Patents by Inventor Natsume Matsuzaki

Natsume Matsuzaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120084557
    Abstract: Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid.
    Type: Application
    Filed: April 15, 2011
    Publication date: April 5, 2012
    Inventors: Yuichi Futa, Yuji Unagami, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
  • Patent number: 8144869
    Abstract: A content protection system prevents illegal key acquisition, without checking uniqueness of device keys. The content protection system includes a key data generation apparatus and a user terminal. The key data generation apparatus converts first key data, which is for using content, based on a predetermined conversion rule, thereby generating second key data, encrypts the second key data using a device key held by valid terminals, and outputs the encrypted key data. The user terminal obtains the encrypted key data, decrypts the encrypted key data using a device key held by the user terminal, thereby generating second key data, converts the second key data based on a re-conversion rule corresponding to the conversion rule, thereby generating the first key data, and uses the content with use of the generated first key data.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: March 27, 2012
    Assignee: Panasonic Corporation
    Inventors: Toshihisa Nakano, Motoji Ohmori, Natsume Matsuzaki, Makoto Tatebayashi, Naoki Yamamoto, Hideshi Ishihara
  • Publication number: 20120060008
    Abstract: An information processing terminal (101) includes: a storage area (206), in which general information (211) and confidential information (210) are recorded; an input/output receiving unit (201) which receives an access command to general information (211) or confidential information (210); a route information holding unit (203) in which route information is held, the route information indicating an area of activity in which access to the confidential information (210) is allowed; a current location acquisition unit (304) which acquires current location information indicating the current location of the information processing terminal (101); an access determination unit (305) which allows access to the confidential information (210) when the location of the information processing terminal (101) indicated by the current location information is in the route information; and a confidential information access unit (306) which accesses the confidential information (210) in response to the access allowance by the ac
    Type: Application
    Filed: February 9, 2011
    Publication date: March 8, 2012
    Inventors: Hideki Matsushima, Natsume Matsuzaki, Kouji Kobayashi, Masao Nonaka
  • Publication number: 20120051203
    Abstract: The present invention provides an apparatus for correctly controlling content recorded on an optical disc. An apparatus 600 for using content recorded on an optical disc 601, wherein the optical disc 601 includes a control information area 602 composed of partial areas 603a-603n, each being for recording control information indicating that use of the content is not permitted, the apparatus 600 comprises: a position information holding unit 612 holding therein position information indicating one of the partial areas 603a-603n that is allocated for the apparatus 600 to record the control information; a reading unit 613 reading information within the control information area 602; a judgment unit 614 judging whether use of the content is permitted, with use of the information read by the reading unit 613 and the position information; and a usage control unit 615 using the content when use of the content is judged to be permitted.
    Type: Application
    Filed: March 25, 2011
    Publication date: March 1, 2012
    Inventors: Masao Nonaka, Natsume Matsuzaki
  • Patent number: 8090957
    Abstract: The present invention aims to provide an information security apparatus that counters a simple power analysis attack (SPA) on an information security apparatus such as an RSA cryptosystem. The information security apparatus uses a multiplication with 1 in a Montgomery domain. 1 in the Montgomery domain is determined depending on a modulus and an integer k, which is greater than a number of bits of a modulus p. Therefore, it is hard for attackers who do not know p or k to analyze. Also, even if an analyzer can predict the Hamming weight, it is possible to further improve the safety against the SPA by modifying k or the modulus at random.
    Type: Grant
    Filed: October 18, 2006
    Date of Patent: January 3, 2012
    Assignee: Panasonic Corporation
    Inventors: Natsume Matsuzaki, Yuichi Futa
  • Publication number: 20110314280
    Abstract: A measurement device (11) measures vital data, encrypts the vital data using an encryption key to generate encrypted vital data, and generates, from a decryption key of the vital data, two pairs of a first share FSD and a second share SSD which enable reproduction of the decryption key. The measurement device (11) generates an encrypted second share by encrypting the second share SSD. The measurement device (11) transmits the encrypted vital data, the first share FSD, the encrypted second share to a server device (15) via an intermediate device (13).
    Type: Application
    Filed: March 30, 2010
    Publication date: December 22, 2011
    Inventors: Masao Nonaka, Natsume Matsuzaki, Hideki Matsushima, Yuichi Futa
  • Patent number: 8077980
    Abstract: An image processing apparatus enables image data to be handled easily after photography. A server apparatus patterns images and controls information in correspondence with user identifiers. A digital camera photographs a subject, obtains a pattern image and a piece of control information from the server apparatus, and judges whether a portion of the image data obtained by photography matches the obtained pattern image. If a matching portion exists, then the digital camera operates in accordance with an operation instruction included in the piece of control information. If the operation instruction is mosaic processing, then the digital camera performs mosaic processing to the matching portion. If the operation instruction is image replacement, then the digital camera replaces the matching portion with a predetermined image or performs CG processing on the matching portion. If the operation instruction is frame deletion, then the digital camera deletes the image data.
    Type: Grant
    Filed: May 16, 2005
    Date of Patent: December 13, 2011
    Assignee: Panasonic Corporation
    Inventors: Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Mitsuhiro Inoue, Tohru Nakahara, Akio Higashi
  • Patent number: 8074284
    Abstract: A problem to be solved is that a conventional device is not equipped with a unit that enables efficient circuit update taking into consideration an unconfigured area in the reconfigurable circuit in the device. A data using device of the present invention transmits, to a design data generation apparatus, device information relating to functions and structures of circuits included in the data using device, and receives design data generated by the design data generation apparatus. The data using device updates the function thereof based on the received design data. With this structure, the present invention can provide the data using device and the design data generation apparatus that are capable of managing the configuration of the circuits in the data using device, and acquiring properly the data to update the function thereof.
    Type: Grant
    Filed: June 12, 2007
    Date of Patent: December 6, 2011
    Assignee: Panasonic Corporation
    Inventors: Toshihisa Nakano, Natsume Matsuzaki
  • Publication number: 20110271344
    Abstract: A malicious-module identification device (200a) identifies and deactivates a malicious module operating in an information processing device (100a) connected thereto via a network. The malicious-module identification device is provided with a reception unit (2310) for receiving results of tampering detection from a plurality of modules for detecting tampering, a determination unit (210a) for assuming that a module among the plurality of modules is a normal module, determining, based on the assumption, whether a contradiction occurs in the received results of tampering detection, and identifying the module assumed to be a normal module as a malicious module when determining that a contradiction occurs, and a deactivation unit (2320) for outputting an instruction to deactivate the module identified as the malicious module.
    Type: Application
    Filed: February 15, 2010
    Publication date: November 3, 2011
    Inventors: Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi
  • Publication number: 20110265180
    Abstract: An information security apparatus (100c) includes a plurality of monitoring modules that monitor for tampering. A management apparatus (200c) includes a reception unit (230c) that receives a plurality of monitoring results each generated by a source monitoring module monitoring a target monitoring module; a detection unit (220c) that detects an abnormality by referring to fewer than all of the received monitoring results; and an identification unit (210c) that identifies, when an abnormality is detected, a monitoring module that has been tampered with from among (i) a monitoring module that generates a monitoring result related to the abnormality, and (ii) one or more monitoring modules identified by tracing back through a chain of monitoring modules consecutively from the target of monitoring to the source of monitoring, starting from the monitoring module that generates the monitoring result related to the abnormality.
    Type: Application
    Filed: April 19, 2011
    Publication date: October 27, 2011
    Inventors: Yuji UNAGAMI, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
  • Publication number: 20110246783
    Abstract: The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.
    Type: Application
    Filed: September 16, 2010
    Publication date: October 6, 2011
    Inventors: Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Junya Iwazaki
  • Publication number: 20110238324
    Abstract: A biological information measuring device including: a finger insertion part (401); a first light source (402) which emits, to the finger insertion part, first light; a second light source (403) which emits, to the finger insertion part, second light; a first light-receiving unit (404) which receives first reception light which is the first light transmitted through the finger or reflected from the finger; a second light-receiving unit (405) which receives second reception light which is the second light transmitted through the finger or reflected from the finger; a calculating unit (407) which measures a vein pattern of the user based on the first reception light, and measures biological data of the user based on the second reception light; and a transmitting and receiving unit (409) which transmits, to an external server, a measurement result of the vein pattern and a measurement result of the biological data.
    Type: Application
    Filed: December 11, 2009
    Publication date: September 29, 2011
    Inventors: Hideki Matsushima, Masao Nonaka, Natsume Matsuzaki, Yuichi Futa
  • Publication number: 20110239297
    Abstract: A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with.
    Type: Application
    Filed: February 15, 2010
    Publication date: September 29, 2011
    Inventors: Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi
  • Patent number: 8024577
    Abstract: The present invention provides a password recovery system that re-supplies a password to only the legitimate user of the password. The password recovery system includes a memory card with CPU and a mobile phone. When a password needs to be recovered, a phone call is made, to the mobile phone, from a telephone connected to a phone line whose phone number is registered in advance into the memory card with CPU. The mobile phone then obtains the telephone number of the phone line via a caller's telephone number notifying service. It is judged whether the obtained telephone number and the registered phone number are the same, and when they are the same, the password stored in the memory card with CPU will be re-supplied so that the user can recover it.
    Type: Grant
    Filed: October 15, 2003
    Date of Patent: September 20, 2011
    Assignee: Panasonic Corporation
    Inventors: Motoji Ohmori, Natsume Matsuzaki, Yuichi Futa
  • Publication number: 20110225653
    Abstract: To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
    Type: Application
    Filed: November 20, 2009
    Publication date: September 15, 2011
    Inventors: Manabu Maeda, Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
  • Patent number: 8015614
    Abstract: An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information after the circulation. An information security device (200) includes: a receiving unit (201) that receives a content and a collection command; a content storing unit (202) that stores a content and its usage rule; a collection command confirmation unit (203) that checks the validity of a received collection command; a content deletion unit (204) that deletes a content; a chain information storage unit (205) that stores chain information containing sending and receiving information of a content; a destination list storage unit (206); a sending unit (207) that sends a content and a collection command; and a control unit (208) that controls the processing for a collection command. When a collection command is sent after content distribution, the content can be collected (deleted) in the destination of circulation.
    Type: Grant
    Filed: June 9, 2006
    Date of Patent: September 6, 2011
    Assignee: Panasonic Corporation
    Inventors: Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka
  • Patent number: 7995766
    Abstract: Provided is a group subordinate terminal in a key updating system that includes a server and a group of terminals including: a group managing terminal; and group subordinate terminals including the group subordinate terminal, the group subordinate terminal comprising: a group withdrawal request processing unit which transmits a group withdrawal request to the group managing terminal in response to an instruction to update its apparatus-unique key, the group withdrawal request requesting for withdrawal of the group subordinate terminal from the group; an update apparatus-unique key requesting unit which requests for another apparatus-unique key by transmitting to the server a group withdrawal certificate indicating that the withdrawal of the group subordinate terminal from the group of terminals is completed through invalidation of its group key; and an update processing unit which updates the apparatus-unique key held in an apparatus-unique key holding unit to the another apparatus-unique key obtained from th
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: August 9, 2011
    Assignee: Panasonic Corporation
    Inventors: Taichi Sato, Kaoru Yokota, Natsume Matsuzaki, Yuichi Futa, Tetsuya Inoue, Masao Nonaka
  • Patent number: 7984489
    Abstract: When a PC transmits a content request to a device registration apparatus in which a permitted number of devices have already been registered, an expiration time management unit judges whether any registration information registered in a registration list management unit has an exceeded registration expiration time. If registration information with an exceeded registration expiration time is registered in the registration list management unit, the registration list management unit deletes this registration information, and newly registers registration information of the PC.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: July 19, 2011
    Assignee: Panasonic Corporation
    Inventors: Natsume Matsuzaki, Masaya Miyazaki, Yuichi Futa, Toshihisa Nakano, Hiroki Yamauchi, Soichiro Fujioka, Yuko Tsusaka
  • Patent number: 7979731
    Abstract: A time authentication device identifies clocks that show a time falling within the predetermined permissible range as compared with a time shown by the time authentication device. In a time authentication device embodied as a distribution device, a time-relation information storage unit stores a playback-device-time measured by a clock unit of a playback device, and also stores a distribution-device-time measured by a clock unit when the playback-device-time is acquired. The time authentication unit acquires from the playback device a target time measured by the clock unit, and also acquires an authentication time measured by the clock unit when the target time is received. The time authentication unit then calculates a first difference, a second difference, an authentication difference. If the authentication difference is smaller than or equal to a predetermined threshold, the time authentication unit judges that the clock unit of the playback device is valid.
    Type: Grant
    Filed: July 13, 2005
    Date of Patent: July 12, 2011
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Natsume Matsuzaki, Hiroki Yamauchi, Toshihisa Nakano
  • Patent number: 7971265
    Abstract: A content management system constructed by a plurality of storage apparatuses that can communicate with one another. A 1st storage apparatus, which is one of the storage apparatuses, stores therein, in correspondence, a content and copy destination information and sends the content and the copy destination information therefrom to a 2nd storage apparatus, which is another one of the storage apparatuses. Yet another one of the storage apparatuses that is indicated by the copy destination information stores therein, in correspondence, the content and copy source information and, after the 1st storage apparatus has sent the content and the copy destination information to the 2nd storage apparatus, rewrite the copy source information such that the copy source information indicates the 2nd storage apparatus.
    Type: Grant
    Filed: April 21, 2006
    Date of Patent: June 28, 2011
    Assignee: Panasonic Corporation
    Inventors: Yuko Tsusaka, Soichiro Fujioka, Natsume Matsuzaki