Patents by Inventor Shingo Hane
Shingo Hane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8819417Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.Type: GrantFiled: February 28, 2012Date of Patent: August 26, 2014Assignee: Hitachi, Ltd.Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
-
Patent number: 8635449Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.Type: GrantFiled: November 1, 2012Date of Patent: January 21, 2014Assignee: Hitachi, Ltd.Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
-
Patent number: 8516245Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.Type: GrantFiled: June 19, 2009Date of Patent: August 20, 2013Assignee: Hitachi, Ltd.Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
-
Patent number: 8380985Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.Type: GrantFiled: June 29, 2010Date of Patent: February 19, 2013Assignee: Hitachi, Ltd.Inventors: Akane Sato, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
-
Patent number: 8347082Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.Type: GrantFiled: August 18, 2009Date of Patent: January 1, 2013Assignee: Hitachi, Ltd.Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
-
Publication number: 20120159158Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: HITACHI, LTD.Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
-
Patent number: 8176316Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.Type: GrantFiled: February 25, 2009Date of Patent: May 8, 2012Assignee: Hitachi, Ltd.Inventors: Yoko Hashimoto, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa, Shingo Hane, Akane Sato
-
Publication number: 20110004763Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.Type: ApplicationFiled: June 29, 2010Publication date: January 6, 2011Inventors: Akane SATO, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
-
Publication number: 20100122081Abstract: In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.Type: ApplicationFiled: August 18, 2009Publication date: May 13, 2010Inventors: Akane Sato, Yoko Hashimoto, Shingo Hane, Takahiro Fujishiro, Masahiko Furuya, Masami Uzawa
-
Publication number: 20090300349Abstract: A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.Type: ApplicationFiled: February 25, 2009Publication date: December 3, 2009Inventors: Yoko HASHIMOTO, Takahiro FUJISHIRO, Masahiko FURUYA, Masami UZAWA, Shingo HANE, Akane SATO
-
Publication number: 20090259842Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.Type: ApplicationFiled: June 19, 2009Publication date: October 15, 2009Applicants: Hitachi, LtdInventors: Yoko KUMAGAI, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
-
Patent number: 7558952Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.Type: GrantFiled: March 1, 2004Date of Patent: July 7, 2009Assignee: Hitachi, Ltd.Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
-
Patent number: 7533269Abstract: In response to a sign request including a digital document from a document-creating device 10, a digital-signed-document exchange supporting server 30 canonicalizes the digital document, calculates a digest value thereof, and returns the digest value to the document creating device. When the document-creating device transmits a digital sign created by encrypting the digest value to the digital-signed-digital document exchange-supporting server 30, the server 30 creates a digital-signed document from the digital sign and the digital document, and returns the document to the document-creating device. On the other hand, in response to a validation request including a digital-signed-digital document and a public key from a sign validating device 20, the server 30 compares a value resulting from the decryption of the digital sign with the public key and a digest value of the digital document canonicalized and returns the result to the sign validating device.Type: GrantFiled: January 31, 2005Date of Patent: May 12, 2009Assignee: Hitachi, Ltd.Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
-
Patent number: 7392380Abstract: If a CRL is cached for an increased speed of a certificate validation process, when a certification authority issues a CRL in an urgent situation, the accuracy of the certificate validation result cannot be secured because the cached CRL is not the latest one. This problem is solved as follows. When it issues a CRL, the certification authority sends a CRL issuance notification to certificate validation servers. The certificate validation servers that received the CRL issuance notification cache the latest CRL. Thus, the accuracy of the certificate validation result can be secured.Type: GrantFiled: June 9, 2003Date of Patent: June 24, 2008Assignee: Hitachi, Ltd.Inventors: Tadashi Kaji, Takahiro Fujishiro, Yoko Kumagai, Shingo Hane, Hiromi Nagano
-
Publication number: 20060168650Abstract: In response to a sign request including a digital document from a document-creating device 10, a digital-signed-document exchange supporting server 30 canonicalizes the digital document, calculates a digest value thereof and returns the digest value to the document creating device. When the document-creating device transmits a digital sign created by encrypting the digest value to the digital-signed-digital document exchange-supporting server 30, the digital-signed-digital document exchange-supporting server 30 creates a digital-signed document from the digital sign and the digital document and returns the document to the document-creating device.Type: ApplicationFiled: January 31, 2005Publication date: July 27, 2006Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
-
Publication number: 20050081037Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.Type: ApplicationFiled: March 1, 2004Publication date: April 14, 2005Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
-
Publication number: 20040255116Abstract: The present invention provides a technology for verifying the validity of an electronic document by using a signature affixed to the electronic document at the time of its creation even if the electronic document is partially rendered private at the time of its disclosure. An target electronic document is divided into two or more partial documents having an arbitrary or fixed length. This division is effected by using a tag of XML or other markup language so as to provide versatility or by adding a dedicated delimiter for division. The system has a signature function. The signature function uses a signature technique for generating the information for verifying the validity of each of the partial documents, and validating a signature affixed to the electronic document to confirm the validity of the whole electronic document by affixing a signature to the aggregate of the generated validity confirmation information.Type: ApplicationFiled: August 20, 2003Publication date: December 16, 2004Inventors: Shingo Hane, Takahiro Fujishiro, Tadashi Kaji, Yoko Kumagai, Junichi Takeuchi
-
Publication number: 20040111609Abstract: If a CRL is cached for an increased speed of a certificate validation process, when a certification authority issues a CRL in an urgent situation, the accuracy of the certificate validation result cannot be secured because the cached CRL is not the latest one. This problem is solved as follows. When it issues a CRL, the certification authority sends a CRL issuance notification to certificate validation servers. The certificate validation servers that received the CRL issuance notification cache the latest CRL. Thus, the accuracy of the certificate validation result can be secured.Type: ApplicationFiled: June 9, 2003Publication date: June 10, 2004Inventors: Tadashi Kaji, Takahiro Fujishiro, Yoko Kumagai, Shingo Hane, Hiromi Nagano