Patents by Inventor Keiichi Teramoto

Keiichi Teramoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050166069
    Abstract: Under a multi-task environment, a tamper resistant microprocessor saves a context information for one program whose execution is to be interrupted, where the context information contains information indicating an execution state of that one program and the execution code encryption key of that one program. An execution of that one program can be restarted by recovering the execution state of that one program from the saved context information. The context information can be encrypted by using the public key of the microprocessor, and then decrypted by using the secret key of the microprocessor.
    Type: Application
    Filed: March 4, 2005
    Publication date: July 28, 2005
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Keiichi Teramoto, Takeshi Saito, Kenji Shirakawa, Kensaku Fujimoto
  • Patent number: 6885643
    Abstract: A wireless network system capable of controlling highly efficient transfer of AV data by an upper application, using information indicating a wireless link condition that varies dynamically is disclosed. In this wireless network system, a wireless terminal and a wire gateway apparatus each store collected wireless link condition information in a descriptor. An upper application on the wireless terminal reads the descriptor at said terminal device and obtains wireless LAN link condition information. The wireless gateway apparatus makes notification to a wireless terminal of a VTR, for example, that actually exists in a 1394 terminal as if it existed as a sub-unit in the local terminal device. The wireless terminal accesses the collected wireless link condition information and selects a AV/C command to be sent to the VTR sub-unit of the wireless gateway apparatus. The wireless terminal transfers the play command for playback to the wireless gateway apparatus.
    Type: Grant
    Filed: September 28, 2000
    Date of Patent: April 26, 2005
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Keiichi Teramoto, Yoshiaki Takabatake, Junko Ami, Kensaku Fujimoto
  • Publication number: 20050047388
    Abstract: A radio terminal or gateway capable of executing the AV/C protocol on the datalink protocol which starts communications after setting up a logical channel on a radio network is disclosed. The radio terminal or gateway transfers data packets according to the stored correspondence information among the protocol identifier, the channel identifier that is set up for the radio terminal or gateway, and the channel identifier that is set up for a correspondent radio terminal or gateway, where the correspondence information is obtained through an exchange of signaling packets containing the channel identifier indicating a logical channel that is set up for transferring the data packets and the protocol identifier indicating the AV control protocol.
    Type: Application
    Filed: October 13, 2004
    Publication date: March 3, 2005
    Applicant: KABUSHHIKI KAISHA TOSHIBA
    Inventors: Yoshiaki Takabatake, Keiichi Teramoto, Kensaku Fujimoto
  • Publication number: 20050047414
    Abstract: A communication control apparatus includes: an identification information sending unit configured to send communication identification information used by an outdoor communication control apparatus when the outdoor communication control apparatus accesses; and a connection determination unit configured to determine whether or not the outdoor communication control apparatus connects within a predetermined time after the communication identification information is sent, and to permit connection for the outdoor communication control apparatus when the outdoor communication control apparatus connects within the predetermined time.
    Type: Application
    Filed: August 23, 2004
    Publication date: March 3, 2005
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yoshiki Terashima, Hiroyuki Aizu, Keiichi Teramoto
  • Patent number: 6829228
    Abstract: A radio terminal or gateway capable of executing the AV/C protocol on the datalink protocol which starts communications after setting up a logical channel on a radio network is disclosed. The radio terminal or gateway transfers data packets according to the stored correspondence information among the protocol identifier, the channel identifier that is set up for the radio terminal or gateway, and the channel identifier that is set up for a correspondent radio terminal or gateway, where the correspondence information is obtained through an exchange of signaling packets containing the channel identifier indicating a logical channel that is set up for transferring the data packets and the protocol identifier indicating the AV control protocol.
    Type: Grant
    Filed: December 27, 2000
    Date of Patent: December 7, 2004
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshiaki Takabatake, Keiichi Teramoto, Kensaku Fujimoto
  • Publication number: 20040151132
    Abstract: A communication apparatus, which communicates with a host unit based on polling method, includes a control receiving unit that receives a control information to be transferred to the host unit from a user terminal, a request receiving unit that receives a request from the host unit to transfer the control information to the host unit, and a transmitting unit that transfers the control information to the host unit as a response to the request, provided that the control receiving unit receives the control information after the request receiving unit receives the request.
    Type: Application
    Filed: December 30, 2003
    Publication date: August 5, 2004
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Yoshiki Terashima, Keiichi Teramoto, Yuzo Tamada, Tomohiro Hiruma
  • Publication number: 20040014475
    Abstract: The other communication devices are prohibited to transmit the address initialization request for a prescribed period of time since one communication device transmitted the address initialization request for an address managed by a control protocol, so that the conflict of the initialization requests for the same address will not occur and the problem of assigning the address in overlap to the communication devices will not arise. Also, the other communication devices are prohibited to transmit the the address server detection request packet for a prescribed period of time since one communication device transmitted the address server detection request packet, so that the conflict on the network by a plurality of address server detection requests will not occur, and it is possible to determine the MAC address server uniquely.
    Type: Application
    Filed: July 9, 2003
    Publication date: January 22, 2004
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Takeshi Saito, Keiichi Teramoto, Hiroyuki Aizu, Shuichi Kyuma, Yoshiki Terashima
  • Publication number: 20040010327
    Abstract: A communication control device connected to a home network and an external network is formed by a control unit configured to give prescribed commands to home electronics devices through the home network; a Web server unit configured to provide an interface in a form of a Web screen for controlling one home electronics device requested by a terminal device, to the terminal device on the home network, and give a prescribed command for the one home electronics device given from the terminal device through the interface in a form of the Web screen, to the control unit; and an acquisition unit configured to automatically acquire a latest version of a file necessary in producing the interface in a form of the Web screen for controlling each home electronics device, from a prescribed server device corresponding to each home electronics device, through the external network.
    Type: Application
    Filed: June 11, 2003
    Publication date: January 15, 2004
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yoshiki Terashima, Keiichi Teramoto, Takeshi Saito, Yuzo Tamada
  • Publication number: 20030218629
    Abstract: An apparatus and method for processing a Web page is disclosed. A Web processing unit receives a first Web page from a Web server and displays the first Web page on a screen. The Web processing unit acquires a communication program identified by the first Web page. An external state is monitored and thereby operation information responsive to the external state is generated. The Web processing unit executes the communication program to change the first Web page displayed on the screen to a second Web page according to the operation information.
    Type: Application
    Filed: April 14, 2003
    Publication date: November 27, 2003
    Inventors: Yoshiki Terashima, Keiichi Teramoto, Takeshi Saito, Yuzo Tamada
  • Publication number: 20030198349
    Abstract: A communication device that stores a secret key to be used in an authentication and an encryption of communication information with respect to a specific communication device, and carries out communications with the specific communication device, by using the stored secret key to be used with respect to the specific communication device, is equipped with a unit for updating a specific secret key, when an update request received from another communication device is requesting a secret key updating, according to an update content given along with the update request which indicates the specific secret key.
    Type: Application
    Filed: April 17, 2003
    Publication date: October 23, 2003
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Hiroyuki Aizu, Takaharu Yamamoto, Takeshi Saito, Keiichi Teramoto
  • Publication number: 20030126458
    Abstract: In the method for sharing encrypted data region among two or more processes on a tamper resistant processor, one process creates the encrypted data region to be shared according to the common key generated as a result of the safe key exchange, and the other process maps that region to its own address space or process space. The address information of the shared encrypted data region and the common key of each process are set in relation in the encrypted attribute register inside the tamper resistant processor, so that it is possible to share the encrypted data region safely.
    Type: Application
    Filed: December 28, 2001
    Publication date: July 3, 2003
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Keiichi Teramoto, Mikio Hashimoto, Kenji Shirakawa, Satoshi Ozaki, Kensaku Fujimoto
  • Publication number: 20030093542
    Abstract: In a communication device for carrying out communications according to an Echonet protocol on a network of a prescribed network layer protocol, a prescribed bit sequence value of a network layer address or a datalink layer address of the communication device is set as a candidate for an Echonet address to be used in the Echonet protocol. Then, an inquiry packet for inquiring whether the prescribed bit sequence value is identical to the Echonet address used by each other communication device or not is transmitted, and the prescribed bit sequence value is determined as the Echonet address of the communication device when the prescribed bit sequence value is judged as not identical to any of Echonet addresses used by the other communication devices.
    Type: Application
    Filed: October 30, 2002
    Publication date: May 15, 2003
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Takeshi Saito, Keiichi Teramoto, Nobuyuki Monma, Hiroyuki Aizu, Shuichi Kyuma
  • Publication number: 20030061380
    Abstract: A digital home electronic device is provided with a storing unit for storing correspondence data formed by corresponding sets of commands corresponding to classification informations for classifying a plurality of commands according to prescribed criteria, and a target device information indicating a target device which enables the digital home electronic device to execute the commands, and a command execution judgement unit for judging whether or not to execute a received command, according to the received command, a source information indicating a device which is a source of the received command, and the correspondence data, by judging whether the source information and the target device information corresponding to the received command coincide or not.
    Type: Application
    Filed: September 27, 2002
    Publication date: March 27, 2003
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Takeshi Saito, Keiichi Teramoto, Nobuyuki Monma, Hiroyuki Aizu, Shuichi Kyuma
  • Publication number: 20030033537
    Abstract: In a tamper resistant microprocessor, a processor temporary key in a form of an encryption key of a secret key cryptosystem is generated at every occasion of an initialization of the microprocessor, according to a random number that is generated according to parameters used inside the microprocessor and that is different for different microprocessors. Then, the context is encrypted by using the processor temporary key and saved into the external memory, and recovered from the external memory and decrypted by using the processor temporary key.
    Type: Application
    Filed: August 8, 2002
    Publication date: February 13, 2003
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Kensaku Fujimoto, Kenji Shirakawa, Mikio Hashimoto, Keiichi Teramoto, Satoshi Ozaki
  • Publication number: 20020169886
    Abstract: In order to make it possible to enable the operation of a control protocol such as Echonet on networks such Bluetooth, IP, etc., a communication control device carries out a routing processing according to an address table that stores in correspondence a Bluetooth address and a slave identifier of a Bluetooth, and an Echonet address of an Echonet protocol, for example. Also, a communication device carries out a transmission/reception processing of an IP packet according to an address table that stores in correspondence an IP address of the Internet protocol and an Echonet address of the Echonet protocol, for example.
    Type: Application
    Filed: April 19, 2002
    Publication date: November 14, 2002
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Takeshi Saito, Keiichi Teramoto, Nobuyuki Monma, Hiroyuki Aizu, Shuichi Kyuma
  • Publication number: 20020101995
    Abstract: In a microprocessor that internally has a microprocessor specific secret key, a key management unit is provided to carry out a key registration for reading out from an external memory a distribution key that is obtained in advance by encrypting the instruction key by using a public key corresponding to the secret key, decrypting the distribution key by using the secret key to obtain the instruction key, and registering the instruction key in correspondence to a specific program identifier for identifying the program into a key table, and to notify a completion of the key registration to the processor core asynchronously by interruption when the key registration is completed.
    Type: Application
    Filed: January 31, 2002
    Publication date: August 1, 2002
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Kenji Shirakawa, Keiichi Teramoto, Kensaku Fujimoto, Satoshi Ozaki
  • Publication number: 20020053024
    Abstract: In a program distribution system including a source file sending device, an encrypted program distribution device and an execution file receiving device, which are interconnected through a network, the encrypted program distribution device examines the source file received from the source file sending device, and when the source file passes an examination, an execution file of the program is generated from the source file, a public key which is either unique to an execution file receiving device or unique to a processor of the execution file receiving device is received from the execution file receiving device through the network, at least a part of the execution file is encrypted by using the public key, and the execution file is sent to the execution file receiving device.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 2, 2002
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Kenji Shirakawa, Yoshimitsu Shimojo, Keiichi Teramoto, Kensaku Fujimoto, Satoshi Ozaki
  • Publication number: 20020051536
    Abstract: In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
    Type: Application
    Filed: October 30, 2001
    Publication date: May 2, 2002
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Kenji Shirakawa, Mikio Hashimoto, Keiichi Teramoto, Satoshi Ozaki, Kensaku Fujimoto
  • Publication number: 20010018736
    Abstract: Under a multi-task environment, a tamper resistant microprocessor saves a context information for one program whose execution is to be interrupted, where the context information contains information indicating an execution state of that one program and the execution code encryption key of that one program. An execution of that one program can be restarted by recovering the execution state of that one program from the saved context information. The context information can be encrypted by using the public key of the microprocessor, and then decrypted by using the secret key of the microprocessor.
    Type: Application
    Filed: February 13, 2001
    Publication date: August 30, 2001
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Keiichi Teramoto, Takeshi Saito, Kenji Shirakawa, Kensaku Fujimoto
  • Publication number: 20010014157
    Abstract: A scheme for distributing executable programs through a network from a program distribution device to a client device having a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance is disclosed. In this scheme, a first communication path is set up between the program distribution device and the client device, and a second communication path directly connecting the program distribution device and the tamper resistant processor is set up on the first communication path. Then, the encrypted program is transmitted from the program distribution device to the tamper resistant processor through the second communication path.
    Type: Application
    Filed: February 13, 2001
    Publication date: August 16, 2001
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Kensaku Fujimoto, Kenji Shirakawa, Keiichi Teramoto, Takeshi Saito