Patents by Inventor Tadao Kusudo
Tadao Kusudo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8397078Abstract: Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility that such program will be activated without noticing that the program is tampered with. For this reason, when a program is downloaded via a network, a file hierarchy for the program located on a server is constructed in a local area of a terminal. Subsequently, the authentication of the program is performed with respect to the file hierarchy constructed in the local area, and the credibility of the program is guaranteed.Type: GrantFiled: August 24, 2011Date of Patent: March 12, 2013Assignee: Panasonic CorporationInventors: Tadao Kusudo, Yoshio Kawakami
-
Publication number: 20120005481Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.Type: ApplicationFiled: September 16, 2011Publication date: January 5, 2012Applicant: PANASONIC CORPORATIONInventors: Tadao KUSUDO, Takakazu SHIOMI
-
Patent number: 8086862Abstract: Conventionally, when the version of a program has been upgraded, the whole of a currently stored program needs to be deleted to be replaced by a new program, and authentication needs to be performed again on such new program when it is activated. However, since the whole of the program is required to be stored and authenticated even when only a part of such program has changed, it consumes time and leads to the decrease in responsiveness. In order to solve this problem, the present invention extracts a difference between a new program and a currently stored old program, when such new program is to be stored, and the new program is to be stored after authentication is performed only on such difference.Type: GrantFiled: December 16, 2004Date of Patent: December 27, 2011Assignee: Panasonic CorporationInventors: Satoshi Terao, Tadao Kusudo, Takakazu Shiomi
-
Publication number: 20110307702Abstract: Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility that such program will be activated without noticing that the program is tampered with. For this reason, when a program is downloaded via a network, a file hierarchy for the program located on a server is constructed in a local area of a terminal. Subsequently, the authentication of the program is performed with respect to the file hierarchy constructed in the local area, and the credibility of the program is guaranteed.Type: ApplicationFiled: August 24, 2011Publication date: December 15, 2011Applicant: PANASONIC CORPORATIONInventors: Tadao KUSUDO, Yoshio KAWAKAMI
-
Patent number: 8060749Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.Type: GrantFiled: February 3, 2010Date of Patent: November 15, 2011Assignee: Panasonic CorporationInventors: Tadao Kusudo, Takakazu Shiomi
-
Patent number: 8037317Abstract: Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility that such program will be activated without noticing that the program is tampered with. For this reason, when a program is downloaded via a network, a file hierarchy for the program located on a server is constructed in a local area of a terminal. Subsequently, the authentication of the program is performed with respect to the file hierarchy constructed in the local area, and the credibility of the program is guaranteed.Type: GrantFiled: July 13, 2005Date of Patent: October 11, 2011Assignee: Panasonic CorporationInventors: Tadao Kusudo, Yoshio Kawakami
-
Publication number: 20100138665Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.Type: ApplicationFiled: February 3, 2010Publication date: June 3, 2010Applicant: PANASONIC CORPORATIONInventors: Tadao KUSUDO, Takakazu SHIOMI
-
Patent number: 7698562Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.Type: GrantFiled: December 16, 2004Date of Patent: April 13, 2010Assignee: Panasonic CorporationInventors: Tadao Kusudo, Takakazu Shiomi
-
Publication number: 20090013368Abstract: A broadcast system BS includes a broadcast apparatus 1 and a reception apparatus 2. The broadcast apparatus 1 first receives and stores therein a proxy request PR including at least an identifier assigned to the reception apparatus 2 and a command to be transmitted to the reception apparatus 2. Moreover, the broadcast apparatus 1 extracts the set of the identifier of the reception apparatus 2 and the command for the reception apparatus 2 from the proxy request PR stored therein, and assembles a command packet from the set of the identifier and the command. Then, the broadcast apparatus 1 generates a stream in which the assembled command packet is multiplexed, and sends it out to a broadcast channel. The reception apparatus 2 separates the command packet from the stream sent out to the broadcast channel, and restores the set of the identifier and the command of the reception apparatus 2.Type: ApplicationFiled: September 9, 2008Publication date: January 8, 2009Inventors: Yoshihiro MIMURA, Shigeaki Watanabe, Tadao Kusudo, Tomonori Nakamura
-
Patent number: 7474621Abstract: A broadcast system BS includes a broadcast apparatus 1 and a reception apparatus 2. The broadcast apparatus 1 first receives and stores therein a proxy request PR including at least an identifier assigned to the reception apparatus 2 and a command to be transmitted to the reception apparatus 2. Moreover, the broadcast apparatus 1 extracts the set of the identifier of the reception apparatus 2 and the command for the reception apparatus 2 from the proxy request PR stored therein, and assembles a command packet from the set of the identifier and the command. Then, the broadcast apparatus 1 generates a stream in which the assembled command packet is multiplexed, and sends it out to a broadcast channel. The reception apparatus 2 separates the command packet from the stream sent out to the broadcast channel, and restores the set of the identifier and the command of the reception apparatus 2.Type: GrantFiled: March 28, 2007Date of Patent: January 6, 2009Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Yoshihiro Mimura, Shigeaki Watanabe, Tadao Kusudo, Tomonori Nakamura
-
Publication number: 20080013455Abstract: A broadcast system BS includes a broadcast apparatus 1 and a reception apparatus 2. The broadcast apparatus 1 first receives and stores therein a proxy request PR including at least an identifier assigned to the reception apparatus 2 and a command to be transmitted to the reception apparatus 2. Moreover, the broadcast apparatus 1 extracts the set of the identifier of the reception apparatus 2 and the command for the reception apparatus 2 from the proxy request PR stored therein, and assembles a command packet from the set of the identifier and the command. Then, the broadcast apparatus 1 generates a stream in which the assembled command packet is multiplexed, and sends it out to a broadcast channel. The reception apparatus 2 separates the command packet from the stream sent out to the broadcast channel, and restores the set of the identifier and the command of the reception apparatus 2.Type: ApplicationFiled: March 28, 2007Publication date: January 17, 2008Inventors: Yoshihiro Mimura, Shigeaki Watanbe, Tadao Kusudo, Tomonori Nakamura
-
Patent number: 7218611Abstract: A broadcast system BS includes a broadcast apparatus 1 and a reception apparatus 2. The broadcast apparatus 1 first receives and stores therein a proxy request PR including at least an identifier assigned to the reception apparatus 2 and a command to be transmitted to the reception apparatus 2. Moreover, the broadcast apparatus 1 extracts the set of the identifier of the reception apparatus 2 and the command for the reception apparatus 2 from the proxy request PR stored therein, and assembles a command packet from the set of the identifier and the command. Then, the broadcast apparatus 1 generates a stream in which the assembled command packet is multiplexed, and sends it out to a broadcast channel. The reception apparatus 2 separates the command packet from the stream sent out to the broadcast channel, and restores the set of the identifier and the command of the reception apparatus 2.Type: GrantFiled: July 3, 2002Date of Patent: May 15, 2007Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Yoshihiro Mimura, Shigeaki Watanabe, Tadao Kusudo, Tomonori Nakamura
-
Publication number: 20060015746Abstract: Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility that such program will be activated without noticing that the program is tampered with. For this reason, when a program is downloaded via a network, a file hierarchy for the program located on a server is constructed in a local area of a terminal. Subsequently, the authentication of the program is performed with respect to the file hierarchy constructed in the local area, and the credibility of the program is guaranteed.Type: ApplicationFiled: July 13, 2005Publication date: January 19, 2006Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.Inventors: Tadao Kusudo, Yoshio Kawakami
-
Publication number: 20050138397Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.Type: ApplicationFiled: December 16, 2004Publication date: June 23, 2005Applicant: Matsushita Electric Industrial Co., Ltd.Inventors: Tadao Kusudo, Takakazu Shiomi
-
Publication number: 20050138401Abstract: Conventionally, when the version of a program has been upgraded, the whole of a currently stored program needs to be deleted to be replaced by a new program, and authentication needs to be performed again on such new program when it is activated. However, since the whole of the program is required to be stored and authenticated even when only a part of such program has changed, it consumes time and leads to the decrease in responsiveness. In order to solve this problem, the present invention extracts a difference between a new program and a currently stored old program, when such new program is to be stored, and the new program is to be stored after authentication is performed only on such difference.Type: ApplicationFiled: December 16, 2004Publication date: June 23, 2005Applicant: Matsushita Electric Industrial Co., Ltd.Inventors: Satoshi Terao, Tadao Kusudo, Takakazu Shiomi
-
Publication number: 20050007970Abstract: A broadcast system BS includes a broadcast apparatus 1 and a reception apparatus 2. The broadcast apparatus 1 first receives and stores therein a proxy request PR including at least an identifier assigned to the reception apparatus 2 and a command to be transmitted to the reception apparatus 2. Moreover, the broadcast apparatus 1 extracts the set of the identifier of the reception apparatus 2 and the command for the reception apparatus 2 from the proxy request PR stored therein, and assembles a command packet from the set of the identifier and the command. Then, the broadcast apparatus 1 generates a stream in which the assembled command packet is multiplexed, and sends it out to a broadcast channel. The reception apparatus 2 separates the command packet from the stream sent out to the broadcast channel, and restores the set of the identifier and the command of the reception apparatus 2.Type: ApplicationFiled: July 3, 2002Publication date: January 13, 2005Inventors: Yoshihiro Mimura, Shigeaki Watanabe, Tadao Kusudo, Tomonori Nakamura