Patents by Inventor Goichiro Hanaoka

Goichiro Hanaoka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11436471
    Abstract: A method of obtaining a shared prediction model is provided. The method includes: obtaining a prediction model as a neural network; converting each negative numerical value in a plurality of parameters included in the prediction model to a positive numerical value to obtain a converted prediction model; and sharing the converted prediction model by a secret sharing method to obtain shared prediction models while concealing an input data.
    Type: Grant
    Filed: October 2, 2018
    Date of Patent: September 6, 2022
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Naohisa Nishida, Yuji Unagami, Tatsumi Oba, Ryo Kato, Shota Yamada, Nuttapong Attrapadung, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka
  • Patent number: 11431489
    Abstract: An encryption processing system includes: a first device; second devices; and a third device, wherein the first device generates synthesis keys by selecting public keys of the second devices; generates an intermediate text from confidential texts generated by encrypting secret information by using public keys of the second devices having decryption authority; generates ciphertexts by further encrypting the intermediate text using the synthesis keys; and makes public the ciphertexts, each of the second devices verifies validity of the ciphertexts; generates decryption key fragments by using an own private key; and makes public the decryption key fragments, the third device verifies validity of the decryption key fragments; generates a decryption key by combining decryption key fragments; generates the Intermediate text by decrypting one of the ciphertexts; and makes public the intermediate text, and the second device decrypts the intermediate text using the own private key; and restores the secret information.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: August 30, 2022
    Assignee: FUJITSU LIMITED
    Inventors: Toshiya Shimizu, Takeshi Shimoyama, Goichiro Hanaoka, Yusuke Sakai, Seonghan Shin
  • Publication number: 20220100897
    Abstract: A secure authentication method includes: deriving a distributed LSH value using secret LSH, taking a first distributed feature amount which is a feature amount of user information distributed through a secret distribution method and encrypted LSH parameters as inputs; deriving a distributed hash value using a secret unidirectional function, taking the distributed LSH value and a distributed key as inputs; decoding the hash value by reversing distribution of the distributed hash value; selecting, from a secret hash table storing sets of a hash value as an index and a distributed feature amount as a data string, a set including a hash value matching the decoded hash value; computing, in secret, similarity between the distributed feature amount in the set and the first distributed feature amount; deriving, in secret, a user authentication result based on the similarity computed; and outputting the derived authentication result.
    Type: Application
    Filed: December 9, 2021
    Publication date: March 31, 2022
    Applicant: Panasonic Intellectual Property Corporation of America
    Inventors: Naohisa NISHIDA, Tatsumi OBA, Yuji UNAGAMI, Tadanori TERUYA, Nuttapong ATTRAPADUNG, Goichiro HANAOKA
  • Publication number: 20210135851
    Abstract: An encryption processing system includes: a first device; second devices; and a third device, wherein the first device generates synthesis keys by selecting public keys of the second devices; generates an intermediate text from confidential texts generated by encrypting secret information by using public keys of the second devices having decryption authority; generates ciphertexts by further encrypting the intermediate text using the synthesis keys; and makes public the ciphertexts, each of the second devices verifies validity of the ciphertexts; generates decryption key fragments by using an own private key; and makes public the decryption key fragments, the third device verifies validity of the decryption key fragments; generates a decryption key by combining decryption key fragments; generates the Intermediate text by decrypting one of the ciphertexts; and makes public the intermediate text, and the second device decrypts the intermediate text using the own private key; and restores the secret information.
    Type: Application
    Filed: October 27, 2020
    Publication date: May 6, 2021
    Applicant: FUJITSU LIMITED
    Inventors: Toshiya Shimizu, Takeshi SHIMOYAMA, Goichiro Hanaoka, Yusuke Sakai, Seonghan Shin
  • Patent number: 10649919
    Abstract: In an information processing method, a query including a first encrypted feature value provided with confidential information unique to a user is received. The first encrypted feature value is generated by encrypting a first feature value calculated from privacy data of the user by using inner product encryption. A plurality of inner product values are acquired by computing an inner product of the first encrypted feature value and each of a plurality of second encrypted feature values. Privacy data of a plurality of pieces of privacy data having an inner product value of the first encrypted feature value and a second encrypted feature value with an encrypted reference feature value calculated from the privacy data being equal to or smaller than a predetermined threshold is transmitted. A secret key of the user is identified by using the confidential information when an unauthorized access is detected, and identification information is outputted.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: May 12, 2020
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yuji Unagami, Naohisa Nishida, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
  • Publication number: 20190190713
    Abstract: A master key generation device generates a master public key and a master secret key. A user key generation device generates a user public key and a user secret key by using the master public key. An administration device acquires an arithmetic procedure. A data save unit saves data encrypted with the user public key as encryption data. The administration device selects, from the data save unit, encryption data which has been encrypted from data to be used for the arithmetic procedure. The administration device performs homomorphic operation on the encryption data based on the arithmetic procedure, and outputs the operation result of the homomorphic operation as an encryption operation result. A master decryption device acquires the encryption operation result, and decrypts the acquired encryption operation result with the master secret key.
    Type: Application
    Filed: August 7, 2017
    Publication date: June 20, 2019
    Applicant: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Takato HIRANO, Yutaka KAWAI, Goichiro HANAOKA, Koji NUIDA, Jacob SCHULDT, Takahiro MATSUDA
  • Patent number: 10303893
    Abstract: A data search method of a first device storing multiple sets of privacy data acquired from multiple persons and multiple reference features corresponding to the multiple sets of privacy data, where the multiple reference features each are expressed by an n-dimensional vector, includes receiving first encrypted features from a second device connected to the first device, generating multiple second converted features by a second conversion of the multiple reference features, generating of multiple second encrypted features by encrypting the multiple second converted features using inner product encryption, acquiring multiple inner product values by performing inner product computation of each of the first encrypted features and the multiple second encrypted features, determining whether or not the first features and the first reference features are similar, and transmitting of first privacy data corresponding to the first reference features out of the multiple sets of privacy data to the second device.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: May 28, 2019
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
  • Publication number: 20190114530
    Abstract: A method of obtaining a shared prediction model is provided. The method includes: obtaining a prediction model as a neural network; converting each negative numerical value in a plurality of parameters included in the prediction model to a positive numerical value to obtain a converted prediction model; and sharing the converted prediction model by a secret sharing method to obtain shared prediction models while concealing an input data.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 18, 2019
    Inventors: NAOHISA NISHIDA, YUJI UNAGAMI, TATSUMI OBA, RYO KATO, SHOTA YAMADA, NUTTAPONG ATTRAPADUNG, TADANORI TERUYA, TAKAHIRO MATSUDA, GOICHIRO HANAOKA
  • Publication number: 20180203808
    Abstract: In an information processing method, a query including a first encrypted feature value provided with confidential information unique to a user is received. The first encrypted feature value is generated by encrypting a first feature value calculated from privacy data of the user by using inner product encryption. A plurality of inner product values are acquired by computing an inner product of the first encrypted feature value and each of a plurality of second encrypted feature values. Privacy data of a plurality of pieces of privacy data having an inner product value of the first encrypted feature value and a second encrypted feature value with an encrypted reference feature value calculated from the privacy data being equal to or smaller than a predetermined threshold is transmitted. A secret key of the user is identified by using the confidential information when an unauthorized access is detected, and identification information is outputted.
    Type: Application
    Filed: December 20, 2017
    Publication date: July 19, 2018
    Inventors: YUJI UNAGAMI, NAOHISA NISHIDA, SHOTA YAMADA, NUTTAPONG ATTRAPADUNG, TAKAHIRO MATSUDA, GOICHIRO HANAOKA
  • Publication number: 20170169241
    Abstract: A data search method of a first device storing multiple sets of privacy data acquired from multiple persons and multiple reference features corresponding to the multiple sets of privacy data, where the multiple reference features each are expressed by an n-dimensional vector, includes receiving first encrypted features from a second device connected to the first device, generating multiple second converted features by a second conversion of the multiple reference features, generating of multiple second encrypted features by encrypting the multiple second converted features using inner product encryption, acquiring multiple inner product values by performing inner product computation of each of the first encrypted features and the multiple second encrypted features, determining whether or not the first features and the first reference features are similar, and transmitting of first privacy data corresponding to the first reference features out of the multiple sets of privacy data to the second device.
    Type: Application
    Filed: December 1, 2016
    Publication date: June 15, 2017
    Inventors: YUJI UNAGAMI, NATSUME MATSUZAKI, SHOTA YAMADA, NUTTAPONG ATTRAPADUNG, TAKAHIRO MATSUDA, GOICHIRO HANAOKA
  • Patent number: 9215068
    Abstract: A search system has a management device that stores compound data and a searcher device. The management device defines a similarity between query sequence data q representing a substructure or property of a substance that is input as a search condition at the searcher device and sequence data pi (i=1, 2, . . . , m) for substances stored in the database by means of a score T that takes a non-negative value when a Tversky index Si is greater than or equal to a threshold value ?n/?d (where ?n and ?d are natural numbers that satisfy ?n??d), calculates an encrypted value of the score T while the query sequence q is maintained in an encrypted state, and returns the encrypted value to the searcher device to thereby disclose information regarding whether or not similar compounds are present in the database while in a confidential state.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: December 15, 2015
    Assignee: National Institute of Advanced Industrial Science and Technology
    Inventors: Kana Iwamura, Takatsugu Hirokawa, Koji Tsuda, Hiromi Arai, Jun Sakuma, Kiyoshi Asai, Michiaki Hamada, Goichiro Hanaoka, Koji Nuida
  • Publication number: 20140355756
    Abstract: A search system has a management device that stores compound data and a searcher device. The management device defines a similarity between query sequence data q representing a substructure or property of a substance that is input as a search condition at the searcher device and sequence data pi (i=1, 2, . . . , m) for substances stored in the database by means of a score T that takes a non-negative value when a Tversky index Si is greater than or equal to a threshold value ?n/?d (where ?n and ?d are natural numbers that satisfy ?n??d, calculates an encrypted value of the score T while the query sequence q is maintained in an encrypted state, and returns the encrypted value to the searcher device to thereby disclose information regarding whether or not similar compounds are present in the database while in a confidential state.
    Type: Application
    Filed: September 14, 2012
    Publication date: December 4, 2014
    Applicant: National Institute of Advanced Industrial Science and Technology
    Inventors: Kana Iwamura, Takatsugu Hirokawa, Koji Tsuda, Hiromi Arai, Jun Sakuma, Kiyoshi Asai, Michiaki Hamada, Goichiro Hanaoka, Koji Nuida
  • Patent number: 6910130
    Abstract: A digital signature system comprises a center computer and a first and second terminal devices which can communicate with each other. The center computer generates and outputs a signing-key for a signer and a verification-key for a verifier. The first terminal device accepts the signing-key, generates a digital signature for a digital data to be signed using the signing-key, and outputs the digital signature. The second terminal device accepts the verification-key, the signer's identification code (e.g. the unique code of the signer), an identification code of the digital data and the digital signature, and verifies the validity of the digital signature using the verification-key, the identification code of the digital data and the signer's identification code.
    Type: Grant
    Filed: November 29, 2000
    Date of Patent: June 21, 2005
    Inventors: Hideki Imai, Goichiro Hanaoka, Junji Shikata, Yuliang Zheng
  • Publication number: 20020095581
    Abstract: A digital signature system comprises a center computer and a first and second terminal devices which can communicate with each other. The center computer generates and outputs a signing-key for a signer and a verification-key for a verifier. The first terminal device accepts the signing-key, generates a digital signature for a digital data to be signed using the signing-key, and outputs the digital signature. The second terminal device accepts the verification-key, the signer's identification code (e.g. the unique code of the signer), an identification code of the digital data and the digital signature, and verifies the validity of the digital signature using the verification-key, the identification code of the digital data and the signer's identification code.
    Type: Application
    Filed: November 29, 2000
    Publication date: July 18, 2002
    Inventors: Hideki Imai, Goichiro Hanaoka, Junji Shikata, Yuliang Zheng