Patents by Inventor Jun Kogure
Jun Kogure has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210224925Abstract: A determination method performed by a first apparatus corresponding to a first user, the determination method includes acquiring, from a second apparatus corresponding to a second user which is different from the first user, first aggregated information in which identification information for identifying each user having a specific relationship with each user having a specific relationship with the first user is summarized; acquiring, from the second apparatus, second aggregated information in which identification information for identifying each user having a specific relationship with the second user is summarized; identifying a result which indicates a specific relationship between the first user and the second user based on the acquired first aggregated information and the acquired second aggregated information; and outputting the identified result.Type: ApplicationFiled: December 8, 2020Publication date: July 22, 2021Applicant: FUJITSU LIMITEDInventors: Yasushi Takahashi, Dai YAMAMOTO, Jun KOGURE, Takeshi Miyamae, Takuya SAKAMOTO
-
Publication number: 20200042513Abstract: A transaction control device includes a memory, and a processor configured to perform prediction of a first confirmation time at which first one or more transactions are confirmed in a first blockchain, and prediction of a second confirmation time at which second one or more transactions are confirmed in a second blockchain, perform, based on the predicted first confirmation time and the predicted second confirmation time, determination of an execution order of a plurality of transactions to be executed in the first blockchain and the second blockchain, and execute, based on the determined execution order, the plurality of transactions in the first blockchain and the second blockchain.Type: ApplicationFiled: July 22, 2019Publication date: February 6, 2020Applicant: FUJITSU LIMITEDInventors: Tsunekazu SHIMA, Jun KOGURE
-
Publication number: 20190340169Abstract: A blockchain management method in which a process is executed by a computer, the process includes: generating a first hash of data included in a partial block obtained by excluding a second area from a first block of a blockchain, the first block including a first area in which a data change is prohibited and the second area in which the data change is permitted; generating a second hash of data included in the first block; and adding the first hash and the second hash to a second block of the blockchain, the second block being added next to the first block and including a first area in which a data change is prohibited and a second area in which the data change is permitted.Type: ApplicationFiled: July 15, 2019Publication date: November 7, 2019Applicant: FUJITSU LIMITEDInventors: Tsunekazu SHIMA, Jun KOGURE
-
Patent number: 10020933Abstract: A memory stores therein first cryptographic information that represents an encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector. From a terminal that receives second cryptographic information that represents an encrypted monomial obtained by encrypting a monomial generated by use of a random number, a receiver receives third cryptographic information that represents an encrypted result obtained by encrypting a result of a multiplication of a second polynomial that corresponds to a second vector by the monomial. A processor generates an encrypted polynomial that includes a result of an operation of the first vector and the second vector by use of the first cryptographic information, the third cryptographic information, and information that represents the monomial. An output interface outputs fourth cryptographic information that represents the encrypted polynomial generated by the generator.Type: GrantFiled: November 6, 2015Date of Patent: July 10, 2018Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Publication number: 20180158058Abstract: An apparatus determines whether public key information on a public key used by a transaction made between nodes coupled to each other via a network is stored in a distributed database, and determines whether challenge response authentication using the public key is successful between the nodes between which the transaction is made. When the public key information is stored in the distributed database and the challenge response authentication is successful, the apparatus stores information on the transaction using the public key in the distributed database.Type: ApplicationFiled: December 1, 2017Publication date: June 7, 2018Applicant: FUJITSU LIMITEDInventor: Jun KOGURE
-
Patent number: 9722782Abstract: An information processing method according to an embodiment causes a computer to execute a process of receiving an input of matching information encrypted with an encryption algorithm allowing a Hamming distance to be calculated with the matching information encrypted. The information processing method also causes the computer to execute a process of calculating a first Hamming distance between the received matching information and registered information that is different from encrypted registered information of a user, the registered information being encrypted with the encryption algorithm, using a processor. The information processing method also causes the computer to execute a process of determining legitimacy of the matching information based on whether the calculated first Hamming distance falls into a distance distribution representing matches with another person that is different from the user, using a processor.Type: GrantFiled: November 3, 2015Date of Patent: August 1, 2017Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Patent number: 9596083Abstract: A matching method includes: generating a first numerical vector; generating a second numerical vector by squaring each component of the first numerical vector and a third numerical vector by cubing each component of the first numerical vector; generating first to third polynomials by executing polynomial transformation of the first to third numerical vectors; encrypting the first to third polynomials by a homomorphic encryption scheme; executing a predetermined operation while keeping data used in the predetermined operation encrypted, by using fourth to sixth polynomials obtained by the polynomial transformation and the homomorphic encryption of fourth to sixth numerical vectors, wherein the fourth numerical vector is generated by numerically vectorizing second text, the fifth numerical vector is generated by squaring each component of the fourth numerical vector, and the sixth numerical vector is generated by cubing each component of the fourth numerical vector; and decrypting a result of the predeterminedType: GrantFiled: April 27, 2015Date of Patent: March 14, 2017Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Patent number: 9531539Abstract: A non-transitory computer-readable recording medium stores an information processing program that causes a computer to execute a process including, generating feature information based on organism information of a user; calculating a first cryptogram based on a logical operation of the feature information generated and a random number; and encrypting the first cryptogram into a second cryptogram by using a cryptographic algorithm capable of calculating a Hamming distance in an encrypted state.Type: GrantFiled: December 19, 2014Date of Patent: December 27, 2016Assignee: FUJITSU LIMITEDInventors: Takeshi Shimoyama, Masaya Yasuda, Jun Kogure
-
Patent number: 9509493Abstract: An encrypted first polynomial that is obtained by encrypting, in a homomorphic encryption method that handles a polynomial processing, a first polynomial, is received from another computer. The first polynomial is represented by using, as coefficients, components of a first binary vector generated from first data in first order that is either ascending order or descending order with respect to degree of the first polynomial. Then, a predetermined processing in an encrypted text space is performed by using the encrypted first polynomial and an encrypted second polynomial that is obtained by encrypting a second polynomial in the homomorphic encryption method. The second polynomial is represented by using, as coefficients, components of a second binary vector generated from second data in second order that is different from the first order with respect to degree of the second polynomial. Then, a result of the predetermined processing is sent back.Type: GrantFiled: July 30, 2014Date of Patent: November 29, 2016Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Patent number: 9473302Abstract: A ciphertext processing device acquires a first polynomial into which first text data is converted with a first order and which is encrypted with a first public key and a first square-value polynomial into which square-value vector data of each component of the first text data is converted with the first order and which is encrypted with the first public key. The ciphertext processing device acquires a second polynomial into which second text data is converted with a second order and which is encrypted with the first public key and a second square-value polynomial into which square-value vector data of each component of the second text data is converted with the second order and which is encrypted with the first public key. The ciphertext processing device determines whether the second text data is included in the first text data, using the each polynomial.Type: GrantFiled: March 2, 2015Date of Patent: October 18, 2016Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Patent number: 9438423Abstract: An encryption server receives encrypted data which is encrypted by using a public key of a first user and which is added with auxiliary information calculated using a combination of a secret key and the public key of the first user and data to be encrypted. Then, the encryption server generates re-encrypted data obtained by re-encrypting the encrypted data using the auxiliary information added to the encrypted data, a public key of a second user, and encrypted information related to the secret key of the first user which is encrypted with the public key of the second user.Type: GrantFiled: February 27, 2015Date of Patent: September 6, 2016Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Publication number: 20160182226Abstract: An information processing method according to an embodiment causes a computer to execute a process of receiving an input of matching information encrypted with an encryption algorithm allowing a Hamming distance to be calculated with the matching information encrypted. The information processing method also causes the computer to execute a process of calculating a first Hamming distance between the received matching information and registered information that is different from encrypted registered information of a user, the registered information being encrypted with the encryption algorithm, using a processor. The information processing method also causes the computer to execute a process of determining legitimacy of the matching information based on whether the calculated first Hamming distance falls into a distance distribution representing matches with another person that is different from the user, using a processor.Type: ApplicationFiled: November 3, 2015Publication date: June 23, 2016Applicant: FUJITSU LIMITEDInventors: MASAYA YASUDA, Takeshi Shimoyama, Jun KOGURE
-
Publication number: 20160173275Abstract: A memory stores therein first cryptographic information that represents an encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector. From a terminal that receives second cryptographic information that represents an encrypted monomial obtained by encrypting a monomial generated by use of a random number, a receiver receives third cryptographic information that represents an encrypted result obtained by encrypting a result of a multiplication of a second polynomial that corresponds to a second vector by the monomial. A processor generates an encrypted polynomial that includes a result of an operation of the first vector and the second vector by use of the first cryptographic information, the third cryptographic information, and information that represents the monomial. An output interface outputs fourth cryptographic information that represents the encrypted polynomial generated by the generator.Type: ApplicationFiled: November 6, 2015Publication date: June 16, 2016Applicant: FUJITSU LIMITEDInventors: MASAYA YASUDA, Takeshi Shimoyama, Jun KOGURE
-
Publication number: 20150318991Abstract: A matching method includes: generating a first numerical vector; generating a second numerical vector by squaring each component of the first numerical vector and a third numerical vector by cubing each component of the first numerical vector; generating first to third polynomials by executing polynomial transformation of the first to third numerical vectors; encrypting the first to third polynomials by a homomorphic encryption scheme; executing a predetermined operation while keeping data used in the predetermined operation encrypted, by using fourth to sixth polynomials obtained by the polynomial transformation and the homomorphic encryption of fourth to sixth numerical vectors, wherein the fourth numerical vector is generated by numerically vectorizing second text, the fifth numerical vector is generated by squaring each component of the fourth numerical vector, and the sixth numerical vector is generated by cubing each component of the fourth numerical vector; and decrypting a result of the predeterminedType: ApplicationFiled: April 27, 2015Publication date: November 5, 2015Inventors: MASAYA YASUDA, Takeshi Shimoyama, Jun KOGURE
-
Patent number: 9166785Abstract: A device that uses homomorphic encryption is disclosed. The device includes a public key data generator configured to generate public key data, and a secret key data generator configured to generate secret key data that includes, as a secret key, an integer that is an element of a matrix obtained as a product of the first public key matrix element and an inverse matrix of the secret key matrix and that is not a multiple of the plain text space size.Type: GrantFiled: December 12, 2013Date of Patent: October 20, 2015Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Publication number: 20150280914Abstract: A ciphertext processing device acquires a first polynomial into which first text data is converted with a first order and which is encrypted with a first public key and a first square-value polynomial into which square-value vector data of each component of the first text data is converted with the first order and which is encrypted with the first public key. The ciphertext processing device acquires a second polynomial into which second text data is converted with a second order and which is encrypted with the first public key and a second square-value polynomial into which square-value vector data of each component of the second text data is converted with the second order and which is encrypted with the first public key. The ciphertext processing device determines whether the second text data is included in the first text data, using the each polynomial.Type: ApplicationFiled: March 2, 2015Publication date: October 1, 2015Inventors: Masaya YASUDA, Takeshi SHIMOYAMA, Jun KOGURE
-
Publication number: 20150270964Abstract: An encryption server receives encrypted data which is encrypted by using a public key of a first user and which is added with auxiliary information calculated using a combination of a secret key and the public key of the first user and data to be encrypted. Then, the encryption server generates re-encrypted data obtained by re-encrypting the encrypted data using the auxiliary information added to the encrypted data, a public key of a second user, and encrypted information related to the secret key of the first user which is encrypted with the public key of the second user.Type: ApplicationFiled: February 27, 2015Publication date: September 24, 2015Inventors: Masaya YASUDA, Takeshi SHIMOYAMA, Jun KOGURE
-
Patent number: 9098107Abstract: A proximity determination method includes: collecting a first concealed vector based on a linear combination of a row vector of a key matrix, first numerical information, and a first random number, the key matrix being generated by adding a random number vector as a last column to a matrix in which a threshold for determining a proximity range is a diagonal element; collecting a second concealed vector based on the linear combination, second numerical information, and a second random number; calculating a remainder vector, the remainder vector being a remainder obtained from a difference between the collected first concealed vector and the second concealed vector when the key matrix is used as a modulus; and determining whether the first numerical information and the second numerical information belong to the proximity range, based on the calculated remainder vector.Type: GrantFiled: October 8, 2013Date of Patent: August 4, 2015Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure
-
Patent number: 9100185Abstract: A device that uses homomorphic encryption is disclosed. The device obtains a first encrypted polynomial, a second encrypted polynomial, a first encrypted weight, and a second encrypted weight by respectively encrypting a first polynomial, a second polynomial, a first weight, and a second weight by using a homomorphic encryption scheme, and obtains an encrypted secure distance corresponding to encryption of a secure distance.Type: GrantFiled: December 12, 2013Date of Patent: August 4, 2015Assignee: FUJITSU LIMITEDInventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
-
Publication number: 20150207630Abstract: A non-transitory computer-readable recording medium stores an information processing program that causes a computer to execute a process including, generating feature information based on organism information of a user; calculating a first cryptogram based on a logical operation of the feature information generated and a random number; and encrypting the first cryptogram into a second cryptogram by using a cryptographic algorithm capable of calculating a Hamming distance in an encrypted state.Type: ApplicationFiled: December 19, 2014Publication date: July 23, 2015Applicant: FUJITSU LIMITEDInventors: Takeshi Shimoyama, Masaya Yasuda, Jun Kogure