Patents by Inventor Kaoru Yokota

Kaoru Yokota has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7792295
    Abstract: This relates to an imaging device in which the necessary monitoring of an individual can be realized, while still maintaining protection of an individual's privacy. The imaging device includes an encryption key storage unit in which encryption key data is stored for an individual, an object judging unit operable to judge whether or not the captured video is of the individual, and a limited-capture video generation unit operable to (i) convert a part of the captured video that includes the individual into encrypted video, (ii) generate limited-capture video, which includes the encrypted video, when said object judging unit judges that the captured video includes the individual, and (iii) output the captured video, which does not include the encrypted video, when said object judging unit judges that the captured video does not include the individual.
    Type: Grant
    Filed: April 20, 2006
    Date of Patent: September 7, 2010
    Assignee: Panasonic Corporation
    Inventors: Kaoru Yokota, Motoji Ohmori, Kazuhisa Watanabe, Atsushi Saso, Mizuho Sakakibara, Naoaki Yamamoto
  • Patent number: 7774852
    Abstract: Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring apparatus, second identification information identifying vital sign data, and third identification information identifying the server. The key management server generates the decryption key using the first identification information, and stores fourth identification information identifying a server predetermined as a destination of the decryption key, and fifth identification information indicating the category of the vital sign data in correspondence with the fourth identification information. The key management server transmits the decryption key to the server, when the received third identification information matches the fourth identification information, and the received second identification information matches the fifth identification information.
    Type: Grant
    Filed: October 10, 2008
    Date of Patent: August 10, 2010
    Assignee: Panasonic Corporation
    Inventors: Kaoru Yokota, Masao Nonaka, Yuichi Futa, Natsume Matsuzaki, Shunji Harada
  • Publication number: 20100195822
    Abstract: A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program (P); an addition table generation unit (11) which generates an addition table from the extracted key data; a conversion table extraction unit (12) which extracts a conversion table from the program (P); a table merger unit (13) which generates a merger table by merging the generated addition table and the extracted conversion table; a random number generation unit (14) which generates a random number; a table randomization unit (15) which generates a randomized merger table by randomizing the merger table using the generated random number; and a converted-program generation unit (16) which generates the converted program (tP) according to the generated randomized merger table.
    Type: Application
    Filed: April 8, 2010
    Publication date: August 5, 2010
    Inventors: Kaoru Yokota, Motoji Ohmori, Yuichi Futa
  • Publication number: 20100180343
    Abstract: To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations.
    Type: Application
    Filed: November 6, 2008
    Publication date: July 15, 2010
    Inventors: Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Marika Minagawa
  • Publication number: 20100175061
    Abstract: To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility.
    Type: Application
    Filed: November 6, 2008
    Publication date: July 8, 2010
    Inventors: Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Marika Minagawa
  • Patent number: 7747350
    Abstract: Conventional pet robots have the ability to distinguish users and take a different behavior pattern per each different user, and conventional pet robots have the ability to phase their behavior patterns based on their own behavior history to stage a growth process. The present invention provides an improvement to the conventional pet robots by, when in contact with a user in possession of a memory card, acquiring various types of information from the memory card, such as identification information of the memory card, information regarding the user, and history information regarding contact between the user and the robot. This provides the user a high degree of satisfaction by performing behavior that reflects the acquired information.
    Type: Grant
    Filed: April 14, 2005
    Date of Patent: June 29, 2010
    Assignee: Panasonic Corporation
    Inventors: Natsume Matsuzaki, Kaoru Yokota
  • Patent number: 7747491
    Abstract: An anonymous information system is capable of maintaining anonymity of data while improving safety with regard to loss of anonymity caused by hacking of secret information, or the like. Conversion processing for converting from individual specifying information to anonymous individual information is split between an information providing device and an anonymity server device. Further, the manner in which the conversion processing is split is varied for each information providing device. A parameter generating device calculates Xinv to satisfy Xi×Xinv=1 mod q, a first characteristic parameter KAi=G^Xinv mod q, and a second characteristic parameter KBi=Xi. The information providing device generates a semi-anonymous individual identifier C=(KAi)^D mod P. The anonymity server device calculates an anonymous individual identifier E=(C)^KBi mod P.
    Type: Grant
    Filed: November 18, 2005
    Date of Patent: June 29, 2010
    Assignee: Panasonic Corporation
    Inventors: Kaoru Yokota, Motoji Ohmori, Akinobu Ito
  • Patent number: 7743261
    Abstract: An executing device conducts playback of contents. The executing device is equipped with a highly efficient processor and reduces the processing load involved in verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the executing device is capable of improving the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
    Type: Grant
    Filed: July 26, 2007
    Date of Patent: June 22, 2010
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
  • Publication number: 20100150346
    Abstract: A data encryption apparatus reduces a hardware gate scale over that of conventional technology which uses substitution tables, and realizes high scrambling performance. The data encryption apparatus includes a data converting unit that splits 256-bit input data into 32-bit data blocks A1, B1, A2, and B2. A first combining unit (43) performs an exclusive OR operation on A1 and B1, and on A2 and B2. A first scramble unit (44) branches A1, A2, and the results of the exclusive OR operations (C1 and C2) into three data blocks each, and for each set of three data blocks, shift-rotates two of the data blocks and combines the shifted data blocks with the remaining data block. A second combining unit (45) performs an exclusive OR operation on D1 and E2, and on D2 and E1, which are the results of the processing performed by the first scramble unit (44). A block concatenating unit (46) concatenates the results of the operations performed by the second combining unit (45).
    Type: Application
    Filed: June 19, 2007
    Publication date: June 17, 2010
    Inventors: Masao Nonaka, Kaoru Yokota, Motoji Ohmori
  • Patent number: 7724897
    Abstract: A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program (P); an addition table generation unit (11) which generates an addition table from the extracted key data; a conversion table extraction unit (12) which extracts a conversion table from the program (P); a table merger unit (13) which generates a merger table by merging the generated-addition table and the extracted conversion table; a random number generation unit (14) which generates a random number; a table randomization unit (15) which generates a randomized merger table by randomizing the merger table using the generated random number; and a converted-program generation unit (16) which generates the converted program (tP) according to the generated randomized merger table.
    Type: Grant
    Filed: April 26, 2006
    Date of Patent: May 25, 2010
    Assignee: Panasonic Corporation
    Inventors: Kaoru Yokota, Motoji Ohmori, Yuichi Futa
  • Publication number: 20100086126
    Abstract: There has been a problem that the maximum number of logical steps increases and processing speed decreases when a masking method in which S-Box is implemented using an inverse element calculation in a composite field as a countermeasure for power analysis attack on an AES cipher. An encryption device (1) which generates encrypted text from plain text using a key, the encryption device (1) includes a randomized 8-bit inverse element calculation unit (101) which receives randomized input data that is obtained by adding, to input data on which predetermined processing is performed with the key, a predetermined input mask value determined depending on a random number, and which generates randomized output data that is obtained by adding, to an inverse element of the input data, an output mask value that is an inverse element of the input mask value, wherein the encryption device generates the encrypted text from the generated randomized output data.
    Type: Application
    Filed: May 26, 2008
    Publication date: April 8, 2010
    Inventors: Kaoru Yokota, Yuusaku Ohta
  • Publication number: 20100031065
    Abstract: Provided is an information security apparatus (1100) that has enhanced stability and confidentiality of a hash key. The information security apparatus (1100) includes an information generating PUF unit (1104) that has tamper resistance set, using physical characteristics, so as to output a preset hash key, a partial error-correction information storage unit (1107) that stores partial error-correction information, an error correcting PUF unit (1106) that has tamper-resistance set, using physical characteristics, so as to output error-correcting PUF information, an error-correction information generating unit (1108) that generates error-correction information using partial correction information and the error-correcting PUF information, and an error correcting unit (1105) that corrects an error for the hash key outputted from the information generating PUF unit (1104) and outputs an error-corrected hash key.
    Type: Application
    Filed: November 2, 2007
    Publication date: February 4, 2010
    Inventors: Yuichi Futa, Kaoru Yokota, Masao Nonaka, Manabu Maeda, Natsume Matsuzaki
  • Publication number: 20100023774
    Abstract: An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information after the circulation. An information security device (200) includes: a receiving unit (201) that receives a content and a collection command; a content storing unit (202) that stores a content and its usage rule; a collection command confirmation unit (203) that checks the validity of a received collection command; a content deletion unit (204) that deletes a content; a chain information storage unit (205) that stores chain information containing sending and receiving information of a content; a destination list storage unit (206); a sending unit (207) that sends a content and a collection command; and a control unit (208) that controls the processing for a collection command. When a collection command is sent after content distribution, the content can be collected (deleted) in the destination of circulation.
    Type: Application
    Filed: June 9, 2006
    Publication date: January 28, 2010
    Inventors: Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka
  • Publication number: 20100014677
    Abstract: Provided is a group subordinate terminal in a key updating system that includes a server and a group of terminals including: a group managing terminal; and group subordinate terminals including the group subordinate terminal, the group subordinate terminal comprising: a group withdrawal request processing unit which transmits a group withdrawal request to the group managing terminal in response to an instruction to update its apparatus-unique key, the group withdrawal request requesting for withdrawal of the group subordinate terminal from the group; an update apparatus-unique key requesting unit which requests for another apparatus-unique key by transmitting to the server a group withdrawal certificate indicating that the withdrawal of the group subordinate terminal from the group of terminals is completed through invalidation of its group key; and an update processing unit which updates the apparatus-unique key held in an apparatus-unique key holding unit to the another apparatus-unique key obtained from th
    Type: Application
    Filed: June 26, 2008
    Publication date: January 21, 2010
    Inventors: Taichi Sato, Kaoru Yokota, Natsume Matsuzaki, Yuichi Futa, Tetsuya Inoue, Masao Nonaka
  • Publication number: 20090316909
    Abstract: Provided are a utilization apparatus, a server apparatus, and a key utilization system which enable the utilization apparatus to control deletion of the old key without using a secure clock and allow encrypted communications irrespective of whether the accessed server has updated its key or not. In key utilization system 1, one or more server apparatuses 5-1 to 5-n each provide service to an apparatus having an apparatus key corresponding with a server key. Update apparatus 2 distributes an update server key to each server apparatus and a new apparatus key to key utilization apparatus 3. CRL distribution apparatus 4 distributes to key utilization apparatus 3 a CRL indicating one or more server apparatuses which have completed key-updating. Key utilization apparatus 3 holds both the old and new apparatus key, judges whether the server apparatuses monitored using the CRL have completed key-updating, and if affirmative, deletes the old apparatus key.
    Type: Application
    Filed: June 3, 2008
    Publication date: December 24, 2009
    Inventors: Yuichi Futa, Masao Nonaka, Taichi Sato, Kaoru Yokota, Tetsuya Inoue, Natsume Matsuzaki
  • Publication number: 20090271860
    Abstract: An authenticator apparatus which makes it difficult for an unauthorized user to masquerade and enhances safety includes an authenticating information holding unit (102) previously stores characteristic information indicating an input and output characteristic involving an environment change of an authentic authenticatee apparatus entitled to be authentic, an authenticating information transmitting unit (107) which transmits authenticating information to a portable medium (2), a response information receiving unit (108) which receives response information outputted from the portable medium (2) in response to an input of the authenticating information, an environment selecting unit (105) which identifies an environment of the portable medium (2), and a response information confirming unit (109) which determines whether or not the authenticating information and the response information satisfy the input and output characteristic indicated in the characteristic information stored in the authenticating information
    Type: Application
    Filed: November 2, 2007
    Publication date: October 29, 2009
    Inventors: Masao Nonaka, Natsume Matsuzaki, Yoshikatsu Ito, Kaoru Yokota, Yuichi Futa, Manabu Maeda
  • Publication number: 20090257589
    Abstract: An imaging device (1) for imaging a subject and distributing the captured video. The privacy of the subject is adequately protected, and a required monitoring function is realized.
    Type: Application
    Filed: April 20, 2006
    Publication date: October 15, 2009
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Kaoru Yokota, Motoji Ohmori, Kazuhisa Watanabe, Atsushi Saso, Mizuho Sakakibara, Naoaki Yamamoto
  • Publication number: 20090254988
    Abstract: In a system for transmitting/receiving information, each of users of terminals subjectively determines a direct evaluation value of a party that the user knows personally and so on. Since the direct evaluation value determined in this way changes depending on the subjective evaluation criterion, the direct evaluation value is not generated based on the single evaluation criterion. In view of this, a terminal device 100A according to the present invention prestores therein content evaluation values respectively corresponding to pieces of content data that are stored therein. When transmitting a piece of content data to a terminal device, the terminal device 100A generates an entity evaluation value of the terminal device that is a transmission destination based on a content evaluation value of the transmitted piece of content data.
    Type: Application
    Filed: July 24, 2006
    Publication date: October 8, 2009
    Inventors: Masao Nonaka, Kaoru Yokota, Natsume Matsuzaki
  • Publication number: 20090193250
    Abstract: A signature generating device for generating digital signature data that certifies authenticity of information of a person, and making the information obfuscated.
    Type: Application
    Filed: October 26, 2006
    Publication date: July 30, 2009
    Inventors: Kaoru Yokota, Natsume Matsuzaki, Masao Nonaka
  • Patent number: 7567487
    Abstract: To provide a highly user-friendly content moving device which prevents unauthorized copying of content and, when content that has been irreversibly converted and moved to a recording medium is moved back to a move source, can use the content in its form before irreversible conversion. A partial information extraction unit extracts, from content stored on a content storage unit, partial data necessary for playback of the content, and a write/read unit writes the partial data to a partial information storage unit and overwrites a portion of the content corresponding to the partial data with different data, while a conversion unit transcodes the content and writes the transcoded content and the partial data to the recording medium.
    Type: Grant
    Filed: March 23, 2005
    Date of Patent: July 28, 2009
    Assignee: Panasonic Corporation
    Inventors: Yoshikatsu Ito, Masaya Miyazaki, Motoji Ohmori, Shunji Harada, Kaoru Yokota, Toshihisa Nakano, Jun Takahashi