Patents by Inventor Kenjiro Hori

Kenjiro Hori has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11777920
    Abstract: An authentication-target apparatus receives identification information, a password, and a challenge from an authentication apparatus, hashes the password, executes password authentication by reading out comparison information corresponding to the identification information and comparing the hashed password and the comparison information, generates a response based on the challenge in a case where the password authentication is successful, and transmits the response to the authentication apparatus. The authentication-target apparatus obtains an encrypted authentication calculation code, which is a stored program code corresponding to the identification information, decodes an executable authentication calculation code from the encrypted authentication calculation code using the password successful in the password authentication, and generates the response by executing the authentication calculation code by applying the challenge to the authentication calculation code.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: October 3, 2023
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kenjiro Hori
  • Patent number: 11507159
    Abstract: A verification device is configured to supply operation power to a verification target device in order to communicate with the verification target device, and perform verification of the verification target device. The verification device includes: a detection unit configured to detect a value of a current that flows in the verification device due to the operation power being supplied to the verification target device; a determination unit configured to determine whether or not the value of the current is greater than a threshold value; and a verification unit configured to verify authenticity of the verification target device according to whether or not the value of the current is greater than the threshold value.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: November 22, 2022
    Assignee: CANON KABUSHIKI KAISHA
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Publication number: 20220368543
    Abstract: An authentication system for authenticating an authentication-target apparatus by transmitting challenge data from an authenticating apparatus to the authentication-target apparatus and transmitting response data from the authentication-target apparatus to the authenticating apparatus. The authentication-target apparatus updates ae secret key and an encrypted original key stored in a memory using a new secret key and a new encrypted original key, derives an authentication key based on an original key, and generates the response data based on a challenge data received from the authenticating apparatus and the authentication key. The authentication apparatus derives an authentication key based on identification information of the authentication-target apparatus and an authentication original key, generates response data for verification based on the challenge data and the authentication key, and obtains an authentication result.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 17, 2022
    Inventor: Kenjiro Hori
  • Patent number: 11296896
    Abstract: A target sends ID of a key table. The apparatus receives the ID. The apparatus sends ID of an authentication table to the target. The apparatus sends a challenge corresponding to a pair of the ID of the key table and the ID of the authentication table, to the target. The target obtains, from the key table, a key corresponding to a pair of the ID of the key table and the ID of the authentication table. The target generates a response from the challenge and the key. The target sends the response to the apparatus. The apparatus obtains, from the authentication table, a response corresponding to a pair of the ID of the key table and the ID of the authentication table. The apparatus authenticates the target based on the responses.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: April 5, 2022
    Assignee: Canon Kabushiki Kaisha
    Inventors: Ichiro Iijima, Kenjiro Hori
  • Patent number: 11270172
    Abstract: An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: March 8, 2022
    Assignee: Canon Kabushiki Kaisha
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Publication number: 20210281556
    Abstract: An authentication-target apparatus receives identification information, a password, and a challenge from an authentication apparatus, hashes the password, executes password authentication by reading out comparison information corresponding to the identification information and comparing the hashed password and the comparison information, generates a response based on the challenge in a case where the password authentication is successful, and transmits the response to the authentication apparatus. The authentication-target apparatus obtains an encrypted authentication calculation code, which is a stored program code corresponding to the identification information, decodes an executable authentication calculation code from the encrypted authentication calculation code using the password successful in the password authentication, and generates the response by executing the authentication calculation code by applying the challenge to the authentication calculation code.
    Type: Application
    Filed: March 4, 2021
    Publication date: September 9, 2021
    Inventor: Kenjiro Hori
  • Patent number: 11101972
    Abstract: A processing unit processes an input signal from an external apparatus and includes a first terminal to which a reference voltage is input from the external apparatus, a second terminal to which a first pulse signal having a first frequency is input from the external apparatus, and a control portion to process the input signal. A memory stores data to be transmitted to the external apparatus, and a clock generating unit generates a clock signal having a higher frequency than the first frequency of the first pulse signal. To transmit a data signal to the external apparatus from the processing unit, the control portion switches a load between the first terminal and the second terminal based on the data stored in the memory during a period in which a second pulse signal having a second frequency lower than the first frequency is input from the external apparatus.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: August 24, 2021
    Assignee: CANON KABUSHIKI KAISHA
    Inventors: Hirotaka Ittogi, Ichiro Iijima, Kenjiro Hori
  • Patent number: 10965451
    Abstract: An authentication method includes: at a first device, selecting an original key in which a first identifier has a first value and a second identifier has a second value from m original keys and generating an authentication key based on the selected original key and the authentication identifier; at a second device, selecting an authentication key generated from the original key in which the first identifier has the first value and the second identifier has the second value from n authentication keys, generating response data based on challenge data and the authentication key, and notifying the generated response data to the first device; at the first device, generating verification data based on the challenge data and the authentication key, and authenticating the authentication target device by comparing the verification data with the response data.
    Type: Grant
    Filed: October 23, 2019
    Date of Patent: March 30, 2021
    Assignee: Canon Kabushiki Kaisha
    Inventors: Ichiro Iijima, Kenjiro Hori, Hirotaka Ittogi
  • Patent number: 10833877
    Abstract: A method of authenticating a target apparatus by an authentication apparatus that holds a first original key out of a plurality of original keys, and an identifier of the first original key, the target apparatus holding a first value and a plurality of derived keys generated by the plurality of original keys and the first value as inputs to a one-way function, the method includes: the target apparatus selecting a selected key from the plurality of derived keys based on the identifier and generating authentication data based on challenge data and a first generated key based on the selected key; and the authentication apparatus generating an authentication key by the first original key and the first value using the one-way function and generating comparison data based on the challenge data and a second generated key based on the authentication key.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: November 10, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventors: Hirotaka Ittogi, Kenjiro Hori, Tsutomu Ishida
  • Publication number: 20200136817
    Abstract: An authentication method includes: at a first device, selecting an original key in which a first identifier has a first value and a second identifier has a second value from m original keys and generating an authentication key based on the selected original key and the authentication identifier; at a second device, selecting an authentication key generated from the original key in which the first identifier has the first value and the second identifier has the second value from n authentication keys, generating response data based on challenge data and the authentication key, and notifying the generated response data to the first device; at the first device, generating verification data based on the challenge data and the authentication key, and authenticating the authentication target device by comparing the verification data with the response data.
    Type: Application
    Filed: October 23, 2019
    Publication date: April 30, 2020
    Inventors: Ichiro Iijima, Kenjiro Hori, Hirotaka Ittogi
  • Publication number: 20200081509
    Abstract: A verification device is configured to supply operation power to a verification target device in order to communicate with the verification target device, and perform verification of the verification target device. The verification device includes: a detection unit configured to detect a value of a current that flows in the verification device due to the operation power being supplied to the verification target device; a determination unit configured to determine whether or not the value of the current is greater than a threshold value; and a verification unit configured to verify authenticity of the verification target device according to whether or not the value of the current is greater than the threshold value.
    Type: Application
    Filed: November 13, 2019
    Publication date: March 12, 2020
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Publication number: 20200050909
    Abstract: An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data.
    Type: Application
    Filed: October 21, 2019
    Publication date: February 13, 2020
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Publication number: 20200021424
    Abstract: A processing unit processes an input signal from an external apparatus and includes a first terminal to which a reference voltage is input from the external apparatus, a second terminal to which a first pulse signal having a first frequency is input from the external apparatus, and a control portion to process the input signal. A memory stores data to be transmitted to the external apparatus, and a clock generating unit generates a clock signal having a higher frequency than the first frequency of the first pulse signal. To transmit a data signal to the external apparatus from the processing unit, the control portion switches a load between the first terminal and the second terminal based on the data stored in the memory during a period in which a second pulse signal having a second frequency lower than the first frequency is input from the external apparatus.
    Type: Application
    Filed: September 24, 2019
    Publication date: January 16, 2020
    Inventors: Hirotaka Ittogi, Ichiro Iijima, Kenjiro Hori
  • Patent number: 10528107
    Abstract: A verification device is configured to supply operation power to a verification target device in order to communicate with the verification target device, and perform verification of the verification target device. The verification device includes: a detection unit configured to detect a value of a current that flows in the verification device due to the operation power being supplied to the verification target device; a determination unit configured to determine whether or not the value of the current is greater than a threshold value; and a verification unit configured to verify authenticity of the verification target device according to whether or not the value of the current is greater than the threshold value.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: January 7, 2020
    Assignee: CANON KABUSHIKI KAISHA
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Patent number: 10482358
    Abstract: An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: November 19, 2019
    Assignee: Canon Kabushiki Kaisha
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Patent number: 10469243
    Abstract: A communication apparatus includes a first terminal that receives a reference voltage, a second terminal that receives a pulse signal, and at least one processor to execute instructions. The instructions are executed to generate a clock signal that has a frequency higher than a frequency of the received pulse signal, count a number of pulses of the clock signal and determine a count value counted during a first cycle that is a cycle of the pulse signal to the second terminal, and, during a period of data transmission, increase or decrease an electric current that flows between the communication apparatus and the external apparatus according to a data value of data to be transmitted to the external apparatus. Data is transmitted to the external apparatus at least once during the first cycle, and data switch timing during the first cycle is based on the count value.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: November 5, 2019
    Assignee: CANON KABUSHIKI KAISHA
    Inventors: Hirotaka Ittogi, Ichiro Iijima, Kenjiro Hori
  • Publication number: 20190305969
    Abstract: A target sends ID of a key table. The apparatus receives the ID. The apparatus sends ID of an authentication table to the target. The apparatus sends a challenge corresponding to a pair of the ID of the key table and the ID of the authentication table, to the target. The target obtains, from the key table, a key corresponding to a pair of the ID of the key table and the ID of the authentication table. The target generates a response from the challenge and the key. The target sends the response to the apparatus. The apparatus obtains, from the authentication table, a response corresponding to a pair of the ID of the key table and the ID of the authentication table. The apparatus authenticates the target based on the responses.
    Type: Application
    Filed: March 22, 2019
    Publication date: October 3, 2019
    Inventors: Ichiro Iijima, Kenjiro Hori
  • Publication number: 20190116049
    Abstract: A method of authenticating a target apparatus by an authentication apparatus that holds a first original key out of a plurality of original keys, and an identifier of the first original key, the target apparatus holding a first value and a plurality of derived keys generated by the plurality of original keys and the first value as inputs to a one-way function, the method includes: the target apparatus selecting a selected key from the plurality of derived keys based on the identifier and generating authentication data based on challenge data and a first generated key based on the selected key; and the authentication apparatus generating an authentication key by the first original key and the first value using the one-way function and generating comparison data based on the challenge data and a second generated key based on the authentication key.
    Type: Application
    Filed: October 10, 2018
    Publication date: April 18, 2019
    Inventors: Hirotaka Ittogi, Kenjiro Hori, Tsutomu Ishida
  • Publication number: 20180316485
    Abstract: A communication apparatus includes: a terminal to which a pulse signal is input from an external apparatus; an acquiring unit configured to acquire a count value during a first cycle that is a cycle of the pulse signal; and a transmitting unit configured to, during a period of data transmission, increase or decrease an electric current that flows between the communication apparatus and the external apparatus according to a data value of data to be transmitted. The transmitting unit is further configured to perform switching on the data to be transmitted at least once during the first cycle, and determine a data switch timing during the first cycle based on the count value.
    Type: Application
    Filed: April 24, 2018
    Publication date: November 1, 2018
    Inventors: Hirotaka Ittogi, Ichiro Iijima, Kenjiro Hori
  • Publication number: 20170293829
    Abstract: An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data.
    Type: Application
    Filed: March 17, 2017
    Publication date: October 12, 2017
    Inventors: Hirotaka Ittogi, Kenjiro Hori