Patents by Inventor Daisuke Kito
Daisuke Kito has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11965758Abstract: An object of the present invention is to provide a Brillouin optical sensing device and an optical sensing method capable of reducing introduction costs. The Brillouin optical sensing device according to the present invention includes: a sensing fiber 90 in which a plurality of optical fibers having Brillouin frequency shift characteristics different from each other are arranged in parallel; an optical measuring instrument 11 that launches an optical pulse into at least two of the optical fibers of the sensing fiber 90 to generate Brillouin scattering lights and measures a beat frequency of a beat signal between the Brillouin scattering lights at any position of the sensing fiber 90; and an arithmetic processing unit 12 that acquires a physical quantity of the sensing fiber 90 at said any position based on the beat frequency acquired by the optical measuring instrument 11.Type: GrantFiled: May 21, 2020Date of Patent: April 23, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Atsushi Nakamura, Chihiro Kito, Daisuke Iida, Junichi Kawataka, Hiroyuki Oshida
-
Publication number: 20240118127Abstract: The present disclosure is an optical line test system that detects a distribution of loss points of an optical line in a longitudinal direction, using a coherent light measurement device, applies vibration to facility disposed on a path of the optical line, detects a vibration point of the optical line in a longitudinal direction upon applying the vibration, using the coherent light measurement device, and identifies the loss point based on correspondence between the detected loss point and vibration point.Type: ApplicationFiled: February 26, 2021Publication date: April 11, 2024Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Daisuke IIDA, Yoshitaka ENOMOTO, Chihiro KITO, Tatsuya OKAMOTO, Yusuke KOSHIKIYA, Yoshifumi WAKISAKA, Nazuki HONDA
-
Publication number: 20220407696Abstract: This server having an interface connected to a first computer comprises: a coordination unit that receives a processing request, determines whether a coordination request showing a process for a first blockchain to which the first computer belongs and a process for a second blockchain to which a second computer coordinated to the first computer belongs is included in the processing request, and, if the coordination request is included, determines whether redaction of the coordination request is necessary; and a redaction unit that carries out redaction of the coordination request for which redaction is necessary on the basis of the results of the determination, wherein the coordination unit transmits, to the first computer, a processing execution request that includes the coordination request on which redaction has been carried out by the redaction unit in accordance with the results of the determination.Type: ApplicationFiled: November 17, 2020Publication date: December 22, 2022Applicant: Hitachi, Ltd.Inventors: Daisuke KITO, Yusuke JIN
-
Patent number: 8650374Abstract: In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.Type: GrantFiled: January 3, 2011Date of Patent: February 11, 2014Assignee: Hitachi Ltd.Inventors: Daisuke Kito, Kenji Fujii, Yasunori Kaneda, Masato Arai
-
Patent number: 8612775Abstract: There is provided a computer system, having a host and at least one storage system. The at least one storage system provides storage area includes at least one of an encrypted storage area and a plaintext storage area The at least one storage system is configured to: receive an instruction about what type of storage area is available to the host computer; present the encrypted storage area to the host as an available storage area separate from unavailable storage areas in the case of the type of storage area being available according to the instruction indicating “encrypted”; and present, in the case of the type of storage area being available according to the instruction indicating other than “encrypted”, one of both the encrypted storage area and the plaintext storage area to the host computer as available storage areas, and only the plaintext storage area as an available storage area.Type: GrantFiled: June 3, 2008Date of Patent: December 17, 2013Assignee: Hitachi, Ltd.Inventors: Daisuke Kito, Kyoko Mikami, Nobuyuki Osaki
-
Patent number: 8281157Abstract: It is made possible to correctly decrypt data in a storage area in a computer system (storage system) having various encryption execution sections (such as a storage device or encryption appliance having an encryption function). In the case where storage areas may be encrypted by the various encryption execution sections, there is a possibility that, when a storage area is copied or the configuration of the computer system is changed, the storage area cannot be correctly decrypted unless it is managed where the storage area has been encrypted or whether the storage area is not encrypted. To prevent this, a management computer manages the key and the encryption execution section for each storage area in the system.Type: GrantFiled: April 22, 2009Date of Patent: October 2, 2012Assignee: Hitachi, Ltd.Inventors: Daisuke Kito, Nobuyuki Osaki
-
Patent number: 8090100Abstract: A storage apparatus, which controls the input and output of data to and from a computer, includes a logical volume for storing data from the computer, a common resource for storing data pre-stored in the logical volume as update data in order to store subsequent data from the computer in the logical volume, an encryption/decryption unit for encrypting or decrypting data stored in the logical volume or update data stored in the common resource, and a key change unit for changing a key for encrypting or decrypting data stored in the logical volume. The storage apparatus changes the key for encrypting or decrypting update data stored in the common resource based on information of the key used for data stored in the logical volume.Type: GrantFiled: January 18, 2008Date of Patent: January 3, 2012Assignee: Hitachi, Ltd.Inventors: Daisuke Kito, Kenji Fujii, Manabu Kitamura
-
Patent number: 8065523Abstract: Proposed is an apparatus and method of preventing the leakage of information from an external storage apparatus even when such external storage apparatus is stolen or accessed from an unauthorized host computer. This external storage apparatus accessible from a host computer or another external storage apparatus via a network encrypts or decrypts data written from a host computer to be stored in the storage area, sends a request for existence confirmation to the host computer or the other external storage apparatus every predetermined period of time, and zeroizes an encryption key to be used in the encryption calculation for encrypting or decrypting data to be performed by the encryption calculation unit based on the result of a response from the host computer or the other external storage apparatus in reply to the request.Type: GrantFiled: January 10, 2008Date of Patent: November 22, 2011Assignee: Hitachi, Ltd.Inventors: Kenji Fujii, Daisuke Kito, Manabu Kitamura
-
Patent number: 8041959Abstract: To protect data from corruption due to restoration of an encryption key to a wrong storage system, there is provided a computer system including a first storage system and a second storage system, wherein: the first storage system, upon receiving a request to write first data to a first area in the first storage system, encrypts the first data by using a first key and writes the first data in the first area, and, upon receiving a request to write second data to a third area, encrypts the second data by using a second key and transmits a request to write the encrypted second data in a second area in the second storage system; and the computer system holds the first key, an identifier of the first storage system associated with the first key, the second key, and an identifier of the second storage system associated with the second key.Type: GrantFiled: February 4, 2008Date of Patent: October 18, 2011Assignee: Hitachi, Ltd.Inventors: Daisuke Kito, Kenji Fujii, Nobuyuki Osaki
-
Publication number: 20110185192Abstract: It is made possible to correctly decrypt data in a storage area in a computer system (storage system) having various encryption execution sections (such as a storage device or encryption appliance having an encryption function). In the case where storage areas may be encrypted by the various encryption execution sections, there is a possibility that, when a storage area is copied or the configuration of the computer system is changed, the storage area cannot be correctly decrypted unless it is managed where the storage area has been encrypted or whether the storage area is not encrypted. To prevent this, a management computer manages the key and the encryption execution section for each storage area in the system.Type: ApplicationFiled: April 22, 2009Publication date: July 28, 2011Inventors: Daisuke Kito, Nobuyuki Osaki
-
Publication number: 20110099331Abstract: In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.Type: ApplicationFiled: January 3, 2011Publication date: April 28, 2011Inventors: Daisuke Kito, Kenji Fujii, Yasunori Kaneda, Masato Arai
-
Patent number: 7886121Abstract: In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.Type: GrantFiled: June 28, 2006Date of Patent: February 8, 2011Assignee: Hitachi, Ltd.Inventors: Daisuke Kito, Kenji Fujii, Yasunori Kaneda, Masato Arai
-
Publication number: 20100031058Abstract: To protect data from corruption due to restoration of an encryption key to a wrong storage system, there is provided a computer system including a first storage system and a second storage system, wherein: the first storage system, upon receiving a request to write first data to a first area in the first storage system, encrypts the first data by using a first key and writes the first data in the first area, and, upon receiving a request to write second data to a third area, encrypts the second data by using a second key and transmits a request to write the encrypted second data in a second area in the second storage system; and the computer system holds the first key, an identifier of the first storage system associated with the first key, the second key, and an identifier of the second storage system associated with the second key.Type: ApplicationFiled: February 4, 2008Publication date: February 4, 2010Inventors: Daisuke Kito, Kenji Fujii, Nobuyuki Osaki
-
Publication number: 20090327757Abstract: There is provided a computer system, having a host and at least one storage system. The at least one storage system provides storage area includes at least one of an encrypted storage area and a plaintext storage area The at least one storage system is configured to: receive an instruction about what type of storage area is available to the host computer; present the encrypted storage area to the host as an available storage area separate from unavailable storage areas in the case of the type of storage area being available according to the instruction indicating “encrypted”; and present, in the case of the type of storage area being available according to the instruction indicating other than “encrypted”, one of both the encrypted storage area and the plaintext storage area to the host computer as available storage areas, and only the plaintext storage area as an available storage area.Type: ApplicationFiled: June 3, 2008Publication date: December 31, 2009Inventors: Daisuke Kito, Kyoko Mikami, Nobuyuki Osaki
-
Publication number: 20090271619Abstract: Proposed is an apparatus and method of preventing the leakage of information from an external storage apparatus even when such external storage apparatus is stolen or accessed from an unauthorized host computer. This external storage apparatus accessible from a host computer or another external storage apparatus via a network encrypts or decrypts data written from a host computer to be stored in the storage area, sends a request for existence confirmation to the host computer or the other external storage apparatus every predetermined period of time, and zeroizes an encryption key to be used in the encryption calculation for encrypting or decrypting data to be performed by the encryption calculation unit based on the result of a response from the host computer or the other external storage apparatus in reply to the request.Type: ApplicationFiled: January 10, 2008Publication date: October 29, 2009Inventors: Kenji Fujii, Daisuke Kito, Manabu Kitamura
-
Publication number: 20090177895Abstract: A controller carries out a first determination as to whether or not data to be stored in a target logical volume can be used by a plurality of access devices. The controller carries out a second determination as to whether or not the access devices comprise data encryption units respectively when the result of the first determination is affirmative. The controller controls a setting related to the target logical volume for one access device of the plurality of access devices, based on the result of the second determination.Type: ApplicationFiled: February 28, 2008Publication date: July 9, 2009Inventors: Koichi Murayama, Nobuyuki Osaki, Daisuke Kito
-
Publication number: 20080240429Abstract: The storage apparatus of the present invention that controls the input and output of data to and from a computer includes a logical volume for storing data from the computer, a common resource for storing data pre-stored in the logical volume as update data in order to store subsequent data from the computer in the logical volume, an encryption/decryption unit for encrypting or decrypting data stored in the logical volume or update data stored in the common resource, and a key change unit for changing a key for encrypting or decrypting data stored in the logical volume, and changing a key for encrypting or decrypting update data stored in the common resource based on information of the key used for data stored in the logical volume.Type: ApplicationFiled: January 18, 2008Publication date: October 2, 2008Applicant: HITACHI, LTD.Inventors: Daisuke Kito, Kenji Fujii, Manabu Kitamura
-
Publication number: 20070260806Abstract: In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.Type: ApplicationFiled: June 28, 2006Publication date: November 8, 2007Inventors: Daisuke Kito, Kenji Fujii, Yasunori Kaneda, Masato Arai