Patents by Inventor Shingo Hane

Shingo Hane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8819417
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: August 26, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
  • Patent number: 8635449
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: January 21, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Patent number: 8516245
    Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.
    Type: Grant
    Filed: June 19, 2009
    Date of Patent: August 20, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Patent number: 8380985
    Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: February 19, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
  • Patent number: 8347082
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Grant
    Filed: August 18, 2009
    Date of Patent: January 1, 2013
    Assignee: Hitachi, Ltd.
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Publication number: 20120159158
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Application
    Filed: February 28, 2012
    Publication date: June 21, 2012
    Applicant: HITACHI, LTD.
    Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
  • Patent number: 8176316
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Grant
    Filed: February 25, 2009
    Date of Patent: May 8, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
  • Publication number: 20110004763
    Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.
    Type: Application
    Filed: June 29, 2010
    Publication date: January 6, 2011
    Inventors: Akane SATO, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
  • Publication number: 20100122081
    Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.
    Type: Application
    Filed: August 18, 2009
    Publication date: May 13, 2010
    Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
  • Publication number: 20090300349
    Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
    Type: Application
    Filed: February 25, 2009
    Publication date: December 3, 2009
    Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
  • Publication number: 20090259842
    Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.
    Type: Application
    Filed: June 19, 2009
    Publication date: October 15, 2009
    Applicants: Hitachi, Ltd
    Inventors: Yoko KUMAGAI, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Patent number: 7558952
    Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.
    Type: Grant
    Filed: March 1, 2004
    Date of Patent: July 7, 2009
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Patent number: 7533269
    Abstract: In response to a sign request including a digital document from a document-creating device 10, a digital-signed-document exchange supporting server 30 canonicalizes the digital document, calculates a digest value thereof, and returns the digest value to the document creating device. When the document-creating device transmits a digital sign created by encrypting the digest value to the digital-signed-digital document exchange-supporting server 30, the server 30 creates a digital-signed document from the digital sign and the digital document, and returns the document to the document-creating device. On the other hand, in response to a validation request including a digital-signed-digital document and a public key from a sign validating device 20, the server 30 compares a value resulting from the decryption of the digital sign with the public key and a digest value of the digital document canonicalized and returns the result to the sign validating device.
    Type: Grant
    Filed: January 31, 2005
    Date of Patent: May 12, 2009
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Patent number: 7392380
    Abstract: If a CRL is cached for an increased speed of a certificate validation process, when a certification authority issues a CRL in an urgent situation, the accuracy of the certificate validation result cannot be secured because the cached CRL is not the latest one. This problem is solved as follows. When it issues a CRL, the certification authority sends a CRL issuance notification to certificate validation servers. The certificate validation servers that received the CRL issuance notification cache the latest CRL. Thus, the accuracy of the certificate validation result can be secured.
    Type: Grant
    Filed: June 9, 2003
    Date of Patent: June 24, 2008
    Assignee: Hitachi, Ltd.
    Inventors: Tadashi Kaji, Takahiro Fujishiro, Yoko Kumagai, Shingo Hane, Hiromi Nagano
  • Publication number: 20060168650
    Abstract: In response to a sign request including a digital document from a document-creating device 10, a digital-signed-document exchange supporting server 30 canonicalizes the digital document, calculates a digest value thereof and returns the digest value to the document creating device. When the document-creating device transmits a digital sign created by encrypting the digest value to the digital-signed-digital document exchange-supporting server 30, the digital-signed-digital document exchange-supporting server 30 creates a digital-signed document from the digital sign and the digital document and returns the document to the document-creating device.
    Type: Application
    Filed: January 31, 2005
    Publication date: July 27, 2006
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Publication number: 20050081037
    Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.
    Type: Application
    Filed: March 1, 2004
    Publication date: April 14, 2005
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Publication number: 20040255116
    Abstract: The present invention provides a technology for verifying the validity of an electronic document by using a signature affixed to the electronic document at the time of its creation even if the electronic document is partially rendered private at the time of its disclosure. An target electronic document is divided into two or more partial documents having an arbitrary or fixed length. This division is effected by using a tag of XML or other markup language so as to provide versatility or by adding a dedicated delimiter for division. The system has a signature function. The signature function uses a signature technique for generating the information for verifying the validity of each of the partial documents, and validating a signature affixed to the electronic document to confirm the validity of the whole electronic document by affixing a signature to the aggregate of the generated validity confirmation information.
    Type: Application
    Filed: August 20, 2003
    Publication date: December 16, 2004
    Inventors: Shingo Hane, Takahiro Fujishiro, Tadashi Kaji, Yoko Kumagai, Junichi Takeuchi
  • Publication number: 20040111609
    Abstract: If a CRL is cached for an increased speed of a certificate validation process, when a certification authority issues a CRL in an urgent situation, the accuracy of the certificate validation result cannot be secured because the cached CRL is not the latest one. This problem is solved as follows. When it issues a CRL, the certification authority sends a CRL issuance notification to certificate validation servers. The certificate validation servers that received the CRL issuance notification cache the latest CRL. Thus, the accuracy of the certificate validation result can be secured.
    Type: Application
    Filed: June 9, 2003
    Publication date: June 10, 2004
    Inventors: Tadashi Kaji, Takahiro Fujishiro, Yoko Kumagai, Shingo Hane, Hiromi Nagano