Patents by Inventor Satoshi Obana

Satoshi Obana has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10503915
    Abstract: In a system with registration data, in a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key and secret information, registration data is generated based on the encrypted data and verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number and secret information, the registration template stored in the storage unit and the data verifying request are matched verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: December 10, 2019
    Assignees: NEC Corporation
    Inventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki, Satoshi Obana
  • Patent number: 10484182
    Abstract: In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: November 19, 2019
    Assignees: NEC CORPORATION
    Inventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki, Satoshi Obana
  • Publication number: 20180239910
    Abstract: In a system with registration data, in a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key and secret information, registration data is generated based on the encrypted data and verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number and secret information, the registration template stored in the storage unit and the data verifying request are matched verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.
    Type: Application
    Filed: January 27, 2016
    Publication date: August 23, 2018
    Inventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI, Satoshi OBANA
  • Patent number: 9906363
    Abstract: The present invention makes it possible, in encrypted data verification, to avoid the leaking of information related to the original plaintext, thereby ensuring safety. The system of the present invention is provided with: means (103 in FIG. 1) for generating first and second auxiliary data for verifying whether or not the Hamming distance of a plaintext between a first encrypted data in which input data is encrypted and is recorded in a storage device, and a second encrypted data obtained by encrypting input data of a target to be checked is equal to or less than a predetermined value; and means (402 and 403 in FIG. 1) for taking the difference between the first encrypted data recorded in the storage device, and the second encrypted data, and determining, using the first and second auxiliary data, whether or not the Hamming distance of the plaintext corresponding to the difference between the first encrypted data and the second encrypted data is equal to or less than the predetermined value.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: February 27, 2018
    Assignee: NEC CORPORATION
    Inventors: Satoshi Obana, Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
  • Publication number: 20170324563
    Abstract: In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.
    Type: Application
    Filed: October 26, 2015
    Publication date: November 9, 2017
    Applicants: NEC CORPORATION
    Inventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI, Satoshi OBANA
  • Patent number: 9600677
    Abstract: Provided a database apparatus comprising a control means to execute data access control on a database, wherein the control means, receiving a database operation command from a user apparatus, comprises, regarding data and/or metadata to be handled associated with the database operation command, means for executing database operation or computation on encrypted data and/or encrypted metadata as is in ciphertext and means for executing database operation or computation on plaintext data and/or plaintext metadata, and the control means sends a processing result to the user apparatus.
    Type: Grant
    Filed: November 9, 2012
    Date of Patent: March 21, 2017
    Assignee: NEC CORPORATION
    Inventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
  • Patent number: 9349023
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Grant
    Filed: July 3, 2014
    Date of Patent: May 24, 2016
    Assignee: NEC CORPORATION
    Inventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
  • Publication number: 20150195090
    Abstract: The present invention makes it possible, in encrypted data verification, to avoid the leaking of information related to the original plaintext, thereby ensuring safety. The system of the present invention is provided with: means (103 in FIG. 1) for generating first and second auxiliary data for verifying whether or not the Hamming distance of a plaintext between a first encrypted data in which input data is encrypted and is recorded in a storage device, and a second encrypted data obtained by encrypting input data of a target to be checked is equal to or less than a predetermined value; and means (402 and 403 in FIG. 1) for taking the difference between the first encrypted data recorded in the storage device, and the second encrypted data, and determining, using the first and second auxiliary data, whether or not the Hamming distance of the plaintext corresponding to the difference between the first encrypted data and the second encrypted data is equal to or less than the predetermined value.
    Type: Application
    Filed: July 12, 2013
    Publication date: July 9, 2015
    Applicant: NEC CORPORATION
    Inventors: Satoshi Obana, Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
  • Patent number: 9021257
    Abstract: Secret information is encoded/distributed into distributed information according to access structure, a random number sequence corresponding to number of pieces into which the secret information is distributed is generated by randomly selecting polynomial coefficients, the coefficients are encoded/distributed into random number information according to access structure, a hash function whose hash values correspond to the random number sequence is generated, keys for which the hash function applies are selected so as to individually set data for checking whether restored secret information is being manipulated as number of pieces of check data corresponding to number of pieces into which the secret information is distributed, the distributed information is read, the secret information is restored; the random number information is read, the random number sequence is restored, the check data is read, and the restored secret information is judged as not being manipulated when the read check data satisfies the has
    Type: Grant
    Filed: June 18, 2010
    Date of Patent: April 28, 2015
    Assignee: NEC Corporation
    Inventor: Satoshi Obana
  • Publication number: 20150006908
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Application
    Filed: July 3, 2014
    Publication date: January 1, 2015
    Applicant: NEC CORPORATION
    Inventors: Kengo MORI, Satoshi OBANA, Jun FURUKAWA, Isamu TERANISHI, Toshiyuki ISSHIKI, Toshinori ARAKI
  • Patent number: 8861717
    Abstract: A verification device, upon the input of any k items of shared information among n items of shared information and “t”: generates as subsets all combinations that select r items of shared information among the k items of shared information received as input where r satisfies r?t+2; for each of the subsets, uses the cheater-identification information belonging to the subset to judge whether dishonest shared information is included in the subset; and based on the judgment results, generates and supplies as output a cheater set indicating dishonest shared information among the k items of shared information.
    Type: Grant
    Filed: October 21, 2010
    Date of Patent: October 14, 2014
    Assignee: NEC Corporation
    Inventor: Satoshi Obana
  • Patent number: 8812877
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Grant
    Filed: November 9, 2012
    Date of Patent: August 19, 2014
    Assignee: NEC Corporation
    Inventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
  • Publication number: 20130246813
    Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configur
    Type: Application
    Filed: November 9, 2012
    Publication date: September 19, 2013
    Applicant: NEC CORPORATION
    Inventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
  • Patent number: 8483386
    Abstract: A share generation apparatus (100) generates check data corresponding to a secret and random number, shares and encodes the secret and random number in accordance with a predetermined access structure, and stores them in storage devices (300—1 to 300—n). A reconstruction apparatus (200) reads out the shared/encoded secret and random number from the storage devices corresponding to members of the access structure, and reconstructs them. If the check data correspond to the reconstructed secret and random number, it is determined that the reconstructed secret is correct. If not, it is determined that cheating has occurred. Cheating of forging some shares by referring to (n?1) shares can be detected regardless of a distribution used to select a secret.
    Type: Grant
    Filed: December 12, 2008
    Date of Patent: July 9, 2013
    Assignee: NEC Corporation
    Inventor: Satoshi Obana
  • Patent number: 8397142
    Abstract: There is disclosed a system for identifying falsified secret information shares included in k secret information shares used to recover secret information according to a (k,n)-threshold secret sharing scheme, and producing falsified secret information shares of reduced size. A shared information generating apparatus generates cheater identifying information Ai(i=1, 2, . . . , n) using n secret information shares Vi generated according to the (k,n)-threshold secret sharing scheme and random polynomials. A recovering apparatus detects cheated secret information shares using the arbitrary k secret information shares and k cheater identifying information, and recovers the secret information from the k secret information shares if it detects no cheated secret information shares.
    Type: Grant
    Filed: September 5, 2007
    Date of Patent: March 12, 2013
    Assignee: NEC Corporation
    Inventor: Satoshi Obana
  • Publication number: 20120243679
    Abstract: A verification device, upon the input of any k items of shared information among n items of shared information and “t”: generates as subsets all combinations that select r items of shared information among the k items of shared information received as input where r satisfies r?t+2; for each of the subsets, uses the cheater-identification information belonging to the subset to judge whether dishonest shared information is included in the subset; and based on the judgment results, generates and supplies as output a cheater set indicating dishonest shared information among the k items of shared information.
    Type: Application
    Filed: October 21, 2010
    Publication date: September 27, 2012
    Applicant: NEC CORPORATION
    Inventor: Satoshi Obana
  • Patent number: 8270613
    Abstract: A system for disabling an unauthorized person includes an encryption device (400) and a decryption device (500). The encryption device (400) stores distribution member set data, a random number, and a public key, the distribution member set data being information on members who are permitted to decrypt a cyphertext, and generates and distributes, when a shared key is input, an error-containing cyphertext which is a cyphertext containing the shared key, the distribution member set data, and error information different for each of the members, and an error correction cyphertext which is a cyphertext of the error information.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: September 18, 2012
    Assignee: NEC Corporation
    Inventors: Jun Furukawa, Satoshi Obana
  • Patent number: 8214647
    Abstract: Check data corresponding to distributed confidential information is generated, and the confidential information and check data are distribution-coded. When the confidential information is restored, the confidential information and check data are restored and it is determined whether or not the restored check data correspond to the restored confidential information. If the data correspond to the information, the information is determined to be correct and is output. If not, the information is judged to be false (i.e., tampered distributed information), and a symbol indicating that falsity has been detected is output.
    Type: Grant
    Filed: June 15, 2007
    Date of Patent: July 3, 2012
    Assignee: NEC Corporation
    Inventors: Toshinori Araki, Satoshi Obana
  • Publication number: 20120102321
    Abstract: Secret information is encoded/distributed into distributed information according to access structure, a random number sequence corresponding to number of pieces into which the secret information is distributed is generated by randomly selecting polynomial coefficients, the coefficients are encoded/distributed into random number information according to access structure, a hash function whose hash values correspond to the random number sequence is generated, keys for which the hash function applies are selected so as to individually set data for checking whether restored secret information is being manipulated as number of pieces of check data corresponding to number of pieces into which the secret information is distributed, the distributed information is read, the secret information is restored; the random number information is read, the random number sequence is restored, the check data is read, and the restored secret information is judged as not being manipulated when the read check data satisfies the has
    Type: Application
    Filed: June 18, 2010
    Publication date: April 26, 2012
    Inventor: Satoshi Obana
  • Patent number: 7933905
    Abstract: An input data enlarging unit (100) derives a first enlargement unit output and a second enlargement unit output that are uniquely specified by input data (103) to output the same. The first enlargement unit output and the second enlargement unit output are elements of output data set B which forms a group. An ??? hash function calculation unit (101) receives as input the first enlargement unit output to calculate an h? function which is specified by hash-function-specifying data (104) and an element of the H? function set. The function set H? is such that the number of h?H ? which satisfies h(x)?h(y)=d for an arbitrary element d of the output data set B and two different elements x and y of the output data set B is equal to or smaller than |H?|·?. An adding unit (102) adds together the result of calculation of the function H? and the second enlargement unit output to output a result of the addition.
    Type: Grant
    Filed: September 7, 2006
    Date of Patent: April 26, 2011
    Assignee: NEC Corporation
    Inventors: Satoshi Obana, Akihiro Tanaka