| 10825013 |
Systems and methods for face-to-face mobile phone mercantile transactions |
Toru Aihara, Shivkumar Kalyanaraman, Noboru Kamijo, Koichi Kamijo, Kiran A. Kate +1 more |
2020-11-03 |
| 9798696 |
Computer system, method, and program |
Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Takeo Yoshizawa |
2017-10-24 |
| 9794138 |
Computer system, method, and program |
Munehiro Doi, Hideaki Komatsu, Kumiko Maeda, Takeo Yoshizawa |
2017-10-17 |
| 9141732 |
Simulation execution method, program, and system |
Shu Shimizu, Gang Zhang |
2015-09-22 |
| 8881298 |
System for preventing unauthorized acquisition of information and method thereof |
Sanehiro Furuichi, Yuriko Sawatani, Taskuku Otani |
2014-11-04 |
| 8683199 |
System, method and program for protecting information on computer screen |
Sanehiro Furuichi |
2014-03-25 |
| 8422674 |
Application-specific secret generation |
Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky |
2013-04-16 |
| 8380937 |
System for preventing unauthorized acquisition of information and method thereof |
Sanehiro Furuichi, Yuriko Kanai, Tasuku Otani |
2013-02-19 |
| 8332636 |
Secure policy differentiation by secure kernel design |
Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky |
2012-12-11 |
| 8245054 |
Secure and convenient access control for storage devices supporting passwords for individual partitions |
Hassan Hajji, Seiichi Kawano, Susumu Shimetono |
2012-08-14 |
| 8166304 |
Support for multiple security policies on a unified authentication architecture |
Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky |
2012-04-24 |
| 8010804 |
Method to protect secrets against encrypted section attack |
Kanna Shimizu, Wilfred E. Plouffe, Jr. |
2011-08-30 |
| 7937575 |
Information processing system, program product, and information processing method |
Hassan Hajji, Seiichi Kawano, Susumu Shimotono |
2011-05-03 |
| 7934063 |
Invoking externally assisted calls from an isolated environment |
Wilfred E. Plouffe, Jr., Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky |
2011-04-26 |
| 7886162 |
Cryptographic secure program overlays |
Wilfred E. Plouffe, Jr., Kanna Shimizu, Masaharu Sakamoto, Vladimir Zbarsky |
2011-02-08 |
| 7600231 |
Control method for controlling an application program |
Sanehiro Furuichi, Tasuku Otani |
2009-10-06 |