Patents by Inventor Seigo Kotani

Seigo Kotani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050061871
    Abstract: An apparatus for granting electronic signature to a data includes an identification-data acquiring unit that acquires identification data for identifying an owner of a secret key that is used to create the electronic signature, an authorization-data acquiring unit that acquires authorization data corresponding to the identification data acquired, and a signature-granting determining unit that determines whether to grant the electronic signature to the data based on the authorization data acquired.
    Type: Application
    Filed: May 12, 2004
    Publication date: March 24, 2005
    Applicant: Fujitsu Limited
    Inventors: Nobuo Yoshikawa, Seigo Kotani, Takayuki Katou, Nao Ando
  • Publication number: 20040250071
    Abstract: An electronic data storage system stores electronic data with attaching an electronic signature, and output the electronic data along with the attached electronic signature, which decreases the operation costs with a simple operation. By using a public key-based signature, a third party can verify the data, and by using a secret check code, the electronic signature at registration is always valid without risk of falsification. Also by attaching an electronic signature at access, the validity of the stored data is assured, and a third party can verify the data. By using all of these features, the verification by a third party becomes possible over the long term. In this way the long term storage of electronic data is implemented.
    Type: Application
    Filed: January 30, 2004
    Publication date: December 9, 2004
    Inventors: Yasuyuki Higashiura, Takumi Kishino, Keizo Sato, Shoki Kadowaki, Seigo Kotani
  • Publication number: 20040193916
    Abstract: A central processing unit includes an operation mode storing unit that stores at least one first operation mode from among a plurality of second operation modes, a usable command storing unit that stores at least one command corresponding to each of the at least one first operation mode stored as at least one usable command, an operation mode adding/setting unit that adds into the operation mode storing unit a dynamically specified operation mode from the second operation modes, and sets in the usable command storing unit a command corresponding to the operation mode added, and a firmware acquiring unit that acquires from the outside, firmware that corresponds to the at least one first operation mode stored and that is used for executing the at least one usable command.
    Type: Application
    Filed: April 13, 2004
    Publication date: September 30, 2004
    Applicant: Fujitsu Limited
    Inventors: Jun Kamada, Seigo Kotani
  • Patent number: 6795834
    Abstract: When a sweeping process and a backup process are performed on an electronic library file in an electronic library, a file storing a history of the sweeping process or a history of a backup process is generated, and the sweeping and the backup processes are managed. Thus, a user can easily manage as to which medium an original document has been swept to or where a backup copy of the original document is. If the uniqueness of the original document shown in a sweep history and a backup history can be secured, the problem that there can be a plurality of original documents on the storage media of a plurality of electronic libraries can be avoided.
    Type: Grant
    Filed: December 27, 2000
    Date of Patent: September 21, 2004
    Assignee: Fujitsu Limited
    Inventors: Yasuyuki Higashiura, Takumi Kishino, Seigo Kotani, Takashi Yoshioka, Keizo Sato, Hiroki Inoue
  • Publication number: 20040139316
    Abstract: Security of an information processing apparatus is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus. The information processing apparatus transmits the collected environment information to a first authentication apparatus. An electronic certificate issued by a second authentication apparatus and information encrypted with a secret key issued by the second authentication apparatus are transmitted to the first authentication apparatus. The first authentication apparatus acquires the public key of the second authentication apparatus and the public key of the information processing apparatus so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper.
    Type: Application
    Filed: October 31, 2003
    Publication date: July 15, 2004
    Applicant: FUJITSU LIMITED
    Inventor: Seigo Kotani
  • Patent number: 6687835
    Abstract: A command authorization method that prevents a command issued by a third party from impersonating a command issued by a legitimate user, thereby maintaining high security. An authorization code stored in a command transmitted from a host is collated in a command authorization code parser. If the authorization code coincides with collating information therein, a command parser generates a predetermined access command, which is executed by a command controller.
    Type: Grant
    Filed: July 6, 1999
    Date of Patent: February 3, 2004
    Assignee: Fujitsu Limited
    Inventors: Hideyuki Hirano, Takayuki Hasebe, Seigo Kotani
  • Publication number: 20030177093
    Abstract: A data management method that by encrypting and distributing digital content prevents copyright infringement, and that prevents authorization information for decrypting the encrypted digital content from being damaged or otherwise lost. Encrypted content 45 is prepared by encrypting digital content 11 with a content key 44. A portion of the digital content 11 is extracted as sample data 41. A secret key 46, by which the content key 44 is encrypted with user information 14, is embedded as invisible information into the sample data 41, thus preparing watermarked sample data 47. The watermarked sample data 47 is synthesized with the encrypted content 45 to form synthesized data 48. The synthesized data 48 is distributed.
    Type: Application
    Filed: April 27, 2000
    Publication date: September 18, 2003
    Applicant: FUJITSU LIMITED
    Inventors: Hideyuki Hirano, Seigo Kotani, Shinji Hashimoto
  • Publication number: 20030046564
    Abstract: Data is encrypted and stored in an area on a storage medium accessible by the user outside an external storage device. A decrypting algorithm is stored in an area inaccessible by the user outside the external storage device. The external storage device provided with the storage medium retrieves the decrypting algorithm according to which the data is decrypted using a key obtained from outside the external storage device, for example, from a personal computer connected to the external storage device. Since the encrypted data and its decrypting algorithm are stored on the same storage medium, a specific decrypting algorithm can be assigned to each storage medium, thereby improving the security level for the stored information.
    Type: Application
    Filed: October 28, 1996
    Publication date: March 6, 2003
    Inventors: TATSURO MASUDA, KOUICHI KANAMOTO, KEIICHI MURAKAMI, MAKOTO YOSHIOKA, SEIGO KOTANI, SHINICHI YOSHIMOTO, MASAO FUJIWARA
  • Patent number: 6507910
    Abstract: A timer apparatus having a power source, a timer unit for outputting time information to which a time is set via a setting terminal, and a control unit in which a program for permitting set of a time in the timer unit only once is written from the outside via a write terminal and which controls the timer unit. After the program is written to the control unit via the write terminal, the write terminal is disconnected, and the power source, timer unit and control unit are molded integrally. A low-cost timer apparatus in which a time cannot be changed incorrectly can be realized without mounting a processor for performing a complicated process.
    Type: Grant
    Filed: May 25, 2001
    Date of Patent: January 14, 2003
    Assignee: Fujitsu Limited
    Inventor: Seigo Kotani
  • Publication number: 20020184046
    Abstract: In a heterogeneous multiprocessor system having a secure processor and a normal processor, a secure task and an unsecured task are allocated to respective processors. An encrypted code of the secure task is stored in a secure memory, and the secure memory verifies a signature using a public key of a certificate authority, and notifies the secure processor of the validity of the encrypted code. The secure processor fetches an encrypted instruction from the secure memory, and decrypts and executes the instruction.
    Type: Application
    Filed: January 11, 2002
    Publication date: December 5, 2002
    Applicant: Fujitsu Limited
    Inventors: Jun Kamada, Seigo Kotani
  • Patent number: 6480963
    Abstract: A network system with integrated security protection facilities. The system involves a transmission unit and a reception unit, which are coupled to each other via a network. In the transmission unit, a data management unit performs centralized management of source data that is stored in a plurality of storage units in a distributed manner. In response to a data transmission request from a terminal local to the transmission unit, a data collection unit collects requested data items from the data management unit. A security processor applies appropriate security protection processes to the collected data, depending on its data confidentiality level. An identification data attaching unit attaches identification data to the transmission data. This identification data informs the recipient of what sequence of security process primitives has been applied to the source data. A transmitter sends out the security-protected data over the network.
    Type: Grant
    Filed: January 4, 1999
    Date of Patent: November 12, 2002
    Assignee: Fujitsu Limited
    Inventors: Hirotaka Tachibana, Seiichi Urita, Seigo Kotani, Takehiko Hayashi
  • Publication number: 20020133606
    Abstract: A filtering apparatus includes an illegal request DB (database) which stores patterns of illegal accesses to a Web server, an estimation section which estimates the legality of an access request from a client device based on the illegal access patterns stored in the illegal request DB and on a predetermined estimation rule, and a determination section which determines whether the access request is to be transmitted to the Web server based on an estimation result of the estimation section and on a predetermined determination rule.
    Type: Application
    Filed: March 5, 2002
    Publication date: September 19, 2002
    Applicant: Fujitsu Limited
    Inventors: Masashi Mitomo, Satoru Torii, Seigo Kotani, Fumie Takizawa, Etsuo Ono, Osamu Koyano
  • Publication number: 20020133603
    Abstract: The filtering system includes the incorrect request database that stores patterns of incorrect accesses to the Web server. The estimation unit that estimates the correctness of an access request from a client device based on the patterns stored in the incorrect request database and a predetermined estimation rule. The decision unit decides whether the access request is to be passed to the Web server based on the result of estimation by the estimation unit and a predetermined decision rule.
    Type: Application
    Filed: July 25, 2001
    Publication date: September 19, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Masashi Mitomo, Satoru Torii, Seigo Kotani, Fumie Takizawa, Etsuo Ono, Osamu Koyano
  • Publication number: 20020118832
    Abstract: The present invention is a system capable of protecting copyright and personal information appropriately and allowing users to readily obtain desired contents in a short time at low prices. A recording device stores contents in advance. The recording device encrypts the contents, based on an identifier given uniquely to a medium. The recording device records the encrypted contents on the medium. Moreover, the recording device records limiting conditions for reproducing, displaying or executing the contents on the medium. An execution device decrypts the contents recorded on the medium, based on the identifier. The execution device reproduces, displays or executes the contents under the limiting conditions recorded on the medium.
    Type: Application
    Filed: July 3, 2001
    Publication date: August 29, 2002
    Inventors: Michio Matsuura, Keiji Shono, Kazuyuki Ozaki, Mineo Moribe, Motonobu Mihara, Koji Matsumoto, Seigo Kotani
  • Publication number: 20020116631
    Abstract: The system includes the monitor agent that analyzes log of an entity. When an abnormality is detected, the monitor agent notifies about the abnormality to the control manager. The control manager decides a countermeasure and a countermeasure request party from the database and informs them to the action agent which the countermeasure request party. The action agent implements the countermeasure.
    Type: Application
    Filed: September 20, 2001
    Publication date: August 22, 2002
    Inventors: Satoru Torii, Masashi Mitomo, Seigo Kotani, Fumie Takizawa
  • Publication number: 20020044647
    Abstract: A timer apparatus having a power source, a timer unit for outputting time information to which a time is set via a setting terminal, and a control unit in which a program for permitting set of a time in the timer unit only once is written from the outside via a write terminal and which controls the timer unit. After the program is written to the control unit via the write terminal, the write terminal is disconnected, and the power source, timer unit and control unit are molded integrally. A low-cost timer apparatus in which a time cannot be changed incorrectly can be realized without mounting a processor for performing a complicated process.
    Type: Application
    Filed: May 25, 2001
    Publication date: April 18, 2002
    Inventor: Seigo Kotani
  • Publication number: 20020038231
    Abstract: Before accepting a setting request from a predetermined manager in a plurality of date-and-time managers capable of issuing a date-and-time setting request, a setting request from any manager can be accepted. After accepting a setting request from a predetermined manager, only the setting request from the predetermined manager can be accepted. A date and time can be set in response to an accepted date-and-time setting request.
    Type: Application
    Filed: March 14, 2001
    Publication date: March 28, 2002
    Inventors: Takayuki Hasebe, Seigo Kotani
  • Publication number: 20020016920
    Abstract: The security information mediation apparatus comprises security information registering unit which registers security information supplied by a client of a user, a transfer unit which transfers the security information registered in the security information registering unit to a client of a program developer. This client judges the usefulness of the security information and outputs reply information when the security information is useful. A reply information registering unit receives the reply information and payment information that indicates payment of the information presentation fee of the corresponding security information from the developer client. A transfer unit transfers the reply information and payment information to the client of the user.
    Type: Application
    Filed: December 20, 2000
    Publication date: February 7, 2002
    Inventors: Masahiro Komura, Seigo Kotani, Satoru Torii
  • Publication number: 20020003883
    Abstract: A contents utilization control apparatus includes an input unit for inputting a) contents with control module that consist of contents and a control module, and b) a license with control module that consists of a license prepared from contents utilization approval information and a control module. The control module in the contents with control module and the control module in the license with control module cooperate with each other to carry out a control relating to the utilization of the contents.
    Type: Application
    Filed: March 6, 2001
    Publication date: January 10, 2002
    Inventors: Bintatsu Noda, Seigo Kotani, Takehiko Hayashi, Jun Kamada
  • Publication number: 20020002561
    Abstract: When a sweeping process and a backup process are performed on an electronic library file in an electronic library, a file storing a history of the sweeping process or a history of a backup process is generated, and the sweeping and the backup processes are managed. Thus, a user can easily manage as to which medium an original document has been swept to or where a backup copy of the original document is. If the uniqueness of the original document shown in a sweep history and a backup history can be secured, the problem that there can be a plurality of original documents on the storage media of a plurality of electronic libraries can be avoided.
    Type: Application
    Filed: December 27, 2000
    Publication date: January 3, 2002
    Inventors: Yasuyuki Higashiura, Takumi Kishino, Seigo Kotani, Takashi Yoshioka, Keizo Sato, Hiroki Inoue