Patents by Inventor Mioko Moriguchi

Mioko Moriguchi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11595191
    Abstract: A storage apparatus sends a request for a key encryption key to a key management server using a storage apparatus ID as a parameter, acquires the key encryption key, for which a request has been sent to the key management server, and its attribute information, and stores the key encryption key and its attribute information in a key encryption key list while eliminating the key encryption key that is duplicated. Then, in the order listed in the key encryption key list, decryption of the encryption key is attempted by the key encryption key stored in the key encryption key list, and the success or failure of the decryption of the encryption key is determined. When the decryption of the encryption key using the key encryption key fails, the decryption of the encryption key is attempted using a key encryption key, which has not been attempted yet, in the key encryption key list.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: February 28, 2023
    Assignee: Hitachi, Ltd.
    Inventors: Yutaka Yoshida, Mioko Moriguchi
  • Publication number: 20220400007
    Abstract: A key management control unit of a storage device instructs a key management server to generate an encryption key, and receives the corresponding key number. The key management control unit requests the key management server to acquire the encryption key by the key number when newly assigning the encryption key to a drive of the storage device, and retains attribute information of the acquired encryption key, and the acquired encryption key as a reserved encryption key in a reserved encryption key area of a volatile area. Then, the key management control unit updates an encryption key management information table by applying a key tag to the reserved encryption key as the encryption key to be assigned to the drive of the storage device, and retains the reserved encryption key as a new encryption key corresponding to the drive of the storage device in an encryption key table.
    Type: Application
    Filed: March 11, 2022
    Publication date: December 15, 2022
    Inventors: Yutaka YOSHIDA, Mioko MORIGUCHI
  • Publication number: 20220069983
    Abstract: A storage apparatus sends a request for a key encryption key to a key management server using a storage apparatus ID as a parameter, acquires the key encryption key, for which a request has been sent to the key management server, and its attribute information, and stores the key encryption key and its attribute information in a key encryption key list while eliminating the key encryption key that is duplicated. Then, in the order listed in the key encryption key list, decryption of the encryption key is attempted by the key encryption key stored in the key encryption key list, and the success or failure of the decryption of the encryption key is determined. When the decryption of the encryption key using the key encryption key fails, the decryption of the encryption key is attempted using a key encryption key, which has not been attempted yet, in the key encryption key list.
    Type: Application
    Filed: February 19, 2021
    Publication date: March 3, 2022
    Inventors: Yutaka YOSHIDA, Mioko MORIGUCHI
  • Publication number: 20210176065
    Abstract: In writing, a storage controller generates encrypted data using a data encryption key and generates an authentication code based on the encrypted data using an authentication key. A storage node verifies the authentication code received from the storage controller. If the authentication code is successfully verified, the storage node stores the encrypted data and the authentication code. In reading, the storage controller verifies the authentication code received from the storage node. If the authentication code is successfully verified, the storage controller decrypts the encrypted data and sends the decrypted data to a host.
    Type: Application
    Filed: August 31, 2020
    Publication date: June 10, 2021
    Inventors: Nobuyuki OSAKI, Hajime SATO, Mioko MORIGUCHI
  • Patent number: 10409660
    Abstract: This storage system has a plurality of modules that encode data being written to a storage medium and decode data being read from said storage medium. The storage system also has an adapter that controls the reading and writing of data from and to the storage medium such that, when an error is detected and determined to be the error of at least one of said plurality of modules, the adapter prevents the module(s) in question from being used to read or write data.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: September 10, 2019
    Assignee: HITACHI LTD.
    Inventors: Mioko Moriguchi, Etsutaro Akagawa
  • Patent number: 10296468
    Abstract: An encryption key used with a storing apparatus and an encryption key used with a non-volatile cache memory are identical to each other. A cache control portion unit effects control in such a way that an encryption key EK used to encrypt first data stored in the storing apparatuses, and an encryption key EK used to encrypt second data which are data corresponding to the first data and are stored in the non-volatile cache memory, are identical to each other. If the cache control portion receives a write request and first data WD, the cache control portion identifies from the storing apparatuses a storing apparatus that is to be the storage destination of the first data, identifies an encryption key allocated to the identified storing apparatus, encrypts the second data corresponding to the first data using the identified encryption key, and stores the data in the non-volatile cache memory.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: May 21, 2019
    Assignee: Hitachi, Ltd.
    Inventors: Mioko Moriguchi, Wataru Okada, Nobuhiro Maki
  • Publication number: 20180052730
    Abstract: This storage system has a plurality of modules that encode data being written to a storage medium and decode data being read from said storage medium. The storage system also has an adapter that controls the reading and writing of data from and to the storage medium such that, when an error is detected and determined to be the error of at least one of said plurality of modules, the adapter prevents the module(s) in question from being used to read or write data.
    Type: Application
    Filed: June 5, 2015
    Publication date: February 22, 2018
    Applicant: HITACHI, LTD.
    Inventors: Mioko MORIGUCHI, Etsutaro AKAGAWA
  • Publication number: 20170235677
    Abstract: A computer system that is composed of a host computer, a storage device and a management computer. The storage device comprises a port for connecting with the host computer, a cache memory, a processor, and a plurality of logic volumes which are logical memory regions. For each logic volume, the port, the cache memory and the processor are divided into logic partitions, as resources that are used for reading and writing in the logic volume. The host computer reads and writes with respect to the logic volumes. If a failure occurs in the storage device, the management computer issues a command to the storage device to allocate the resources of a logic partition for which reading/writing performance is not ensured to a logic partition for which reading/writing performance is ensured.
    Type: Application
    Filed: November 12, 2014
    Publication date: August 17, 2017
    Applicant: Hitach, Ltd.
    Inventors: Hidenori SAKANIWA, Wataru OKADA, Yoshinori OHIRA, Etsutarou AKAGAWA, Nobuhiro MAKI, Mioko MORIGUCHI
  • Publication number: 20170139842
    Abstract: An encryption key used with a storing apparatus and an encryption key used with a non-volatile cache memory are identical to each other. A cache control portion unit effects control in such a way that an encryption key EK used to encrypt first data stored in the storing apparatuses, and an encryption key EK used to encrypt second data which are data corresponding to the first data and are stored in the non-volatile cache memory, are identical to each other. If the cache control portion receives a write request and first data WD, the cache control portion identifies from the storing apparatuses a storing apparatus that is to be the storage destination of the first data, identifies an encryption key allocated to the identified storing apparatus, encrypts the second data corresponding to the first data using the identified encryption key, and stores the data in the non-volatile cache memory.
    Type: Application
    Filed: February 5, 2014
    Publication date: May 18, 2017
    Inventors: Mioko MORIGUCHI, Wataru OKADA, Nobuhiro MAKI
  • Publication number: 20160034721
    Abstract: The present invention curbs encryption key information used in a virtual logical volume and improves security. A storage management function 33201 is configured to provide to a host computer a virtual logical volume 327 created on the basis of a pool volume 324. The storage management function is configured to allocate a prescribed page from among pages in the pool volume to a virtual logical volume in accordance with a write request from the host computer. The storage management function is configured to select a page to be allocated to the virtual logical volume on the basis of information regarding encryption key information associated with a page that has been allocated to the virtual logical volume and information regarding encryption key information associated with a page capable of being allocated to the virtual logical volume from the pages managed in the pool.
    Type: Application
    Filed: March 11, 2013
    Publication date: February 4, 2016
    Applicant: HITACHI, LTD.
    Inventors: Mioko MORIGUCHI, Hirotaka NAKAGAWA, Hiroshi NASU
  • Patent number: 9081509
    Abstract: An example is a method for determining at least one migration destination for resources of one migration source physical storage system, with physical storage systems, which provide resources to a virtual storage system recognized by a host as one storage system, as migration destination candidates. The method defines at least one migration group from the resources included in the migration source physical storage system so that resources for which the predetermined management permissions are assigned to the same administrator are included in the same migration group, and determines at least one migration destination of the at least one migration group, on a condition that resources in the same migration group are migrated to the same physical storage system among the physical storage systems.
    Type: Grant
    Filed: October 3, 2012
    Date of Patent: July 14, 2015
    Assignee: Hitachi, Ltd.
    Inventors: Hiroshi Nasu, Mioko Moriguchi
  • Publication number: 20150026421
    Abstract: An example is a method for determining at least one migration destination for resources of one migration source physical storage system, with physical storage systems, which provide resources to a virtual storage system recognized by a host as one storage system, as migration destination candidates. The method defines at least one migration group from the resources included in the migration source physical storage system so that resources for which the predetermined management permissions are assigned to the same administrator are included in the same migration group, and determines at least one migration destination of the at least one migration group, on a condition that resources in the same migration group are migrated to the same physical storage system among the physical storage systems.
    Type: Application
    Filed: October 3, 2012
    Publication date: January 22, 2015
    Inventors: Hiroshi Nasu, Mioko Moriguchi
  • Publication number: 20130208892
    Abstract: When removing an HDD, in which a failure has occurred, after the execution of hot swap in a storage apparatus having a stored data encryption function, an encryption key assigned to that HDD is shredded and thereby data in the HDD is automatically crypto-shredded; and after a new HDD is installed, data in a spare disk regarding which copy back to the new HDD is completed is automatically crypto-shredded and key generation for the spare disk is requested to a security administrator in preparation for the next hot swap.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 15, 2013
    Applicant: HITACHI LTD.
    Inventors: Mioko Moriguchi, Hirotaka Nakagawa