Patents by Inventor Masahiko Furuya

Masahiko Furuya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8819417
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: August 26, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
  • Patent number: 8635449
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: January 21, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Patent number: 8380985
    Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: February 19, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
  • Patent number: 8347082
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Grant
    Filed: August 18, 2009
    Date of Patent: January 1, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Publication number: 20120159158
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Application
    Filed: February 28, 2012
    Publication date: June 21, 2012
    Applicant: HITACHI, LTD.
    Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
  • Patent number: 8176316
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Grant
    Filed: February 25, 2009
    Date of Patent: May 8, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
  • Publication number: 20120066490
    Abstract: A cryptographic device management server receives a first cryptographic calculation request from an arbitrary terminal device via a network, transmits a second cryptographic calculation request generated on the basis of the first cryptographic calculation request, management information of the terminal device and management information of the cryptographic device to a cryptographic device selected on the basis of the management information of the terminal devices and management information of the cryptographic devices stored in the cryptographic device management server, via a connection interface, receives a second cryptographic calculation result from the cryptographic device, and transmits a first cryptographic calculation result generated on the basis of the second cryptographic calculation result, the management information of the terminal device and the management information of the cryptographic device to the terminal device of the source of the first cryptographic calculation request via the network.
    Type: Application
    Filed: August 15, 2011
    Publication date: March 15, 2012
    Inventors: Akane Sato, Takahiro Fujishiro, Masahiko Furuya, Masami Ogawa
  • Publication number: 20110231662
    Abstract: The validation server obtains information related to a first cryptographic method from a certificate which is contained in a certificate validation request from a terminal device. When the information related to the first cryptographic method is not stored in a storage unit of the validation server as valid information, the validation server determines that the information related to the first cryptographic method is invalid. When the information related to the first cryptographic method is stored in the storage unit as valid information and also the information related to a second cryptographic method listed in the certificate in the certification path is not stored in the storage unit during the certification path validation, the validation server determines that the information related to the second cryptographic method is invalid.
    Type: Application
    Filed: February 4, 2011
    Publication date: September 22, 2011
    Inventors: AKANE SATO, Takahiro Fujishiro, Masahiko Furuya, Masami Ogawa
  • Publication number: 20110004763
    Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.
    Type: Application
    Filed: June 29, 2010
    Publication date: January 6, 2011
    Inventors: Akane SATO, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
  • Publication number: 20100122081
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Application
    Filed: August 18, 2009
    Publication date: May 13, 2010
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Publication number: 20090300349
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Application
    Filed: February 25, 2009
    Publication date: December 3, 2009
    Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
  • Publication number: 20080301439
    Abstract: A technique of managing public keys updated by a certificate authority and a plurality of hash algorithms is provided. Identifiers, each of which is uniquely determined by a pair of a public key updated by a certificate authority and a hash algorithm, are stored in an identifier information storage area (131b). A verification processing part (132c) cross-checks a received validation request and the identifiers stored in the identifier information storage area (131b). When there is an identifier corresponding to the received validation request, the verification processing part (132c) judges that the verification can be performed, and continues the verification processing.
    Type: Application
    Filed: April 18, 2008
    Publication date: December 4, 2008
    Inventors: Yoko HASHIMOTO, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Patent number: 6280170
    Abstract: A hydraulic control system for an injection molding machine is provided with a pump driving induction motor capable of operating at an operating speed corresponding to a flow rate at which a hydraulic fluid is to be supplied to a desired one of hydraulic actuators for operating the functional components of the injection molding machine to supply the hydraulic fluid efficiently at a reduced power consumption. Since the operating speed of the induction motor is controlled according to the desired flow rate of the hydraulic fluid corresponding to the operating speed of the hydraulic actuator, the hydraulic fluid can efficiently be supplied to the hydraulic actuator and the useless power consumption can be avoided.
    Type: Grant
    Filed: August 11, 1999
    Date of Patent: August 28, 2001
    Assignee: Toshiba Kikai Kabushiki Kaisha
    Inventors: Masahiko Furuya, Hiroki Arakawa