Patents by Inventor Yuko Onishi
Yuko Onishi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240132432Abstract: Provided is a compound represented by Formula (1A) below wherein the symbols are as defined in the description: Also disclosed are a composition containing at least one of the compound and a formed article of the compound.Type: ApplicationFiled: December 18, 2023Publication date: April 25, 2024Applicants: Kyoto University, DAIKIN INDUSTRIES, LTD.Inventors: Tomoki OGOSHI, Katsuto ONISHI, Shuhei YAMAGUCHI, Yuko SHIOTANI, Masaji KOMORI, Hirokazu AOYAMA, Yosuke KISHIKAWA, Akiyoshi YAMAUCHI
-
Patent number: 9825764Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: November 21, 2017Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9819493Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: November 14, 2017Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 9519757Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: December 13, 2016Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244530Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244528Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244529Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Patent number: 8802269Abstract: A flat nonaqueous secondary battery with improved reliability is provided. The flat nonaqueous secondary battery (1) includes an electrode assembly disposed in a space formed by an exterior case (2) and a seal case (3). The electrode assembly includes a plurality of positive electrodes (5) and a plurality of negative electrodes (6) alternately stacked upon each other and a separator (7). The separator (7) has a joint (7c) formed by welding together at least a portion of its periphery. When the separator (7) and the positive electrode (5) are measured along a cross section in their thickness direction, the ratio A/B of the shortest distance A between the end of the joint (7c) of the separator (7) facing the positive electrode (5) and the outer periphery of the positive electrode (5) sandwiched by the separator (7) to the thickness B of the positive electrode (5) is not smaller than 1.Type: GrantFiled: November 24, 2010Date of Patent: August 12, 2014Assignee: Hitachi Maxell, Ltd.Inventors: Yuko Onishi, Toshikazu Yoshiba, Megumu Takai
-
Patent number: 8751820Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: December 13, 2011Date of Patent: June 10, 2014Assignee: Unisys CorporationInventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Patent number: 8479019Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: December 13, 2011Date of Patent: July 2, 2013Assignee: Unisys CorporationInventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Publication number: 20130151843Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Publication number: 20130151863Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
-
Publication number: 20120276437Abstract: A flat nonaqueous secondary battery with improved reliability is provided. The flat nonaqueous secondary battery (1) includes an electrode assembly disposed in a space formed by an exterior case (2) and a seal case (3). The electrode assembly includes a plurality of positive electrodes (5) and a plurality of negative electrodes (6) alternately stacked upon each other and a separator (7). The separator (7) has a joint (7c) formed by welding together at least a portion of its periphery. When the separator (7) and the positive electrode (5) are measured along a cross section in their thickness direction, the ratio A/B of the shortest distance A between the end of the joint (7c) of the separator (7) facing the positive electrode (5) and the outer periphery of the positive electrode (5) sandwiched by the separator (7) to the thickness B of the positive electrode (5) is not smaller than 1.Type: ApplicationFiled: November 24, 2010Publication date: November 1, 2012Applicant: HITACHI MAXELL ENERGY, LTD.Inventors: Yuko Onishi, Toshikazu Yoshiba, Megumu Takai