Patents by Inventor Kensaku Fujimoto

Kensaku Fujimoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7657760
    Abstract: In the method for sharing encrypted data region among two or more processes on a tamper resistant processor, one process creates the encrypted data region to be shared according to the common key generated as a result of the safe key exchange, and the other process maps that region to its own address space or process space. The address information of the shared encrypted data region and the common key of each process are set in relation in the encrypted attribute register inside the tamper resistant processor, so that it is possible to share the encrypted data region safely.
    Type: Grant
    Filed: October 3, 2006
    Date of Patent: February 2, 2010
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Keiichi Teramoto, Mikio Hashimoto, Kenji Shirakawa, Satoshi Ozaki, Kensaku Fujimoto
  • Publication number: 20090006864
    Abstract: A tamper resistant microprocessor has a task state table for assigning a task identifier to a task that can take a plurality of states, and storing a state of the task in correspondence to the task identifier; a task register for storing the task identifier of a currently executed task; an interface for reading a program stored in a form encrypted by using a program key at an external memory, in units of cache lines, when a request for the task is made; an encryption processing unit for generating decryption keys that are different for different cache lines, according to the program key, and decrypt a content read by the interface; a cache memory formed by a plurality of cache lines each having a tag, for storing the task identifier corresponding to a decryption key used in decrypting each cache line in the tag of each cache line; and an access check unit for comparing the task identifier stored in the tag of each cache line with a value of the task register, and discarding a content of each cache line when t
    Type: Application
    Filed: May 9, 2008
    Publication date: January 1, 2009
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Kensaku Fujimoto, Kenji Shirakawa
  • Patent number: 7424622
    Abstract: A tamper resistant microprocessor has a task state table for assigning a task identifier to a task that can take a plurality of states, and storing a state of the task in correspondence to the task identifier; a task register for storing the task identifier of a currently executed task; an interface for reading a program stored in a form encrypted by using a program key at an external memory, in units of cache lines, when a request for the task is made; an encryption processing unit for generating decryption keys that are different for different cache lines, according to the program key, and decrypt a content read by the interface; a cache memory formed by a plurality of cache lines each having a tag, for storing the task identifier corresponding to a decryption key used in decrypting each cache line in the tag of each cache line; and an access check unit for comparing the task identifier stored in the tag of each cache line with a value of the task register, and discarding a content of each cache line when t
    Type: Grant
    Filed: September 30, 2002
    Date of Patent: September 9, 2008
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Kensaku Fujimoto, Kenji Shirakawa
  • Patent number: 7353404
    Abstract: Under a multi-task environment, a tamper resistant microprocessor saves a context information for one program whose execution is to be interrupted, where the context information contains information indicating an execution state of that one program and the execution code encryption key of that one program. An execution of that one program can be restarted by recovering the execution state of that one program from the saved context information. The context information can be encrypted by using the public key of the microprocessor, and then decrypted by using the secret key of the microprocessor.
    Type: Grant
    Filed: March 4, 2005
    Date of Patent: April 1, 2008
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Keiichi Teramoto, Takeshi Saito, Kenji Shirakawa, Kensaku Fujimoto
  • Publication number: 20080046763
    Abstract: In the method for sharing encrypted data region among two or more processes on a tamper resistant processor, one process creates the encrypted data region to be shared according to the common key generated as a result of the safe key exchange, and the other process maps that region to its own address space or process space. The address information of the shared encrypted data region and the common key of each process are set in relation in the encrypted attribute register inside the tamper resistant processor, so that it is possible to share the encrypted data region safely.
    Type: Application
    Filed: October 3, 2006
    Publication date: February 21, 2008
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Keiichi TERAMOTO, Mikio Hashimoto, Kenji Shirakawa, Satoshi Ozaki, Kensaku Fujimoto
  • Patent number: 7270193
    Abstract: A scheme for distributing executable programs through a network from a program distribution device to a client device having a tamper resistant processor which is provided with a unique secret key and a unique public key corresponding to the unique secret key in advance is disclosed. In this scheme, a first communication path is set up between the program distribution device and the client device, and a second communication path directly connecting the program distribution device and the tamper resistant processor is set up on the first communication path. Then, the encrypted program is transmitted from the program distribution device to the tamper resistant processor through the second communication path.
    Type: Grant
    Filed: February 13, 2001
    Date of Patent: September 18, 2007
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Kensaku Fujimoto, Kenji Shirakawa, Keiichi Teramoto, Takeshi Saito
  • Patent number: 7219369
    Abstract: In an inner memory type tamper resistant microprocessor, a requested secret protection attribute requested for each access target memory page by a task is set and stored exclusively from other tasks, at a time of reading a program into memory pages and executing the program as the task, and a memory secret protection attribute is set and stored for each access target memory page by the task, at a time of executing the task. Then, an access to each access target memory page is refused when the requested secret protection attribute for each access target memory page and the memory secret protection attribute for each access target memory page do not coincide.
    Type: Grant
    Filed: March 20, 2003
    Date of Patent: May 15, 2007
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Kensaku Yamaguchi, Kenji Shirakawa, Kensaku Fujimoto
  • Patent number: 7136488
    Abstract: In a microprocessor that internally has a microprocessor specific secret key, a key management unit is provided to carry out a key registration for reading out from an external memory a distribution key that is obtained in advance by encrypting the instruction key by using a public key corresponding to the secret key, decrypting the distribution key by using the secret key to obtain the instruction key, and registering the instruction key in correspondence to a specific program identifier for identifying the program into a key table, and to notify a completion of the key registration to the processor core asynchronously by interruption when the key registration is completed.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: November 14, 2006
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Kenji Shirakawa, Keiichi Teramoto, Kensaku Fujimoto, Satoshi Ozaki
  • Patent number: 7065215
    Abstract: In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
    Type: Grant
    Filed: October 30, 2001
    Date of Patent: June 20, 2006
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Kenji Shirakawa, Mikio Hashimoto, Keiichi Teramoto, Satoshi Ozaki, Kensaku Fujimoto
  • Publication number: 20060126849
    Abstract: In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
    Type: Application
    Filed: January 20, 2006
    Publication date: June 15, 2006
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Kenji Shirakawa, Mikio Hashimoto, Keiichi Teramoto, Satoshi Ozaki, Kensaku Fujimoto
  • Publication number: 20060036733
    Abstract: According to some embodiments, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA Authentication Agent) and a DHCP (Dynamic Host Configuration Protocol) server, such as, e.g., for synchronization between the PANA SA state and the DHCP SA state, such as, e.g., maintaining synchronization when a connection is lost. In some embodiments, systems and methods for binding network bridge and network access authentication are also provided related to, inter alia, interactions between a PAA and a layer-2 switch, such as, e.g., for avoiding service thefts and the like (such as, e.g., MAC address and/or IP address spoofing) in the context of, e.g., the above. In some other embodiments, systems and methods for bootstrapping multicast security from network access authentication protocol are also provided related to, inter alia, key management for protected IP multicast streams, such as, e.g.
    Type: Application
    Filed: October 29, 2004
    Publication date: February 16, 2006
    Applicant: Toshiba America Research, Inc.
    Inventors: Kensaku Fujimoto, Yasuhiro Katsube, Yoshihiro Oba
  • Patent number: 6993005
    Abstract: A radio terminal or gateway capable of executing the AV/C protocol on the datalink protocol which starts communications after setting up a logical channel on a radio network is disclosed. The radio terminal or gateway transfers data packets according to the stored correspondence information among the protocol identifier, the channel identifier that is set up for the radio terminal or gateway, and the channel identifier that is set up for a correspondent radio terminal or gateway, where the correspondence information is obtained through an exchange of signaling packets containing the channel identifier indicating a logical channel that is set up for transferring the data packets and the protocol identifier indicating the AV control protocol.
    Type: Grant
    Filed: October 13, 2004
    Date of Patent: January 31, 2006
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshiaki Takabatake, Keiichi Teramoto, Kensaku Fujimoto
  • Patent number: 6983374
    Abstract: Under a multi-task environment, a tamper resistant microprocessor saves a context information for one program whose execution is to be interrupted, where the context information contains information indicating an execution state of that one program and the execution code encryption key of that one program. An execution of that one program can be restarted by recovering the execution state of that one program from the saved context information. The context information can be encrypted by using the public key of the microprocessor, and then decrypted by using the secret key of the microprocessor.
    Type: Grant
    Filed: February 13, 2001
    Date of Patent: January 3, 2006
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Keiichi Teramoto, Takeshi Saito, Kenji Shirakawa, Kensaku Fujimoto
  • Publication number: 20050166069
    Abstract: Under a multi-task environment, a tamper resistant microprocessor saves a context information for one program whose execution is to be interrupted, where the context information contains information indicating an execution state of that one program and the execution code encryption key of that one program. An execution of that one program can be restarted by recovering the execution state of that one program from the saved context information. The context information can be encrypted by using the public key of the microprocessor, and then decrypted by using the secret key of the microprocessor.
    Type: Application
    Filed: March 4, 2005
    Publication date: July 28, 2005
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Mikio Hashimoto, Keiichi Teramoto, Takeshi Saito, Kenji Shirakawa, Kensaku Fujimoto
  • Publication number: 20050163079
    Abstract: Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.
    Type: Application
    Filed: July 21, 2004
    Publication date: July 28, 2005
    Applicants: Toshiba America Research Inc. (TARI), Telcordial Technologies, Inc.
    Inventors: Kenichi Taniuchi, Tao Zhang, Prathima Agrawal, Ashutosh Dutta, Shinichi Baba, Kensaku Fujimoto, Yasuhiro Katsube, Toshikazu Kodama, Yoshihiro Ohba, Sunil Madhani
  • Patent number: 6885643
    Abstract: A wireless network system capable of controlling highly efficient transfer of AV data by an upper application, using information indicating a wireless link condition that varies dynamically is disclosed. In this wireless network system, a wireless terminal and a wire gateway apparatus each store collected wireless link condition information in a descriptor. An upper application on the wireless terminal reads the descriptor at said terminal device and obtains wireless LAN link condition information. The wireless gateway apparatus makes notification to a wireless terminal of a VTR, for example, that actually exists in a 1394 terminal as if it existed as a sub-unit in the local terminal device. The wireless terminal accesses the collected wireless link condition information and selects a AV/C command to be sent to the VTR sub-unit of the wireless gateway apparatus. The wireless terminal transfers the play command for playback to the wireless gateway apparatus.
    Type: Grant
    Filed: September 28, 2000
    Date of Patent: April 26, 2005
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Keiichi Teramoto, Yoshiaki Takabatake, Junko Ami, Kensaku Fujimoto
  • Publication number: 20050047388
    Abstract: A radio terminal or gateway capable of executing the AV/C protocol on the datalink protocol which starts communications after setting up a logical channel on a radio network is disclosed. The radio terminal or gateway transfers data packets according to the stored correspondence information among the protocol identifier, the channel identifier that is set up for the radio terminal or gateway, and the channel identifier that is set up for a correspondent radio terminal or gateway, where the correspondence information is obtained through an exchange of signaling packets containing the channel identifier indicating a logical channel that is set up for transferring the data packets and the protocol identifier indicating the AV control protocol.
    Type: Application
    Filed: October 13, 2004
    Publication date: March 3, 2005
    Applicant: KABUSHHIKI KAISHA TOSHIBA
    Inventors: Yoshiaki Takabatake, Keiichi Teramoto, Kensaku Fujimoto
  • Patent number: 6829228
    Abstract: A radio terminal or gateway capable of executing the AV/C protocol on the datalink protocol which starts communications after setting up a logical channel on a radio network is disclosed. The radio terminal or gateway transfers data packets according to the stored correspondence information among the protocol identifier, the channel identifier that is set up for the radio terminal or gateway, and the channel identifier that is set up for a correspondent radio terminal or gateway, where the correspondence information is obtained through an exchange of signaling packets containing the channel identifier indicating a logical channel that is set up for transferring the data packets and the protocol identifier indicating the AV control protocol.
    Type: Grant
    Filed: December 27, 2000
    Date of Patent: December 7, 2004
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshiaki Takabatake, Keiichi Teramoto, Kensaku Fujimoto
  • Publication number: 20030182571
    Abstract: In an inner memory type tamper resistant microprocessor, a requested secret protection attribute requested for each access target memory page by a task is set and stored exclusively from other tasks, at a time of reading a program into memory pages and executing the program as the task, and a memory secret protection attribute is set and stored for each access target memory page by the task, at a time of executing the task. Then, an access to each access target memory page is refused when the requested secret protection attribute for each access target memory page and the memory secret protection attribute for each access target memory page do not coincide.
    Type: Application
    Filed: March 20, 2003
    Publication date: September 25, 2003
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Mikio Hashimoto, Kensaku Yamaguchi, Kenji Shirakawa, Kensaku Fujimoto
  • Publication number: 20030126458
    Abstract: In the method for sharing encrypted data region among two or more processes on a tamper resistant processor, one process creates the encrypted data region to be shared according to the common key generated as a result of the safe key exchange, and the other process maps that region to its own address space or process space. The address information of the shared encrypted data region and the common key of each process are set in relation in the encrypted attribute register inside the tamper resistant processor, so that it is possible to share the encrypted data region safely.
    Type: Application
    Filed: December 28, 2001
    Publication date: July 3, 2003
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Keiichi Teramoto, Mikio Hashimoto, Kenji Shirakawa, Satoshi Ozaki, Kensaku Fujimoto