Patents by Inventor Shigeyuki Fukushima
Shigeyuki Fukushima has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8688969Abstract: A cryptographic management apparatus includes a storage unit which stores cryptographic key information containing a cryptographic key and cryptographic process condition information containing the cryptographic key information, a cryptographic process information input unit which receives an input of the object information and cryptographic key search request information, a cryptographic key information acquisition unit which acquires the cryptographic key information from the storage unit based on the search request information, a cryptographic module evaluation description information acquisition unit which acquires evaluation description information of the cryptographic module corresponding to the cryptographic key information, a cryptographic process ID creation unit which attaches an identifier of the cryptographic process condition information to the object information based on the cryptographic key information and the cryptographic module corresponding to the evaluation description information, and anType: GrantFiled: September 25, 2008Date of Patent: April 1, 2014Assignees: Toshiba Solutions Corporation, Yokosuka Telecom Research Park, Inc.Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Patent number: 8417964Abstract: A cryptographic client device acquires a cryptographic key from a storage device son the basis of the accepted demand information, acquires a cryptographic evaluation description file from the storage device, acquires a cryptographic module corresponding to this cryptographic evaluation description file, executes a cryptographic process on the subject data to be performed the cryptographic process, and issues the encrypted subject data.Type: GrantFiled: September 18, 2008Date of Patent: April 9, 2013Assignees: Toshiba Solutions Corporation, Yokosuka Telecom Research Park, Inc.Inventors: Shingo Miyazaki, Fumihiko Sano, Koji Okada, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Patent number: 8406422Abstract: A cryptographic module management apparatus searches for cryptographic module meta-information based on the category information of a requested cryptographic module and, if associated cryptographic module category information is contained in this cryptographic module meta-information, searches for the cryptographic module meta-information of an associated cryptographic module, to generate composite type cryptographic module evaluation information based on this cryptographic module meta-information, select a cryptographic module based on this composite type cryptographic module evaluation information, and read this cryptographic module from a cryptographic module storage portion and output such composite type cryptographic module evaluation information.Type: GrantFiled: September 18, 2008Date of Patent: March 26, 2013Assignees: Toshiba Solutions Corporation, Yokosuka Telecom Research Park, Inc.Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Patent number: 8396218Abstract: In a cryptographic module distribution system, a cryptographic management server apparatus encrypts a cryptographic module using a key shared by a cryptographic apparatus, and transmits the encrypted cryptographic module to a client apparatus. The client apparatus transmits the encrypted cryptographic module to a cryptographic apparatus. The cryptographic apparatus decrypts the encrypted cryptographic module using the key shared by the cryptographic management server apparatus, and transmits the decrypted cryptographic module to the client apparatus. The client apparatus stores the received cryptographic module.Type: GrantFiled: September 18, 2008Date of Patent: March 12, 2013Assignees: Toshiba Solutions Corporation, Yokosuka Telecom Research Park, Inc.Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Patent number: 8370643Abstract: A cryptographic module selecting device includes a cryptographic module evaluation information storage device configured to store identification information of a cryptographic module and cryptographic module evaluation information describing a function and/or performance of the cryptographic module in relation to each other, a condition information acquiring device configured to acquire condition information for specifying the condition of the cryptographic module to be selected, an extracting device configured to extract cryptographic module evaluation information conforming to the acquired condition information, from the stored cryptographic module evaluation information of the cryptographic module, and an output device configured to read out the identification information of the cryptographic module corresponding to the cryptographic module evaluation information selected by the extracting device from the cryptographic module evaluation information storage device and output the read identification informatType: GrantFiled: September 25, 2008Date of Patent: February 5, 2013Assignees: Toshiba Solutions Corporation, Yokosuka Telecom Research Park, Inc.Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Patent number: 7868736Abstract: Apart from authentication of an electronic key, authentication of an ID card and authentication of user authentication information are executed. When all the authentications have been successfully made, engine startup information is produced. In this manner, even if electronic key data or an electronic key device has been copied, vehicle theft can be prevented.Type: GrantFiled: July 25, 2006Date of Patent: January 11, 2011Assignees: Kabushiki Kaisha Toshiba, Toshiba Solutions CorporationInventors: Shigeyuki Fukushima, Koji Okada
-
Publication number: 20100281270Abstract: A cryptographic module selecting device includes a cryptographic module evaluation information storage device configured to store identification information of a cryptographic module and cryptographic module evaluation information describing a function and/or performance of the cryptographic module in relation to each other, a condition information acquiring device configured to acquire condition information for specifying the condition of the cryptographic module to be selected, an extracting device configured to extract cryptographic module evaluation information conforming to the acquired condition information, from the stored cryptographic module evaluation information of the cryptographic module, and an output device configured to read out the identification information of the cryptographic module corresponding to the cryptographic module evaluation information selected by the extracting device from the cryptographic module evaluation information storage device and output the read identification informatType: ApplicationFiled: September 25, 2008Publication date: November 4, 2010Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Publication number: 20090138708Abstract: In a cryptographic module distribution system, a cryptographic management server apparatus encrypts a cryptographic module using a key shared by a cryptographic apparatus, and transmits the encrypted cryptographic module to a client apparatus. The client apparatus transmits the encrypted cryptographic module to a cryptographic apparatus. The cryptographic apparatus decrypts the encrypted cryptographic module using the key shared by the cryptographic management server apparatus, and transmits the decrypted cryptographic module to the client apparatus. The client apparatus stores the received cryptographic module.Type: ApplicationFiled: September 18, 2008Publication date: May 28, 2009Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Publication number: 20090138700Abstract: A cryptographic management apparatus includes a storage unit which stores cryptographic key information containing a cryptographic key and cryptographic process condition information containing the cryptographic key information, a cryptographic process information input unit which receives an input of the object information and cryptographic key search request information, a cryptographic key information acquisition unit which acquires the cryptographic key information from the storage unit based on the search request information, a cryptographic module evaluation description information acquisition unit which acquires evaluation description information of the cryptographic module corresponding to the cryptographic key information, a cryptographic process ID creation unit which attaches an identifier of the cryptographic process condition information to the object information based on the cryptographic key information and the cryptographic module corresponding to the evaluation description information, and anType: ApplicationFiled: September 25, 2008Publication date: May 28, 2009Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Publication number: 20090138699Abstract: A cryptographic client device acquires a cryptographic key from a storage device son the basis of the accepted demand information, acquires a cryptographic evaluation description file from the storage device, acquires a cryptographic module corresponding to this cryptographic evaluation description file, executes a cryptographic process on the subject data to be performed the cryptographic process, and issues the encrypted subject data.Type: ApplicationFiled: September 18, 2008Publication date: May 28, 2009Inventors: Shingo MIYAZAKI, Fumihiko Sano, Koji Okada, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Publication number: 20090129586Abstract: A cryptographic module management apparatus searches for cryptographic module meta-information based on the category information of a requested cryptographic module and, if associated cryptographic module category information is contained in this cryptographic module meta-information, searches for the cryptographic module meta-information of an associated cryptographic module, to generate composite type cryptographic module evaluation information based on this cryptographic module meta-information, select a cryptographic module based on this composite type cryptographic module evaluation information, and read this cryptographic module from a cryptographic module storage portion and output such composite type cryptographic module evaluation information.Type: ApplicationFiled: September 18, 2008Publication date: May 21, 2009Inventors: Shingo Miyazaki, Takanori Nakamizo, Akito Niwa, Koji Okada, Kouya Tochikubo, Shigeyuki Fukushima, Chiaki Ishikawa, Noboru Koshizuka, Ken Sakamura
-
Publication number: 20060255910Abstract: Apart from authentication of an electronic key, authentication of an ID card and authentication of user authentication information are executed. When all the authentications have been successfully made, engine startup information is produced. In this manner, even if electronic key data or an electronic key device has been copied, vehicle theft can be prevented.Type: ApplicationFiled: July 25, 2006Publication date: November 16, 2006Inventors: Shigeyuki Fukushima, Koji Okada
-
Publication number: 20030065930Abstract: In each embodiment of the invention, the security unit device operating independently of a PC encrypts and decrypts data, adding a signature to data encrypted or decrypted, and verifies the signature. Hence, the key data and the encryption algorithm can be protected from the implementing of illegal software. This enables the PC to exchange data in security, with any other PC linked to it.Type: ApplicationFiled: September 13, 2002Publication date: April 3, 2003Inventor: Shigeyuki Fukushima
-
Publication number: 20030056099Abstract: According to an embodiment of the present invention, an issue system previously issues a smart card, and sends an encrypted private key and a public key certificate to a user terminal, when issuing a new card or updating an old card. A user terminal inputs the received encrypted private key and public key certificate into a smart card. A smart card stores a public key certificate, and decrypts the inputted encrypted private key by an encryptor/decryptor based on a symmetric key, and stores the obtained private key. Therefore, collection and redistribution of a smart card becomes unnecessary, when updating a private key and a public key certificate, saving the time and labor.Type: ApplicationFiled: September 9, 2002Publication date: March 20, 2003Inventors: Toshiyuki Asanoma, Shigeyuki Fukushima, Tatsuya Ishihara, Shoji Kitaori