Projector projecting password

Information

  • Patent Grant
  • 8806571
  • Patent Number
    8,806,571
  • Date Filed
    Thursday, August 16, 2012
    12 years ago
  • Date Issued
    Tuesday, August 12, 2014
    10 years ago
Abstract
A projector system of the present invention includes a projector 10 and a personal computer PC as an information terminal, which communicate with each other via a network connection. The projector 10 generates a password required for establishment of the network connection and projects the password on a screen SC. A user of the personal computer PC inputs the password projected on the screen SC. The password is used for authentication of the network connection between the projector 10 and the personal computer PC and cipher communication therebetween. This arrangement of the present invention enhances the convenience of the projector that is capable of establishing a network connection with the information terminal, while ensuring secrecy of communicating data.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention relates to a projector that projects a password.


2. Description of the Related Art


Data projectors have become popular to enlarge and project the contents of an on-screen display of an information terminal, such as a personal computer. The projector may establish a network connection with the information terminal via cable communication or via wireless communication. A password is generally required for establishment of the network connection.


Cipher communication is adopted to assure security and prevent illegal connection and interception of data in a projector that projects image data received from an information terminal connecting with the projector via wireless communication. For example, WEP (Wired Equivalent Privacy) technique is applied for cipher communication. In the WEP-based cipher communication, both a data transmitter side and a data receiver side input a common password. The common password is used for authentication of the connection and for encoding and decoding of communicating data.


For size reduction and good portability, the projector is typically not provided with a keyboard. A remote control or buttons on the projector are accordingly used for input of required data into the projector. Input of a password into the projector is accordingly rather time- and labor-consuming. In order to simplify a password input operation, one applicable technique causes the projector to generate a password. There is, however, difficulty in accurately notifying the user of the information terminal of the password. This problem is not restricted to input of the password for cipher communication but is commonly found in the case of requirement of a password for establishing communication between the information terminal and the projector.


SUMMARY OF THE INVENTION

The object of the present invention is thus to enhance the convenience of a projector that is capable of establishing a network connection with an information terminal while ensuring secrecy of communicating data.


In order to attain at least part of the above and the other related objects, the present invention is directed to a projector that is capable of establishing network connection with an information terminal, which supplies image data to be projected. The projector includes: a password generation module that generates a password to be input into the information terminal for establishment of the network connection; and a password projection module that projects the password.


The network connection of the projector of the present invention and an information terminal constructs a projector system. In the process of establishing the network connection between the projector and the information terminal, the projector carries out authentication with the password and identifies the legitimate connection. The information terminal is generally provided with a keyboard, which facilitates input of the password, compared with the projector.


The projector of the present invention may utilize a random digit to generate the password. The password is input at the information terminal including the keyboard. This arrangement does not require manual input of the password at the projector, thus enhancing the convenience of the projector system. The generated password is projected and displayed on a screen or the like. The user of the information terminal is thus accurately informed of the password and can input the correct password into the information terminal.


For the security, the password is generally not open to the public. The projector of the present invention is typically used in a limited space like a conference room. There is accordingly no fear of leaking the password to general public. This arrangement thus effectively prevents external illegal connections and ensures secrecy of communicating data.


In accordance with one preferable application of the invention, the network connection represents a connection via wireless cipher communication, and the password generation module generates the password used for the wireless cipher communication. The projector further has a cipher communication module that uses the password for the wireless cipher communication with the information terminal.


Wireless communication, especially wireless cipher communication may be applied for the network connection. This application of the invention generates the password used for cipher communication (an encoding key and a decoding key). A common password may be used in both of the projector and the information terminal, or alternatively different passwords may be used. In the former case, another information terminal located in the vicinity of the projector or the information terminal that supplies data may also be involved in the network connection by required settings including the password to fetch data. In the latter case, another information terminal is informed of only the encoding key or a password for establishing the network connection and can thus not decode the fetched data.


In the projector of the above application, it is preferable that the password generation module updates the password after establishment of the network connection to generate an updated password, and that the cipher communication module uses the updated password for the wireless cipher communication with the information terminal.


The updated password may be generated periodically or for each packet in the case of packet communication. This arrangement further heightens the secrecy of communicating data.


In one preferable embodiment of the projector of the invention, the password generation module generates a random password at each time of power supply to the projector.


In this embodiment, the password is generated at random at each time of power supply. Since one password is not continually used, this arrangement ensures secrecy of communicating data.


In accordance with another preferable application of the present invention, the projector further has a generation instruction module that is operated by a user to give an instruction for generating the password. The password generation module generates the password in response to the instruction.


In this application, the password is generated in response to intention of a user of the projector. Namely the password is generated according to the requirement to ensure secrecy of communicating data.


In accordance with still another preferable application of the invention, the projector further has a specification module that is operated by a user to specify a projection form of the password.


The projection form includes the projected and displayed position of the password on the screen and the character size. The projection form may be arbitrarily specified according to the area of the conference room where the projector is installed, the size of the screen, and the setting conditions.


In the projector of the present invention, it is preferable that the password projection module stops projection of the password when the network connection is established.


In this arrangement, establishment of communication is confirmed by projection or non-projection of the password. The projection of the password may be ceased after elapse of a preset time period as well as at the time of establishment of the network connection. This restricts the projection time of the password and thus heightens the secrecy of the password.


There are a diversity of applications of the present invention other than the projector described above. The possible applications include a projection method, a computer program for actualizing the projection method, a recording medium in which the computer program is recorded, and a data signal that includes the computer program and is embodied in a carrier wave. The variety of additional arrangements described above may be adopted in the respective applications.


The technique of the present invention may be actualized by a computer program or a recording medium in which the computer program is recorded. The computer program may be a whole program for driving the projector or a partial program for exerting the functions of the present invention. Typical examples of the recording medium include flexible disks, CD-ROMs, magneto-optic discs, IC cards, ROM cartridges, punched cards, prints with barcodes or other codes printed thereon, internal storage devices (memories like a RAM and a ROM) and external storage devices of the computer, and a variety of other computer readable media.


These and other objects, features, aspects, and advantages of the present invention will become more apparent from the following detailed description of the preferred embodiments with the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 schematically illustrates the construction of a projector system including a projector in a first embodiment of the present invention;



FIG. 2 is a flowchart showing a process of establishing a network connection between the projector and a personal computer PC; and



FIG. 3 is a flowchart showing a process of establishing a network connection between the projector and the personal computer PC in a second embodiment of the present invention.





DESCRIPTION OF THE PREFERRED EMBODIMENTS

Some modes of carrying out the present invention are described below as preferred embodiments in the following sequence:


A. Construction of Projector System


B. Network Connection


C. Second Embodiment


D. Modifications


A. Construction of Projector System


FIG. 1 schematically illustrates the construction of a projector system including a projector 10 in a first embodiment of the present invention. The projector system of the embodiment includes the projector 10 and a personal computer PC, which establish a network connection via wireless communication. A plurality of personal computers may be connected to the projector 10 in this projector system. Another information terminal may replace the personal computer PC. The projector system is utilized in a limited space, such as a conference room or an auditorium.


The projector 10 is a data projector that projects data received from the personal computer PC on a screen SC. The projector 10 and the personal computer PC make cipher communication. In the arrangement of this embodiment, an identical password is set in both the projector 10 and the personal computer PC. This password is used for authentication of a network connection, encoding, and decoding.


The projector 10 includes a power switch 12, a password generation module 20, a password generation instruction module 22, a display control module 30, a display specification module 32, a projection module 40, and a cipher communication module 50. The projector 10 also has a storage module 34 to store setting information for a network connection, such as a protocol and an address.


The password generation module 20 generates a password, which is commonly used in the cipher communication module 50 of the projector 10 and a cipher communication unit 100 of the personal computer PC, in response to an ON operation of the power switch 12. The technique of this embodiment uses a random digit for generation of the password. The password is accordingly generated at random at every time of power supply to the projector 10. The password generation module 20 is connected to the password generation instruction module 22 and may generate the password in response to a user's instruction. The password generation instruction module 22 gives an instruction of generating the password to the password generation module 20 in response to the user's operation. This arrangement effectively prevents illegal connection to the network and interception of communication data.


The display control module 30 makes the data input from the personal computer PC via the cipher communication module 50 subjected to a diversity of image processing and generates an image, which is to be projected by the projection module 40. As illustrated, the password generated by the password generation module 20 and the setting information for the network connection may also be projected on the screen SC. The display specification module 32 is connected to the display control module 30 to arbitrarily specify the display position of the password on the screen SC and the character size in response to the user's operation, for easy view of the projected password.


The projection module 40 includes a light source and a projection optical system (not shown) and projects the image generated by the display control module 30 and the password on the screen SC.


The cipher communication module 50 utilizes the password generated by the password generation module 20 for authentication of a network connection. The cipher communication module 50 also decodes encoded data sent from the personal computer PC and supplies the decoded data to the display control module 30.


The personal computer PC includes a cipher communication unit 100, an application software program 110, and an input unit 120. The user of the personal computer PC inputs the password projected on the screen SC and setting information for the network connection through operations of a keyboard and a mouse (not shown). The cipher communication unit 100 utilizes the input password to establish the network connection with the projector 10, encodes image data of the application software program 110 with the password, and transmits the encoded image data to the projector 10.


B. Network Connection


FIG. 2 is a flowchart showing a process of establishing a network connection between the projector 10 and the personal computer PC. The left flow shows a series of processing at the projector 10, whereas the right flow shows a series of processing at the personal computer PC. The projector 10 generates a password (step S100). The password is generated in response to power supply (that is, an ON operation of the power switch 12) or by an operation of the password generation instruction module 22. The projector 10 projects and displays the generated password on the screen SC (step S110). The setting information for the network connection may be projected together with the password. The user of the personal computer PC inputs the password projected on the screen SC through an operation of the keyboard (step S120). In order to establish communication with the projector 10, the user requires authentication of the network connection with the input password (step S130). The projector 10 authenticates the input password in response to a requirement of authentication from the personal computer PC. When connection is established with the personal computer PC (step S140), the projector 10 stops the projection and display of the password on the screen SC (step S150). Establishment of communication is confirmed by the ceased projection of the password. Projection of the password may be ceased after a predetermined time has passed since start of the projection. This arrangement heightens the secrecy of the password. Establishment of the network connection allows cipher communication between the projector 10 and the personal computer PC.


In the projector 10 of the first embodiment, the password generation module 20 generates a password. The user of the projector 10 is accordingly not required to input the password into the projector 10. This arrangement enhances the convenience of the projector system. The generated password is projected on the screen SC, so that the user of the personal computer PC is accurately informed of the password to be input into the personal computer PC.


For the security, the password is generally not open to the public. The projector 10 of the embodiment is used in a limited space like a conference room. There is accordingly no fear of leaking the password to general public. The arrangement of the embodiment thus effectively prevents external illegal connections and ensures secrecy of communicating data.


In the arrangement of this embodiment, a common password is used in both the projector 10 and the personal computer PC. Another nearby information terminal can receive data from the personal computer PC after establishing a similar network connection with the personal computer PC.


C. Second Embodiment


FIG. 3 is a flowchart showing a process of establishing a network connection between the projector 10 and the personal computer PC in a second embodiment of the present invention. The processing of steps S100 through S150 is identical with that of the first embodiment, and the construction of the projector system is also identical with that of the first embodiment. In the arrangement of the second embodiment, after establishment of communication between the projector 10 and the personal computer PC, the projector 10 newly generates a password (step S160). Generation of the new password may be executed automatically after establishment of communication or in response to the user's operation of the password generation instruction module 22. Since the communication has already been established between the projector 10 and the personal computer PC, the newly generated password is not projected on the screen SC but is transmitted to the personal computer PC. The personal computer PC receives the transmitted password and updates the password (step S170). Generation of the new password and updating may be carried out periodically or for each transmitted packet. The projector 10 and the personal computer PC make cipher communication with the updated password.


The technique of the second embodiment does not project the newly generated password on the screen SC. This arrangement prevents any third person from being informed of the updated password, thus ensuring high secrecy of communicating data.


D. Modifications

The above embodiments and their modifications are to be considered in all aspects as illustrative and not restrictive. There may be many modifications, changes, and alterations without departing from the scope or spirit of the main characteristics of the present invention. All changes within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.


D1. Modified Example 1

The above embodiment uses a common password for both coding and encoding of data in cipher communication. Different passwords may alternatively be used for coding and encoding of data, respectively. In the latter case, the password generation module 20 of the projector 10 generates a password corresponding to an encoding key used in the personal computer PC and another password corresponding to a decoding key used in the projector 10. The password corresponding to the encoding key is projected on the screen SC. The user inputs the projected password into the personal computer PC.


This arrangement informs only the projector 10 of the password for decoding the data encoded by the personal computer PC, thus effectively preventing interception of data by any other device.


D2. Modified Example 2

The above embodiment regards wireless cipher communication between the projector 10 and the personal computer PC. The technique of the present invention is also applicable for cable communication.


D3. Modified Example 3

The above embodiment regards the image display system including the projector (projector system). The technique of the present invention is also applicable to other image display systems where an image display device and an information terminal establish a network connection.


The scope and spirit of the present invention are indicated by the appended claims, rather than by the foregoing description.

Claims
  • 1. A projector that is capable of establishing a network connection with an information terminal, the projector comprising: a display controller configured to generate a predetermined image including a password to be input into the information terminal for establishment of the network connection, and to generate an image corresponding to image data supplied by the information terminal; anda projection optical system configured to project the predetermined image including the password, and to project the image according to the image data supplied from the information terminal, after establishment of the network connection, onto a screen external to the projector.
  • 2. The projector in accordance with claim 1, the projector further comprising: a password generator configured to generate the password.
  • 3. The projector in accordance with claim 2, wherein the network connection represents a connection via wireless cipher communication, and the password generator generates the password used for the wireless cipher communication,the projector further comprising:a cipher communications controller configured to use the password for the wireless cipher communication with the information terminal.
  • 4. The projector in accordance with claim 3, wherein the password generator updates the password after establishment of the network connection to generate an updated password, and the cipher communications controller uses the updated password for the wireless cipher communication with the information terminal.
  • 5. The projector in accordance with claim 2, wherein the password generator generates a random password at each time of power supply to the projector.
  • 6. The projector in accordance with claim 2, the projector further comprising: a generation instruction switch that is operated by a user to give an instruction for generating the password,wherein the password generator generates the password in response to the instruction.
  • 7. The projector in accordance with claim 2, wherein the display controller and the projection optical system respectively generate and project an image different from the predetermined image after the network connection is established.
  • 8. The projector in accordance with claim 7, wherein the password generator generates a password at each start up of the projector.
  • 9. The projector in accordance with claim 1, the projector further comprising: a network connector configured to make connection with a network.
  • 10. The projector in accordance with claim 1, the projector further comprising: a specification input that is operated by a user to specify a projection form of the password.
  • 11. The projector in accordance with claim 1, wherein the projection optical system stops projection of the password substantially at the time the network connection is established.
  • 12. The projector in accordance with claim 1, wherein: the display controller controls an appearance of the password projected by the projection optical system so as to ease the inputting of the password on the information terminal.
  • 13. The projector in accordance with claim 12, wherein the display controller changes a display position of the password.
  • 14. The projector in accordance with claim 12, wherein the display controller changes a character size of the password.
  • 15. The projector in accordance with claim 1, wherein the predetermined image projected by the projection optical system includes setting information corresponding to the network connection.
  • 16. The projector in accordance with claim 1, wherein the projection of the predetermined image including the password is stopped substantially at the time the network connection is established.
  • 17. The projector in accordance with claim 1, wherein the password is displayed in a predetermined section of the predetermined image.
  • 18. The projector in accordance with claim 17, wherein after establishment of the network connection, the password is no longer displayed in the predetermined section of the predetermined image.
  • 19. A method implemented by a projector, the projector being capable of establishing a network connection with an information terminal, the method comprising the steps of: (a) generating a predetermined image including a password to be input into the information terminal for establishment of the network connection;(b) projecting, by the projector, the predetermined image including the password, onto a screen external to the projector; and(c) projecting, by the projector, an image corresponding to image data supplied from the information terminal after establishment of the network connection, onto the screen external to the projector.
  • 20. The method according to claim 19, further comprising the steps of: updating the password after establishment of the network connection to generate an updated password; andcommunicating with the information terminal by using the updated password.
  • 21. The method according to claim 19, further comprising the steps of: accepting an instruction for generating the password; andgenerating the password in response to the instruction.
  • 22. The method according to claim 19, further comprising the steps of: establishing the network connection with the information terminal; andstopping projection of the password after the network connection is established.
  • 23. A non-transitory computer readable recording storage medium in which a computer program used for driving a projector is recorded, the projector being capable of establishing a network connection with an information terminal, the computer program causing a computer to attain the functions of: projecting, by the projector, a password to be input into the information terminal for establishment of the network connection onto a screen external to the projector; andprojecting, by the projector, an image according to image data supplied from the information terminal after establishment of the network connection, onto the screen external to the projector.
  • 24. A projector that is capable of establishing a network connection with an information terminal, the projector comprising: a generation instruction input that is operated by a user to give an instruction for generating a password to be input into the information terminal for establishment of the network connection;a projection optical system that projects the password, and that projects an image according to image data supplied from the information terminal after establishment of the network connection, onto a screen external to the projector; anda password generator that generates the password in response to the instruction.
  • 25. A projector that is capable of establishing a network connection with an information terminal, the projector comprising: a display controller that generates a predetermined image including a password to be input into the information terminal for establishment of the network connection, and that generates an image corresponding to image data supplied by the information terminal;a projection optical system that projects the predetermined image including the password, and that projects the image according to the image data supplied from the information terminal after establishment of the network connection, onto a screen external to the projector; anda password generator that updates the password, in the event that the network connection is established, to generate an updated password.
Priority Claims (1)
Number Date Country Kind
2001-258118 Aug 2001 JP national
Parent Case Info

This is a Continuation of application Ser. No. 12/801,623 filed Jun. 17, 2010, which issued as U.S. Pat. No. 8,272,035, which is a Continuation of application Ser. No. 11/905,084 filed Sep. 27, 2007, which issued as U.S. Pat. No. 7,770,210, which is a Continuation of application Ser. No. 10/228,334 filed Aug. 27, 2002, which issued as U.S. Pat. No. 7,447,906 and claims priority to JP 2001-258118, filed Aug. 28, 2001. The disclosure of the prior applications is hereby incorporated by reference herein in their entirety.

US Referenced Citations (115)
Number Name Date Kind
4430526 Brown et al. Feb 1984 A
4599489 Cargile Jul 1986 A
4800590 Vaughan Jan 1989 A
5515079 Hauck May 1996 A
5572193 Flanders et al. Nov 1996 A
5758079 Ludwig et al. May 1998 A
5768510 Gish Jun 1998 A
5771352 Nakamura et al. Jun 1998 A
5877747 Kitao et al. Mar 1999 A
6141000 Martin Oct 2000 A
6148406 Weisz et al. Nov 2000 A
6169976 Colosso Jan 2001 B1
6198542 Tabata Mar 2001 B1
6345294 O'Toole et al. Feb 2002 B1
6417933 Szurkowski Jul 2002 B1
6493467 Okuda et al. Dec 2002 B1
6642918 Uchida et al. Nov 2003 B2
6670603 Shimada et al. Dec 2003 B2
6735616 Thompson et al. May 2004 B1
6760749 Dunlap et al. Jul 2004 B1
6783252 Cambron Aug 2004 B1
6828986 Sakashita et al. Dec 2004 B2
6830340 Olson et al. Dec 2004 B2
6904451 Orfitelli et al. Jun 2005 B1
6904526 Hongwei Jun 2005 B1
6928166 Yoshiazawa Aug 2005 B2
6957232 Hoeye et al. Oct 2005 B2
7016058 Tabata Mar 2006 B1
7016935 Lee et al. Mar 2006 B2
7018043 Castaldi et al. Mar 2006 B2
7047088 Nakamura et al. May 2006 B2
7139248 Murai et al. Nov 2006 B2
7191214 Watanabe Mar 2007 B2
7254418 Iwasaki Aug 2007 B2
7293071 Sato et al. Nov 2007 B2
7397476 Akaiwa et al. Jul 2008 B2
7403510 Miyake Jul 2008 B1
7447906 Kubota Nov 2008 B2
7486254 Suzuki et al. Feb 2009 B2
7647555 Wilcox et al. Jan 2010 B1
7770210 Kubota Aug 2010 B2
7782330 Akaiwa et al. Aug 2010 B2
7797430 Ichieda Sep 2010 B2
7965284 Akaiwa et al. Jun 2011 B2
20010003479 Fujiwara Jun 2001 A1
20010017630 Sakashita et al. Aug 2001 A1
20010017712 Kasatani Aug 2001 A1
20010021980 Linden et al. Sep 2001 A1
20010037366 Webb et al. Nov 2001 A1
20020015175 Katsuda Feb 2002 A1
20020026512 Nishimura et al. Feb 2002 A1
20020036652 Masumoto et al. Mar 2002 A1
20020083319 Ishiguro et al. Jun 2002 A1
20020090912 Cannon et al. Jul 2002 A1
20020106086 Kamiya et al. Aug 2002 A1
20020108108 Akaiwa et al. Aug 2002 A1
20020122075 Karasawa et al. Sep 2002 A1
20020131078 Tsukinokizawa Sep 2002 A1
20020133713 Fieschi et al. Sep 2002 A1
20020154210 Ludwig et al. Oct 2002 A1
20020175915 Lichtfuss Nov 2002 A1
20020196378 Slobodin et al. Dec 2002 A1
20030017846 Estevez et al. Jan 2003 A1
20030028637 Gross Feb 2003 A1
20030034999 Coughlin, III et al. Feb 2003 A1
20030048281 Murai et al. Mar 2003 A1
20030051139 Kubota Mar 2003 A1
20030072429 Slobodin et al. Apr 2003 A1
20030081561 Hsiao May 2003 A1
20030088793 Parry May 2003 A1
20030110217 Raju Jun 2003 A1
20030115263 Tran et al. Jun 2003 A1
20030191738 Hoeye et al. Oct 2003 A1
20030198347 Ribes et al. Oct 2003 A1
20030202661 Rodriguez et al. Oct 2003 A1
20030202679 Rodriguez Oct 2003 A1
20030204716 Rockwood et al. Oct 2003 A1
20030217293 Lee Nov 2003 A1
20030221011 Shitano Nov 2003 A1
20030225641 Gritzmacher et al. Dec 2003 A1
20030236895 Ohkubo et al. Dec 2003 A1
20040051734 Taniguchi et al. Mar 2004 A1
20040073795 Jablon Apr 2004 A1
20040109137 Bubie et al. Jun 2004 A1
20040117445 Lee et al. Jun 2004 A9
20040119945 Nakamura et al. Jun 2004 A1
20040123118 Dahan et al. Jun 2004 A1
20040130502 Sato et al. Jul 2004 A1
20040130568 Nagano et al. Jul 2004 A1
20040161277 Gassho et al. Aug 2004 A1
20040227900 Sato et al. Nov 2004 A1
20040236943 Edwards et al. Nov 2004 A1
20040249945 Tabuchi et al. Dec 2004 A1
20050012911 Cambron Jan 2005 A1
20050033805 Fujiyama et al. Feb 2005 A1
20050036509 Acharya et al. Feb 2005 A1
20050043973 Childers Feb 2005 A1
20050066047 Miyake et al. Mar 2005 A1
20050068506 Moriwaki et al. Mar 2005 A1
20050071430 Kobayashi et al. Mar 2005 A1
20050091359 Soin et al. Apr 2005 A1
20050097179 Orme May 2005 A1
20050102356 Manion et al. May 2005 A1
20050134523 Challener et al. Jun 2005 A1
20050163549 Shima et al. Jul 2005 A1
20050210390 Ono Sep 2005 A1
20050262223 Kimura Nov 2005 A1
20060170875 Falck et al. Aug 2006 A1
20060184497 Suzuki et al. Aug 2006 A1
20060250585 Anderson et al. Nov 2006 A1
20070005809 Kobayashi et al. Jan 2007 A1
20070286144 Miyake Dec 2007 A1
20080234843 Akaiwa et al. Sep 2008 A1
20100257586 Kubota Oct 2010 A1
20110210977 Akaiwa et al. Sep 2011 A1
Foreign Referenced Citations (50)
Number Date Country
0 656 581 Jun 1995 EP
0 737 911 Oct 1996 EP
0 874 300 Oct 1998 EP
1 059 766 Dec 2000 EP
A-06-197340 Jul 1994 JP
A-07-200215 Aug 1995 JP
A-07-336370 Dec 1995 JP
A-09-503877 Apr 1997 JP
A-09-198206 Jul 1997 JP
A-09-205643 Aug 1997 JP
A-10-200638 Jul 1998 JP
A-10-289106 Oct 1998 JP
A-11-098170 Apr 1999 JP
A-11-319815 Nov 1999 JP
B2-3017925 Dec 1999 JP
A-2000-076028 Mar 2000 JP
A-2000-089726 Mar 2000 JP
A-2000-122829 Apr 2000 JP
A-2000-122944 Apr 2000 JP
A-2000-165577 Jun 2000 JP
A-2000-222163 Aug 2000 JP
A 2001-16664 Jan 2001 JP
A-2001-092408 Apr 2001 JP
A-2001-103078 Apr 2001 JP
A-2001-144767 May 2001 JP
A-2001-175602 Jun 2001 JP
A-2001-202316 Jul 2001 JP
A-2001-273259 Oct 2001 JP
A 2001-312472 Nov 2001 JP
A-2001-343959 Dec 2001 JP
A-2001-358919 Dec 2001 JP
A-2002-007091 Jan 2002 JP
A-2002-007350 Jan 2002 JP
A-2002-044096 Feb 2002 JP
A-2002-057964 Feb 2002 JP
A-2002-099473 Apr 2002 JP
A-2003-006128 Jan 2003 JP
A-2003-069923 Mar 2003 JP
A-2003-110555 Apr 2003 JP
A-2003-173117 Jun 2003 JP
A-2003-173177 Jun 2003 JP
A-2003-256063 Sep 2003 JP
A-2003-333559 Nov 2003 JP
A-2004-062477 Feb 2004 JP
A-2005-084846 Mar 2005 JP
A-2005-099574 Apr 2005 JP
B2-4022683 Oct 2007 JP
WO 9510823 Apr 1995 WO
WO 9937055 Jul 1999 WO
WO 0192953 Dec 2001 WO
Non-Patent Literature Citations (43)
Entry
Richardson et al., “Virtual Network Computing”, IEEE Internet Computing, vol. 2, No. 1, Jan./Feb. 1998.
Oct. 16, 2009 Office Action issued in U.S. Appl. No. 11/905,084.
May 26, 2010 Notice of Allowance issued in U.S. Appl. No. 11/905,084.
Japanese Patent Office, Notification of Reason for Rejection dated Jul. 6, 2007 in Japanese Patent Application No. 11-360141.
Jan. 25, 2006 Office Action issued in U.S. Appl. No. 10/228,334.
Jul. 11, 2006 Office Action issued in U.S. Appl. No. 10/228,334.
Jul. 18, 2007 Advisory Action issued in U.S. Appl. No. 10/228,334.
Dec. 27, 2007 Office Action issued in U.S. Appl. No. 10/228,334.
Apr. 8, 2008 Office Action issued in U.S. Appl. No. 10/228,334.
Aug. 5, 2008 Notice of Allowance issued in U.S. Appl. No. 10/228,334.
Dec. 6, 2011 Office Action issued in Japanese Application No. 2009-216796 (with translation).
Aug. 31, 2011 Office Action issued in U.S. Appl. No. 12/493,809.
Nov. 25, 2010 Search Report issued in European Patent Application No. 10177908.0.
Nov. 26, 2010 Search Report issued in European Patent Application No. 10177910.6.
Nov. 26, 2010 Search Report issued in European Patent Application No. 10177911.4.
Office Action issued in U.S. Appl. No. 11/694,363; mailed Jan. 19, 2012.
Nov. 13, 2013 Office Action issued in U.S. Appl. No. 12/628,654.
Nov. 8, 2013 Office Action issued in U.S. Appl. No. 13/531,048.
Jul. 12, 2013 Office Action issued in U.S. Appl. No. 12/942,838.
Apr. 26, 2013 Office Action issued in U.S. Appl. No. 13/531,868.
Berger et al., “Using Symbiotic Displays to View Sensitive Information in Public,” Mar. 2005, Third IEEE International Conference on Pervasive Computing and Communications, pp. 139-148.
Bloom, Jeffrey A., “Security and Rights Management in Digital Cinema,” Jul. 2003, Proceedings of International Conference on Multimedia and Expo, vol. 1, pp. 621-624.
Apr. 16, 2012 Office Action issued in U.S. Appl. No. 12/942,838.
Apr. 8, 2008 Interview Summary issued in U.S. Appl. No. 10/228,334.
Aug. 9, 2010 Office Action issued in U.S. Appl. No. 11/032,134.
Jul. 27, 2009 Office Action issued in U.S. Appl. No. 11/032,134.
Mar. 16, 2009 Office Action issued in U.S. Appl. No. 11/032,134.
Mar. 3, 2010 Office Action issued in U.S. Appl. No. 11/032,134.
May 11, 2011 Office Action issued in U.S. Appl. No. 12/942,838.
May 2, 2007 Office Action issued in U.S. Appl. No. 10/228,334.
Nov. 9, 2006 Office Action issued in U.S. Appl. No. 10/228,334.
Oct. 19, 2011 Office Action issued in U.S. Appl. No. 12/942,838.
Sep. 2, 2008 Office Action issued in U.S. Appl. No. 11/032,134.
May 9, 2013 Office Action issued in U.S. Appl. No. 12/628,654.
U.S. Appl. No. 12/942,838 in the name of Kubota filed Nov. 19, 2010.
U.S. Appl. No. 13/531,868 in the name of Kubota filed Jun. 25, 2012.
U.S. Appl. No. 12/628,654 in the name of Sato et al. filed Dec. 1, 2009.
U.S. Appl. No. 13/618,130 in the name of Fujimori filed Sep. 14, 2012.
U.S. Appl. No. 13/531,048 in the name of Sato et al. filed Jun. 22, 2012.
Nov. 29, 2013 Office Action issued in U.S. Appl. No. 13/618,130.
May 19, 2014 Office Action issued in U.S. Appl. No. 13/618,130.
Mar. 26, 2014 Notice of Allowance issued in U.S. Appl. No. 13/531,048.
Mar. 31, 2014 Notice of Allowance issued in U.S. Appl. No. 12/628,654.
Related Publications (1)
Number Date Country
20120311668 A1 Dec 2012 US
Continuations (3)
Number Date Country
Parent 12801623 Jun 2010 US
Child 13587555 US
Parent 11905084 Sep 2007 US
Child 12801623 US
Parent 10228334 Aug 2002 US
Child 11905084 US