Patents by Inventor Yuko Onishi

Yuko Onishi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132432
    Abstract: Provided is a compound represented by Formula (1A) below wherein the symbols are as defined in the description: Also disclosed are a composition containing at least one of the compound and a formed article of the compound.
    Type: Application
    Filed: December 18, 2023
    Publication date: April 25, 2024
    Applicants: Kyoto University, DAIKIN INDUSTRIES, LTD.
    Inventors: Tomoki OGOSHI, Katsuto ONISHI, Shuhei YAMAGUCHI, Yuko SHIOTANI, Masaji KOMORI, Hirokazu AOYAMA, Yosuke KISHIKAWA, Akiyoshi YAMAUCHI
  • Patent number: 9825764
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: November 21, 2017
    Assignee: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Patent number: 9819493
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: November 14, 2017
    Assignee: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Patent number: 9519757
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: December 13, 2016
    Assignee: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Publication number: 20150244530
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Publication number: 20150244528
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Publication number: 20150244529
    Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 27, 2015
    Applicant: Unisys Corporation
    Inventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
  • Patent number: 8802269
    Abstract: A flat nonaqueous secondary battery with improved reliability is provided. The flat nonaqueous secondary battery (1) includes an electrode assembly disposed in a space formed by an exterior case (2) and a seal case (3). The electrode assembly includes a plurality of positive electrodes (5) and a plurality of negative electrodes (6) alternately stacked upon each other and a separator (7). The separator (7) has a joint (7c) formed by welding together at least a portion of its periphery. When the separator (7) and the positive electrode (5) are measured along a cross section in their thickness direction, the ratio A/B of the shortest distance A between the end of the joint (7c) of the separator (7) facing the positive electrode (5) and the outer periphery of the positive electrode (5) sandwiched by the separator (7) to the thickness B of the positive electrode (5) is not smaller than 1.
    Type: Grant
    Filed: November 24, 2010
    Date of Patent: August 12, 2014
    Assignee: Hitachi Maxell, Ltd.
    Inventors: Yuko Onishi, Toshikazu Yoshiba, Megumu Takai
  • Patent number: 8751820
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: June 10, 2014
    Assignee: Unisys Corporation
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Patent number: 8479019
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: July 2, 2013
    Assignee: Unisys Corporation
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Publication number: 20130151843
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 13, 2013
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Publication number: 20130151863
    Abstract: Calls from an application in an emulated environment to a module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing the module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 13, 2013
    Inventors: Kevin F. Clayton, Yuko Onishi, Raymond Campbell
  • Publication number: 20120276437
    Abstract: A flat nonaqueous secondary battery with improved reliability is provided. The flat nonaqueous secondary battery (1) includes an electrode assembly disposed in a space formed by an exterior case (2) and a seal case (3). The electrode assembly includes a plurality of positive electrodes (5) and a plurality of negative electrodes (6) alternately stacked upon each other and a separator (7). The separator (7) has a joint (7c) formed by welding together at least a portion of its periphery. When the separator (7) and the positive electrode (5) are measured along a cross section in their thickness direction, the ratio A/B of the shortest distance A between the end of the joint (7c) of the separator (7) facing the positive electrode (5) and the outer periphery of the positive electrode (5) sandwiched by the separator (7) to the thickness B of the positive electrode (5) is not smaller than 1.
    Type: Application
    Filed: November 24, 2010
    Publication date: November 1, 2012
    Applicant: HITACHI MAXELL ENERGY, LTD.
    Inventors: Yuko Onishi, Toshikazu Yoshiba, Megumu Takai