya, Sayaka Tamai
-
Publication number: 20160117163Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.Type: ApplicationFiled: September 1, 2015Publication date: April 28, 2016Inventors: Yuto Fukui, Daisuke Hayashi, Tomohiro Shioya
-
Publication number: 20160117489Abstract: A technique for supporting secondary use of content of an electronic work. This technique includes receiving, from a user terminal, a use request requesting secondary use of the content of the electronic work, in which a secondary use policy of an author of the electronic work is associated with the electronic work; determining whether the use request satisfies the secondary use policy specified by the author; and transmitting, to the user terminal, together with a unique identifier associated with the use request, content of the electronic work based on the determination or edited content based on the determination.Type: ApplicationFiled: October 21, 2015Publication date: April 28, 2016Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada, Hiroaki Uetsuki
-
Publication number: 20160110330Abstract: A method includes storing, in response to marking by a user of an area of a displayed document, information on the marked area; displaying an icon representing the marked area; conducting the storing operation and the displaying operation for a different area; and creating, in response to an operation by the user for arranging two or more icons to be in contact with each other, a joined icon by joining the icons together; and combining marked areas represented by the two or more respective icons, according to a state of contact. A corresponding computer program product and computer system are also disclosed herein.Type: ApplicationFiled: August 12, 2015Publication date: April 21, 2016Inventors: Tomoka Mochizuki, Tomohiro Shioya, Asuka Unno, Lianzi Wen
-
Patent number: 9280682Abstract: A private information management apparatus, a method, and a program that allows individual users to easily set and apply their privacy rules. A private information management apparatus receives setting data from a user terminal and creates a privacy rule that defines a condition for restricting disclosure of private information and a restriction method. If undisclosed image data contains private information of a user, the private information management apparatus extracts metadata contained in this undisclosed image data, and determines whether or not the metadata satisfies the condition for restricting disclosure of the private information. If it is determined that the condition is satisfied, the private information management apparatus executes the restriction method defined by the privacy rule.Type: GrantFiled: September 20, 2012Date of Patent: March 8, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Kiriyama Hayato, Tomohiro Shioya, Tadashi Tsumura
-
Publication number: 20150331729Abstract: Controlling a remote procedure call from a client computer to a server computer, the client computer extracts a periodic remote procedure call from among a plurality of remote procedure calls from the client computer and extracts a non-periodic remote procedure call from among the plurality of remote procedure calls from the client computer. The client computer identifies a first information associated with the extracted periodic remote procedure call that is an item whose value is determined to represent data targeted by the periodic remote procedure call. The client computer identifies a second information associated with the extracted non-periodic remote procedure call that is a targeted data value of the item, and sets a priority level, used to select for execution the periodic procedure call, based on the first information and the second information.Type: ApplicationFiled: April 17, 2015Publication date: November 19, 2015Inventors: Hiroshi Kurokawa, Takahisa Mizuno, Tomohiro Shioya, Sayaka Tamai
-
Publication number: 20150324959Abstract: A technique to improve the efficiency for generating a filter for separating elements to be displayed from elements constituting data. At a client, a content acquisition unit acquires content from a server. A content division unit divides the content into elements. An element display unit randomly displays the elements at positions different from positions at which the elements of the content in an original form are displayed. A selected-element identification unit identifies an element selected by a user from the elements. A filter generation unit generates a filter based on the identified element and saves the filter in a filter saving unit. A filtering unit applies the filter saved in the filter saving unit to the content. A content display unit displays the filtered content.Type: ApplicationFiled: March 26, 2015Publication date: November 12, 2015Inventors: Sanehiro Furuichi, Tomohiro Shioya
-
Publication number: 20150324553Abstract: A method, system, and program to prevent leakage of confidential information included in a display content. A terminal device controls the displays of an internal display and an external display provided separately from the internal display. The terminal device includes a display control section which, when confidential information is included in an image to be displayed on the external display, causes the external display to display a substitute content instead of this image, and the internal display to display the image including the confidential information, and a confidential information processing section for performing processing on the confidential information included in the image displayed on the internal display by the display control section.Type: ApplicationFiled: May 7, 2015Publication date: November 12, 2015Inventors: Sanehiro Furuichi, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Publication number: 20150294109Abstract: A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity.Type: ApplicationFiled: January 28, 2015Publication date: October 15, 2015Inventors: Eisuke Kanzaki, Akira Ohkado, Tomohiro Shioya, Masami Tada
-
Publication number: 20150253942Abstract: A change operation changing a displayed portion of an electronic document from a first portion to a second portion is detected. First and second ranges of displayable portions of the electronic document are determined. The first range includes the first portion of the document and the second range includes the second portion of the document. A character string appears at a first frequency in the first range, and appears at a second frequency in the second range. Change information is generated that relates the second appearance frequency to the first appearance frequency.Type: ApplicationFiled: February 18, 2015Publication date: September 10, 2015Inventors: Hiroshi Kurokawa, Takahisa Mizuno, Tomohiro Shioya, Sayaka Tamai
-
Publication number: 20150229643Abstract: A mechanism is provided for sensor sharing control dynamically. One or more sensor use permissions are received from one or more sensor provider terminals. For each sensor use permission, a sensor use permission is recorded in an authorization policy thereby forming a set of authorization policies. A use request is recorded for sensor use request information received from a sensor user terminal in a request policy. A search is performed for any authorization policy in the set of authorization policies that matches the request policy. Responsive to identifying the authorization policy that matches the request policy, a list of sensors included in the sensor use permissions of an authorization policy that matches the request policy is created. The list of sensors is transmitted to the sensor user terminal, where the search is performed again dynamically when the request policy or one of the set of authorization policies is changed.Type: ApplicationFiled: July 19, 2013Publication date: August 13, 2015Inventors: Hayato Kiriyama, Tomohiro Shioya, Tadashi Tsumura
-
Publication number: 20150121515Abstract: An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are provided in which the information processing device includes: an input unit for receiving a first password and a specified location from a user; a mode setting unit for switching to a restricted mode restricting at least some of the functions of the information processing device in response to receiving the first password and location; and a releasing unit for releasing the restricted mode on condition that the information processing device has reached the specified location.Type: ApplicationFiled: October 17, 2014Publication date: April 30, 2015Inventors: Taku Aratsu, Sanehiro Furuichi, Tomohiro Shioya
-
Publication number: 20150012880Abstract: A method, system, and/or computer program product moves a movable object displayed on a display screen using an electronic device. The method comprises the electronic device displaying a first frame around a first area on a display screen, and displaying a second frame around a second area on the display screen. The second frame displayed is larger than the first frame, and adjusts in size until it intersects a movable object. Once the second frame intersects the movable object, a half line is displayed from the first frame to the movable object, and in response to receiving a movement signal, a display of the movable object is then displayed in the first area.Type: ApplicationFiled: June 30, 2014Publication date: January 8, 2015Inventors: Hiroshi Kurokawa, Takahisa Mizuno, Tomohiro Shioya, Sayaka Tamai
-
Publication number: 20140344948Abstract: A private information management apparatus, a method, and a program that allows individual users to easily set and apply their privacy rules. A private information management apparatus receives setting data from a user terminal and creates a privacy rule that defines a condition for restricting disclosure of private information and a restriction method. If undisclosed image data contains private information of a user, the private information management apparatus extracts metadata contained in this undisclosed image data, and determines whether or not the metadata satisfies the condition for restricting disclosure of the private information. If it is determined that the condition is satisfied, the private information management apparatus executes the restriction method defined by the privacy rule.Type: ApplicationFiled: September 20, 2012Publication date: November 20, 2014Applicant: International Business Machines CorporationInventors: Kiriyama Hayato, Tomohiro Shioya, Tadashi Tsumura