Patents by Inventor Yoko Hashimoto

Yoko Hashimoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240147032
    Abstract: The imaging device (10) includes an optical element (12) having each transparent substrate and a plurality of structures disposed on or in the transparent substrate in a plane direction of the transparent substrate, an imaging element (11) in which a plurality of pixels including a photoelectric conversion elements are disposed, and a signal processing unit (13) configured to generate an image signal based on an electrical signal acquired from the imaging element (11), wherein the optical element (12) forms an image in which a point spread function of each wavelength is convoluted on a plurality of pixels corresponding to each polarized light component depending on polarized light components by outputting light in a state in which the optical element has different point spread functions for respective wavelengths, the plurality of structures have the same height in a side view, and the signal processing unit (13) reconstructs an image in which a point spread function of each wavelength is convoluted for each
    Type: Application
    Filed: January 27, 2021
    Publication date: May 2, 2024
    Inventors: Masashi MIYATA, Yoko SOGABE, Fumihide KOBAYASHI, Shiori SUGIMOTO, Naru NEMOTO, Toshikazu HASHIMOTO
  • Publication number: 20240121488
    Abstract: An imaging device includes an optical element including a transparent substrate and a plurality of structures disposed on or in the transparent substrate in a plane direction of the transparent substrate, an imaging sensor in which a plurality of pixels each including a photoelectric conversion element are arranged, and a signal processing unit configured to generate an image signal based on an electric signal obtained from the imaging sensor, wherein the optical element outputs light with a different point spread function for each wavelength to form, on the imaging sensor, an image in which the point spread function of each wavelength is convoluted, the plurality of structures have the same height in a side view, and the signal processing unit reconstructs an image in which the point spread function of each wavelength is convoluted.
    Type: Application
    Filed: January 27, 2021
    Publication date: April 11, 2024
    Inventors: Masashi MIYATA, Yoko SOGABE, Fumihide KOBAYASHI, Shiori SUGIMOTO, Naru NEMOTO, Toshikazu HASHIMOTO
  • Patent number: 9677096
    Abstract: A method of manufacturing 1,4-butanediol through acetyl-CoA, acetoacetyl-CoA, 3-hydroxybutyryl-CoA, crotonyl-CoA, and 4-hydroxybutyryl-CoA by using a microbe and/or a culture thereof, wherein the microbe in the manufacturing method for 1,4-butanediol includes any one of genes among (a) a gene that has a base sequence of sequence number 1, (b) a gene that has a base sequence such that one or more bases are deleted, substituted, or added in a base sequence of sequence number 1, wherein the gene has a base sequence with an identity greater than or equal to 90% with respect to the base sequence of sequence number 1, and (c) a gene that hybridizes with a gene that has a base sequence complementary with a gene that has a base sequence described in sequence number 1 on a stringent condition, and includes any one or more genes among (d) genes that have base sequences of sequence numbers 2 to 9, (e) genes that have base sequences such that one or more bases are deleted, substituted, or added in base sequences of seque
    Type: Grant
    Filed: November 28, 2013
    Date of Patent: June 13, 2017
    Assignee: SHOWA DENKO K.K.
    Inventors: Hirobumi Aoki, Yuzuru Kokido, Yoko Hashimoto, Tadashi Yoneda
  • Patent number: 9419804
    Abstract: A data authenticity assurance method carried out by a management computer including: a first step of receiving the first data piece from the computer; a second step of selecting a plurality of second data pieces at predetermined intervals in chronological order from among the plurality of second data pieces held in the data holding part; a third step of performing an arithmetic operation for each of the hash values of the selected plurality of second data pieces; a fourth step of generating signature target data by combining the first data piece received from the computer with the hash values of the selected plurality of second data pieces; and a fifth step of generating a second data piece by assigning the digital signature to the signature target data by using the preset key, and holding the generated second data piece in chronological order sequentially in the data holding part.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: August 16, 2016
    Assignee: HITACHI, LTD.
    Inventors: Natsuki Watanabe, Yoko Hashimoto, Kosuke Anzai, Kunihiko Miyazaki, Naoki Hayashi, Yoshiaki Isobe, Tomohisa Kumagai, Daisuke Miyamoto
  • Publication number: 20150376657
    Abstract: A method of manufacturing 1,4-butanediol through acetyl-CoA, acetoacetyl-CoA, 3-hydroxybutyryl-CoA, crotonyl-CoA, and 4-hydroxybutyryl-CoA by using a microbe and/or a culture thereof, wherein the microbe in the manufacturing method for 1,4-butanediol includes any one of genes among (a) a gene that has a base sequence of sequence number 1, (b) a gene that has a base sequence such that one or more bases are deleted, substituted, or added in a base sequence of sequence number 1, wherein the gene has a base sequence with an identity greater than or equal to 90% with respect to the base sequence of sequence number 1, and (c) a gene that hybridizes with a gene that has a base sequence complementary with a gene that has a base sequence described in sequence number 1 on a stringent condition, and includes any one or more genes among (d) genes that have base sequences of sequence numbers 2 to 9, (e) genes that have base sequences such that one or more bases are deleted, substituted, or added in base sequences of seque
    Type: Application
    Filed: November 28, 2013
    Publication date: December 31, 2015
    Applicant: SHOWA DENKO K. K.
    Inventors: Hirobumi AOKI, Yuzuru KOKIDO, Yoko HASHIMOTO, Tadashi YONEDA
  • Publication number: 20150353962
    Abstract: A method of manufacturing 1,4-butanediol, using a microbe and/or a culture thereof, by an enzyme reaction system that uses acyl-CoA reductase, via 3-hydroxybutyryl-CoA, crotonyl-CoA and 4-hydroxybutyryl CoA in this order, wherein the reactivity of the acyl-CoA reductase to 4-hydroxybutyryl CoA is greater than or equal to 0.05 times of the reactivity of the acyl-CoA reductase to 3-hydroxybutyryl-CoA.
    Type: Application
    Filed: September 20, 2013
    Publication date: December 10, 2015
    Inventors: Hirobumi AOKI, Yuzuru KOKIDO, Yoko HASHIMOTO, Tadashi YONEDA
  • Publication number: 20150307905
    Abstract: A method of manufacturing a butanediol through 3-hydroxybutyryl-CoA that uses a microbe and/or a culture thereof and utilizes an enzyme reaction that is caused by an acyl-CoA reductase, wherein the microbe in the manufacturing method for a butanediol is characterized in that an activity of an acyl-CoA hydratase (EC number: 3. 1. 2. ?) is deleted or reduced.
    Type: Application
    Filed: December 4, 2013
    Publication date: October 29, 2015
    Inventors: Hirobumi AOKI, Yuzuru KOKIDO, Yoko HASHIMOTO, Tadashi YONEDA
  • Publication number: 20150302213
    Abstract: Security measures taking into consideration significance of handled information is made applicable and prevents security requirement to be set in the system from missing, in system security design. In supporting requirement defining and measures planning, the system as the target of design is indicated divided in a plurality of zones and is classified into a path 420 communicably coupling the zones, a zone boundary 419 being a coupling part between the path 420 and each zone, and an in-zone 418, and has associated and registered to each a security requirement 403 and security measures 413 having measures to be taken divided into levels. The path 420 has also associated a level of transmitted data and the level 409 of the corresponding zone boundary 419 is determined according to the transmitted data level of the path.
    Type: Application
    Filed: March 13, 2015
    Publication date: October 22, 2015
    Applicant: Hitachi, Ltd.
    Inventors: YOKO Hashimoto, Tadashi Kaji, Yoshinobu Tanigawa, Shinya Iguchi, Yukiko Matsubara, Ryosuke Ando
  • Publication number: 20150291985
    Abstract: A method of manufacturing 1,4-butanediol by an enzyme reaction system via 3-hydroxybutyryl-CoA, crotonyl-CoA and 4-hydroxybutyryl CoA, in this order, using a microbe and/or a culture thereof, wherein the 3-hydroxybutyryl-CoA is an optically active substance, and wherein the microbe includes (1) a gene that codes enoyl-CoA hydratase, (2) a gene that codes vinylacetyl-CoA delta-isomerase, (3) a gene that codes 4-hydroxybutyryl CoA dehydratase, and (4) a gene that codes acyl-CoA reductase whose substrate specificity has an optical selectivity opposite to that of the 3-hydroxybutyryl-CoA.
    Type: Application
    Filed: September 20, 2013
    Publication date: October 15, 2015
    Inventors: Hirobumi Aoki, Yuzuru Kokido, Yoko Hashimoto, Tadashi Yoneda
  • Publication number: 20150275236
    Abstract: A method of manufacturing 1,4-butanediol, using a microbe and/or a culture thereof, by an enzyme reaction system that uses acetoacetyl-CoA reductase and enoyl-CoA hydratase, via acetoacetyl-CoA, 3-hydroxybutyryl-CoA and crotonyl-CoA in this order, wherein each of the acetoacetyl-CoA reductase and the enoyl-CoA hydratase is specific to a stereoisomer of 3-hydroxybutyryl-CoA.
    Type: Application
    Filed: September 13, 2013
    Publication date: October 1, 2015
    Inventors: Hirobumi Aoki, Yuzuru Kokido, Yoko Hashimoto, Tadashi Yoneda
  • Publication number: 20140298034
    Abstract: A data authenticity assurance method carried out by a management computer including: a first step of receiving the first data piece from the computer; a second step of selecting a plurality of second data pieces at predetermined intervals in chronological order from among the plurality of second data pieces held in the data holding part; a third step of performing an arithmetic operation for each of the hash values of the selected plurality of second data pieces; a fourth step of generating signature target data by combining the first data piece received from the computer with the hash values of the selected plurality of second data pieces; and a fifth step of generating a second data piece by assigning the digital signature to the signature target data by using the preset key, and holding the generated second data piece in chronological order sequentially in the data holding part.
    Type: Application
    Filed: October 2, 2012
    Publication date: October 2, 2014
    Applicant: Hitachi, Ltd.
    Inventors: Natsuki Watanabe, Yoko Hashimoto, Kosuke Anzai, Kunihiko Miyazaki, Naoki Hayashi, Yoshiaki Isobe, Tomohisa Kumagai, Daisuke Miyamoto
  • Patent number: 8819417
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: August 26, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
  • Patent number: 8635449
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: January 21, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Patent number: 8380985
    Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: February 19, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
  • Patent number: 8347082
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Grant
    Filed: August 18, 2009
    Date of Patent: January 1, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Publication number: 20120159158
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Application
    Filed: February 28, 2012
    Publication date: June 21, 2012
    Applicant: HITACHI, LTD.
    Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
  • Patent number: 8176316
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Grant
    Filed: February 25, 2009
    Date of Patent: May 8, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
  • Patent number: 8094337
    Abstract: To minimize risk of printing-out to a printer located at an improper base, where a network is established between the bases, terminal devices, a server, printers, and a management device which manages printers are provided. The management device manages position information of the printers installed in bases. Every time printing is requested, the management device extracts printer candidates located close to a terminal device and asks a user of the terminal device to select one of the printer candidates. The user visually confirms the installation locations of the extracted printer candidates included in a list and selects an appropriate printer for each printing. Accordingly, risk of erroneously printing using a printer installed in an improper base can be reduced.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: January 10, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Akifumi Yato, Kazuyoshi Hoshino
  • Patent number: 8019996
    Abstract: To solve problems in that a load on a VPN device is large in a case where the number of terminal devices increases in encrypted communication using a VPN technique, and that only communication between the terminal device and the VPN device is encrypted, thus disabling end-to-end encrypted communication, a communication system is provided, including: a terminal device; a plurality of blades; and a management server that manages the blades, in which: the management server selects a blade, authenticates the terminal device and the selected blade, and mediates encrypted communication path establishment between the terminal device and the selected blade; the terminal device and the blade perform encrypted communication without the mediation of the management server; and the management server requests a validation server to authenticate each terminal.
    Type: Grant
    Filed: October 10, 2007
    Date of Patent: September 13, 2011
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Osamu Takata, Kazuyoshi Hoshino
  • Patent number: 7984290
    Abstract: In an encryption communication using VPN technologies, a load on a VPN system becomes large if the number of communication terminals increases. When an external terminal accesses via an internal terminal an application server, processes become complicated because it is necessary to perform authentication at VPN and authentication at the application server. A management server is provided for managing external terminals, internal terminals and application servers. The management server authenticates each communication terminal and operates to establish an encryption communication path between communication terminals. Authentication of each terminal by the management server relies upon a validation server. When the external terminal performs encryption communication with the application server via the internal terminal, two encryption communication paths are established and used between the external terminal and internal terminal and between the internal terminal and application server.
    Type: Grant
    Filed: May 18, 2006
    Date of Patent: July 19, 2011
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Osamu Takata, Kazuyoshi Hoshino, Shinji Nakamura