Patents by Inventor Tatsuyuki Matsushita
Tatsuyuki Matsushita has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140281543Abstract: A host device connected to a data recording device, includes a holding unit for holding a host device key and a host device certificate, an authentication/key exchange process unit configured to perform an authentication/key exchange process with the data recording device using the host device key and the host device certificate to receive medium device key certificate ID held in the data recording device and contained in the medium device key certificate, an interface unit configured to perform data communication with the data recording device through a secure channel, and an identification information generating unit configured to receive second controller identification information generated in the data recording device based on the first controller identification information by data communication through the secure channel and the interface unit, to generate data recording device identification information based on the second controller identification information and the medium device key certificate ID.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Inventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
-
Publication number: 20140281564Abstract: A method of authenticating access to a memory device that stores a host identification key and a host constant, includes generating a first key based on the host constant, decrypting a family key block read from an external device using the host identification key to generate a family key, decrypting encrypted secret identification information read from the external device using the family key to generate a secret identification information, generating a random number, generating a session key by using the first key and the random number, generating a first authentication information by processing the secret identification information with the session key in one-way function operation, and authenticating access to the memory device based on whether or not there is a match between the first authentication information and a second authentication information that is generated by the external device with the host constant transmitted to the external device.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Inventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA
-
Publication number: 20140281570Abstract: A method of performing an authentication process between a data recording device and a host device includes generating second controller identification information based on the first controller identification information, performing an authentication/key exchange process using the encrypted medium device key, the medium device key certificate, the host device key and the host device certificate to obtain medium device key certificate ID contained in the medium device key certificate, generating data recording device identification information based on the second controller identification information and the medium device key certificate ID, and generating a medium unique key based on the data recording device identification information.Type: ApplicationFiled: March 13, 2013Publication date: September 18, 2014Inventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
-
Publication number: 20140250302Abstract: According to one embodiment, a device includes a second data generator configured to generate a session key (SKey) by encrypting a random number (RN) with the second key (HKey) in AES operation; a one-way function processor configured to generate an authentication information (Oneway-ID) by processing the secret identification information (SecretID) with the session key (SKey) in one-way function operation; and a data output interface configured to output the encrypted secret identification information (E-SecretID) and the authentication information (Oneway-ID) to outside of the device.Type: ApplicationFiled: April 21, 2014Publication date: September 4, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
-
Publication number: 20140245024Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 28, 2013Publication date: August 28, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140245023Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 27, 2013Publication date: August 28, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji NAGAI, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140241527Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 22, 2013Publication date: August 28, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140245011Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 26, 2013Publication date: August 28, 2014Applicant: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140245010Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 25, 2013Publication date: August 28, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140237258Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 20, 2013Publication date: August 21, 2014Applicant: Kabushiki Kaisha ToshibaInventors: Yuji NAGAI, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140237264Abstract: According to one embodiment, an authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in a memory and being prohibited from being read from outside; transmitting encrypted secret identification information to an external device and receiving second authentication information from the external device, the encrypted secret identification information stored in a memory and readable, the second authentication information generated based on the encrypted secret identification information; and determining whether the first authentication information and the second authentication information match.Type: ApplicationFiled: November 13, 2013Publication date: August 21, 2014Applicant: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
-
Publication number: 20140237244Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 19, 2013Publication date: August 21, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140237249Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 15, 2013Publication date: August 21, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA, Toshihiro SUZUKI, Noboru SHIBATA
-
Patent number: 8812843Abstract: According to one embodiment, a device includes first and second data generator, a one-way function processor, and a data output interface. The first data generator generates a second key by encrypting a host constant with a first key in AES operation. The second data generator generates a session key by encrypting a random number with a second key in AES operation. The one-way function processor generates authentication information by processing secret identification information with the session key in one-way function operation. The data output interface outputs the encrypted secret identification information, a family key block, and the authentication information to outside of the device.Type: GrantFiled: June 15, 2012Date of Patent: August 19, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140229746Abstract: According to one embodiment, a authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in a memory and being prohibited from being read from outside; transmitting encrypted secret identification information to an external device and receiving second authentication information from the external device, the encrypted secret identification information stored in a memory and readable, the second authentication information generated based on the encrypted secret identification information; and determining whether the first authentication information and the second authentication information match.Type: ApplicationFiled: April 14, 2014Publication date: August 14, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA
-
Publication number: 20140229740Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.Type: ApplicationFiled: February 14, 2013Publication date: August 14, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
-
Publication number: 20140223188Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.Type: ApplicationFiled: April 8, 2014Publication date: August 7, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA
-
Publication number: 20140223173Abstract: A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the first controller identification information. A decryptor decrypts the encrypted medium device key using the controller unique key to obtain a medium device key. An authentication/key exchange process unit performs authentication/key exchange process with the host device through an interface unit using the medium device key and the medium device key certificate to establish the secure channel.Type: ApplicationFiled: April 11, 2014Publication date: August 7, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
-
Publication number: 20140208117Abstract: A server apparatus according to an embodiment generates a random number on receiving from a user apparatus a notification showing that a re-encryption key should be updated, and calculates re-encryption key data on the basis of the re-encryption key stored and the random number generated. The server apparatus transmits the re-encryption key to the user apparatus and receives, from the user apparatus, the user private key not updated yet and re-encryption key updating data calculated from the re-encryption key data on the basis of the user private key updated. The server apparatus calculates the re-encryption key updated, on the basis of the re-encryption key updating data and the random number, and replaces the re-encryption key stored in the storage device with the updated re-encryption key.Type: ApplicationFiled: March 19, 2014Publication date: July 24, 2014Applicants: Toshiba Solutions Corporation, Kabushiki Kaisha ToshibaInventors: Ryotaro HAYASHI, Tatsuyuki MATSUSHITA, Yoshihiro FUJII, Takuya YOSHIDA, Koji OKADA
-
Patent number: 8762717Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.Type: GrantFiled: June 15, 2012Date of Patent: June 24, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita