Patents by Inventor Toshinori Araki

Toshinori Araki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150006908
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Application
    Filed: July 3, 2014
    Publication date: January 1, 2015
    Applicant: NEC CORPORATION
    Inventors: Kengo MORI, Satoshi OBANA, Jun FURUKAWA, Isamu TERANISHI, Toshiyuki ISSHIKI, Toshinori ARAKI
  • Patent number: 8861734
    Abstract: A secret reconstruction method comprises: receiving (k+?) pairs out of n pairs (ri, fi) each composed of a random number ri and a share fi where ? is a natural number (steps B1-B5); determining if a (k?1) degree polynomial g(x) is reconstructed that satisfies fi=g(ri) for all received pairs (steps B5 and B6); and outputting g(0) as the secret if the polynomial is reconstructed and otherwise outputting a signal indicating that at least one of the received pairs is forged (steps B7 and B8).
    Type: Grant
    Filed: August 13, 2008
    Date of Patent: October 14, 2014
    Assignee: NEC Corporation
    Inventor: Toshinori Araki
  • Patent number: 8812877
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Grant
    Filed: November 9, 2012
    Date of Patent: August 19, 2014
    Assignee: NEC Corporation
    Inventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
  • Patent number: 8799677
    Abstract: The encrypted search result adding module of the encrypted search database device includes: a search result generating unit which generates a linear list as a list of search results for newly registered document data; an initial point information generating unit which generates initial point information as address of first data corresponding to a keyword; an initial point information encrypting unit which encrypts and adds/stores generated initial point information with an encryption key; and an encrypted linear list adding unit which generates and adds/stores an encrypted linear list by encrypting the linear list with the encryption key, and stores each keyword and final point information as the address of last data in the encrypted linear list for the keyword as adding information.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: August 5, 2014
    Assignee: NEC Corporation
    Inventor: Toshinori Araki
  • Publication number: 20140143549
    Abstract: An information processing apparatus includes: a storage unit that stores a tree structure formed by nodes, each of which is stores identification information identifying a document; and a registration unit that registers documents in the storage unit. The registration unit receives a document including identification information identifying the document and a word set and a key, registers the identification information in a leaf node in the tree structure, and calculates a secure index corresponding to identification information registered in each node from a root node to the leaf node in the tree structure based on the word set and the key. In addition, the registration unit generates a value calculated by adding the calculated secure index as a search index for the document and stores a value calculated by adding a search index generated for each of a plurality of received documents as a search index for the plurality of documents in the storage unit.
    Type: Application
    Filed: July 6, 2012
    Publication date: May 22, 2014
    Applicant: NEC Corporation
    Inventors: Toshinori Araki, Isamu Teranishi, Jun Furukawa
  • Publication number: 20140129567
    Abstract: In the present invention, scope search can be effectively performed in a database having encrypted registration information. A plurality of values, first identification information to identify the plurality of values, and a key are accepted as input. A value group is generated from the plurality of values. The value group is treated as a word group, and a secure index is generated from the word group, the first identification information, and the key. On the basis of a value to be retrieved and a key, trapdoor information for the value to be retrieved is generated. With respect to the generated secure index, a secure index assessment process is performed using the trapdoor information. When the value to be retrieved is assessed to be contained in the secure index as a result of the assessment process, second identification information to identify the secure index is output.
    Type: Application
    Filed: July 27, 2012
    Publication date: May 8, 2014
    Applicant: c/o NEC Corporation
    Inventors: Toshinori Araki, Isamu Teranishi
  • Publication number: 20140095889
    Abstract: The encrypted search result adding module of the encrypted search database device includes: a search result generating unit which generates a linear list as a list of search results for newly registered document data; an initial point information generating unit which generates initial point information as address of first data corresponding to a keyword; an initial point information encrypting unit which encrypts and adds/stores generated initial point information with an encryption key; and an encrypted linear list adding unit which generates and adds/stores an encrypted linear list by encrypting the linear list with the encryption key, and stores each keyword and final point information as the address of last data in the encrypted linear list for the keyword as adding information.
    Type: Application
    Filed: December 5, 2012
    Publication date: April 3, 2014
    Applicant: NEC CORPORATION
    Inventor: Toshinori Araki
  • Publication number: 20130246813
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Application
    Filed: November 9, 2012
    Publication date: September 19, 2013
    Applicant: NEC CORPORATION
    Inventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
  • Patent number: 8381048
    Abstract: A transmitting apparatus generates and transmits 3t+1 or more number of codewords for a message and multiple faulty encoded message identifying data, wherein the information regarding the message may not be obtained from t or less number of encoded messages and the message can be decoded from 2t+1 or more codewords. The faulty encoded message identifying data are able to detect t or less number of faulty codewords of the message, even if there are t or less number of faulty codewords. A receiving apparatus checks whether there is no fault in each codeword for the message, using the codewords of the message and faulty encoded message identifying data for the codewords of the message received and the corresponding faulty encoded message identifying data and also checks whether the codewords decided to be non-faulty are all of the same message.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: February 19, 2013
    Assignee: NEC Corporation
    Inventor: Toshinori Araki
  • Patent number: 8300826
    Abstract: Disclosed is a distributed information generation apparatus which generates a polynomial F in which secret information s is embedded to output distributed secret information, generates a polynomial G in which an output when a fixed value t is entered into the polynomial F is embedded as the secret information, and generates distributed distributed secret information. The reconstruction apparatus receives k sets of the distributed secret information to generate a polynomial F?, and receives k sets of the distributed distributed secret information to generate a polynomial G?. When a value embedded in the polynomial G? as the secret information and an output obtained by entering the fixed value into the polynomial F? is equal, the distributed information generation apparatus outputs the embedded value. When the embedded value is not equal to the output, the distributed information generation apparatus outputs information indicating detection of cheating.
    Type: Grant
    Filed: January 30, 2008
    Date of Patent: October 30, 2012
    Assignee: NEC Corporation
    Inventor: Toshinori Araki
  • Patent number: 8214647
    Abstract: Check data corresponding to distributed confidential information is generated, and the confidential information and check data are distribution-coded. When the confidential information is restored, the confidential information and check data are restored and it is determined whether or not the restored check data correspond to the restored confidential information. If the data correspond to the information, the information is determined to be correct and is output. If not, the information is judged to be false (i.e., tampered distributed information), and a symbol indicating that falsity has been detected is output.
    Type: Grant
    Filed: June 15, 2007
    Date of Patent: July 3, 2012
    Assignee: NEC Corporation
    Inventors: Toshinori Araki, Satoshi Obana
  • Patent number: 8199910
    Abstract: A signature generation apparatus generates a signature for a message m from the i-th user, and computes any two or three of a[1]?[x] (mod n), a[2]?[s] (mod n), and w?[t] (mod l) are in parallel. For this reason, the signature generation apparatus is provided with a plurality of fast arithmetic units (sub-IPs) within the IP core. The individual sub-IPs are connected to each other via a narrow-band, single-layer local bus.
    Type: Grant
    Filed: June 30, 2009
    Date of Patent: June 12, 2012
    Assignee: NEC Corporation
    Inventors: Sumio Morioka, Toshinori Araki
  • Publication number: 20120011419
    Abstract: A transmitting apparatus generates and transmits 3t+1 or more number of codewords for a message and multiple faulty encoded message identifying data, wherein the information regarding the message may not be obtained from t or less number of encoded messages and the message can be decoded from 2t+1 or more codewords. The faulty encoded message identifying data are able to detect t or less number of faulty codewords of the message, even if there are t or less number of faulty codewords. A receiving apparatus checks whether there is no fault in each codeword for the message, using the codewords of the message and faulty encoded message identifying data for the codewords of the message received and the corresponding faulty encoded message identifying data and also checks whether the codewords decided to be non-faulty are all of the same message.
    Type: Application
    Filed: August 6, 2008
    Publication date: January 12, 2012
    Inventor: Toshinori Araki
  • Publication number: 20110126291
    Abstract: A secret reconstruction method comprises: receiving (k+?) pairs out of n pairs (ri, fi) each composed of a random number ri and a share fi where ? is a natural number (steps B1-B5); determining if a (k?1) degree polynomial g(x) is reconstructed that satisfies fi=g(ri) for all received pairs (steps B5 and B6); and outputting g(0) as the secret if the polynomial is reconstructed and otherwise outputting a signal indicating that at least one of the received pairs is forged (steps B7 and B8).
    Type: Application
    Filed: August 13, 2008
    Publication date: May 26, 2011
    Applicant: NEC CORPORATION
    Inventor: Toshinori Araki
  • Publication number: 20100287366
    Abstract: A shared information creating device capable of detecting false alteration of shared information with high probability even if a traitor has shares the number of which is above a threshold and creating shared information whose data size is smaller than that of secret information. A recovering device, a recovery result verifying device, and a secret information sharing system, program, and method are also provided. The shared information creating device generates a polynomial F in which secret information s is embedded, outputs a shared secret information, generates a polynomial G in which the output of when a fixed value t is substituted in the polynomial F is embedded as secret information, and creates shared secret information. A recovering device receives k sets of shared secret information to generate a polynomial F?, and receives k sets of shared shared secret information to generate a polynomial G?.
    Type: Application
    Filed: January 30, 2008
    Publication date: November 11, 2010
    Inventor: Toshinori Araki
  • Publication number: 20090296923
    Abstract: A signature generation apparatus generates a signature for a message m from the i-th user, and computes any two or three of a[1]?[x](mod n), a[2]?[s](mod n), and w?[t](mod l) are in parallel. For this reason, the signature generation apparatus is provided with a plurality of fast arithmetic units (sub-IPs) within the IP core. The individual sub-IPs are connected to each other via a narrow-band, single-layer local bus.
    Type: Application
    Filed: June 30, 2009
    Publication date: December 3, 2009
    Applicant: NEC Corporation
    Inventors: Sumio Morioka, Toshinori Araki
  • Publication number: 20090204802
    Abstract: Check data corresponding to distributed confidential information is generated, and the confidential information and check data are distribution-coded. When the confidential information is restored, the confidential information and check data are restored and it is determined whether or not the restored check data correspond to the restored confidential information. If the data correspond to the information, the information is determined to be correct and is output. If not, the information is judged to be false (i.e., tampered distributed information), and a symbol indicating that falsity has been detected is output.
    Type: Application
    Filed: June 15, 2007
    Publication date: August 13, 2009
    Applicant: NEC Corporation
    Inventors: Toshinori Araki, Satoshi Obana