Patents by Inventor Hitoshi Kokumai

Hitoshi Kokumai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8577807
    Abstract: Disclosed are protection of secret information in a system for reporting an emergency such as theft or confinement when secret information is accessed. Secret information includes a large quantity of data and a piece/pieces of true and correct data mixed into the data. The secret data including the data and the true and correct data is two-dimensional code data the code of which is composed of groups of cells having different areas. The positions and order of storage of the true and correct data dispersedly mixed in the data are determined and reported to the user. The user adds a predetermined alerting signal when inputting the password to tell that the user is under control of a third party. The system can detect the alerting signal and know that the user is in an abnormal state, performs normal identification procedures, and takes protection/preservation measures. Part of data is specified as confinement report data and added to the true and correct data.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: November 5, 2013
    Assignee: Mnemonic Security Limited
    Inventors: Hitoshi Kokumai, Ryuhei Masuno, Masayuki Kuriyama
  • Publication number: 20090328162
    Abstract: Disclosed are protection of secret information including an encryption key and a system for reporting an emergency such as theft or confinement when secret information is accessed. Secret information includes a large quantity of decoy data and a piece/pieces of true and correct data mixed into the decoy data. The secret data including the decoy data and the true and correct data is two-dimensional code data the code of which is composed of groups of cells having different areas. The positions and order of storage of the true and correct data dispersedly mixed in the decoy data are determined and reported to the user. The user adds a predetermined alerting signal when inputting the password to tell that the user is under control of a third party. The system can detect the alerting signal and know that the user is in an abnormal state, performs normal identification procedures, and takes protection/preservation measures.
    Type: Application
    Filed: March 30, 2007
    Publication date: December 31, 2009
    Inventors: Hitoshi Kokumai, Ryuhei Masuno, Masayuki Kuriyama
  • Patent number: 7552330
    Abstract: An effective means for system authentication by a user. A system is characterized by connecting an electronic apparatus on the system management side to a terminal on the user side via a communication line including the internet and, using system authentication information recorded on a recording medium included in the electronic apparatus on the system side and personal authentication information entered through a personal input operation on a user-operated terminal, for mutual authentication between the user and the electronic apparatus on the system management side that is accessed. In the mutual authentication system between the user and the system, two sets of authentication data are registered: one set is personal authentication data indicating the personal authentication information on the user and other set is server authentication date indicating the system authentication information.
    Type: Grant
    Filed: August 23, 2004
    Date of Patent: June 23, 2009
    Assignee: Mnemonic Security Limited
    Inventor: Hitoshi Kokumai
  • Publication number: 20060230435
    Abstract: An effective means for system authentication by a user. A system is characterized by connecting an electronic apparatus on the system management side to a terminal on the user side via a communication line including the internet and, using system authentication information recorded on a recording medium included in the electronic apparatus on the system side and personal authentication information entered through a personal input operation on a user-operated terminal, for mutual authentication between the user and the electronic apparatus on the system management side that is accessed. In the mutual authentication system between the user and the system, two sets of authentication data are registered: one set is personal authentication data indicating the personal authentication information on the user and other set is server authentication date indicating the system authentication information.
    Type: Application
    Filed: August 23, 2004
    Publication date: October 12, 2006
    Inventor: Hitoshi Kokumai
  • Publication number: 20060179488
    Abstract: An individual authentication method using a recording medium and an individual authentication system using a recording medium for facilitating a user to memorize the user information, making it difficult for a third person to set up for the user, reducing the user rejection ratio, and heightening the barrier For a third person to set up for the user. User information consisting of at lest one information unit which a user to be registered knows and non-user information consisting of at least one information unit which the user dose not know are registered in advance knows on the recording medium for authentication of the user so as to form the registration information. When performing authentication, a user candidate user his/her recording medium to indicate the registration information recorded directly or indirectly. The individual authentication method uses such a recording Medium that only when the user candidate selects the user information, the candidate can be authenticated.
    Type: Application
    Filed: July 15, 2003
    Publication date: August 10, 2006
    Inventors: Hitoshi Kokumai, Makoto Mihara
  • Publication number: 20040053654
    Abstract: Disclosed are protection of secret information including an encryption key and a system for reporting an emergency such as theft or confinement when secret information is accessed. Secret information includes a large quantity of decoy data and a piece/pieces of true and correct data mixed into the decoy data. The secret data including the decoy data and the true and correct data is two-dimensional code data the code of which is composed of groups of cells having different areas. The positions and order of storage of the true and correct data dispersedly mixed in the decoy data are determined and reported to the user. The user adds a predetermined alerting signal when inputting the password to tell that the user is under control of a third party. The system can detect the alerting signal and know that the user is in an abnormal state, performs normal identification procedures, and takes protection/preservation measures.
    Type: Application
    Filed: January 24, 2003
    Publication date: March 18, 2004
    Inventors: Hitoshi Kokumai, Ryuhei Masuno, Masayuki Kuriyama