Patents by Inventor Tatsuyuki Matsushita

Tatsuyuki Matsushita has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140281543
    Abstract: A host device connected to a data recording device, includes a holding unit for holding a host device key and a host device certificate, an authentication/key exchange process unit configured to perform an authentication/key exchange process with the data recording device using the host device key and the host device certificate to receive medium device key certificate ID held in the data recording device and contained in the medium device key certificate, an interface unit configured to perform data communication with the data recording device through a secure channel, and an identification information generating unit configured to receive second controller identification information generated in the data recording device based on the first controller identification information by data communication through the secure channel and the interface unit, to generate data recording device identification information based on the second controller identification information and the medium device key certificate ID.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Inventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
  • Publication number: 20140281564
    Abstract: A method of authenticating access to a memory device that stores a host identification key and a host constant, includes generating a first key based on the host constant, decrypting a family key block read from an external device using the host identification key to generate a family key, decrypting encrypted secret identification information read from the external device using the family key to generate a secret identification information, generating a random number, generating a session key by using the first key and the random number, generating a first authentication information by processing the secret identification information with the session key in one-way function operation, and authenticating access to the memory device based on whether or not there is a match between the first authentication information and a second authentication information that is generated by the external device with the host constant transmitted to the external device.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Inventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA
  • Publication number: 20140281570
    Abstract: A method of performing an authentication process between a data recording device and a host device includes generating second controller identification information based on the first controller identification information, performing an authentication/key exchange process using the encrypted medium device key, the medium device key certificate, the host device key and the host device certificate to obtain medium device key certificate ID contained in the medium device key certificate, generating data recording device identification information based on the second controller identification information and the medium device key certificate ID, and generating a medium unique key based on the data recording device identification information.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Inventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
  • Publication number: 20140250302
    Abstract: According to one embodiment, a device includes a second data generator configured to generate a session key (SKey) by encrypting a random number (RN) with the second key (HKey) in AES operation; a one-way function processor configured to generate an authentication information (Oneway-ID) by processing the secret identification information (SecretID) with the session key (SKey) in one-way function operation; and a data output interface configured to output the encrypted secret identification information (E-SecretID) and the authentication information (Oneway-ID) to outside of the device.
    Type: Application
    Filed: April 21, 2014
    Publication date: September 4, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
  • Publication number: 20140245024
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 28, 2013
    Publication date: August 28, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140245023
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 27, 2013
    Publication date: August 28, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji NAGAI, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140241527
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 22, 2013
    Publication date: August 28, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140245011
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 26, 2013
    Publication date: August 28, 2014
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140245010
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 25, 2013
    Publication date: August 28, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140237258
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 20, 2013
    Publication date: August 21, 2014
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Yuji NAGAI, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140237264
    Abstract: According to one embodiment, an authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in a memory and being prohibited from being read from outside; transmitting encrypted secret identification information to an external device and receiving second authentication information from the external device, the encrypted secret identification information stored in a memory and readable, the second authentication information generated based on the encrypted secret identification information; and determining whether the first authentication information and the second authentication information match.
    Type: Application
    Filed: November 13, 2013
    Publication date: August 21, 2014
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
  • Publication number: 20140237244
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 19, 2013
    Publication date: August 21, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140237249
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 15, 2013
    Publication date: August 21, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA, Toshihiro SUZUKI, Noboru SHIBATA
  • Patent number: 8812843
    Abstract: According to one embodiment, a device includes first and second data generator, a one-way function processor, and a data output interface. The first data generator generates a second key by encrypting a host constant with a first key in AES operation. The second data generator generates a session key by encrypting a random number with a second key in AES operation. The one-way function processor generates authentication information by processing secret identification information with the session key in one-way function operation. The data output interface outputs the encrypted secret identification information, a family key block, and the authentication information to outside of the device.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: August 19, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140229746
    Abstract: According to one embodiment, a authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in a memory and being prohibited from being read from outside; transmitting encrypted secret identification information to an external device and receiving second authentication information from the external device, the encrypted secret identification information stored in a memory and readable, the second authentication information generated based on the encrypted secret identification information; and determining whether the first authentication information and the second authentication information match.
    Type: Application
    Filed: April 14, 2014
    Publication date: August 14, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA
  • Publication number: 20140229740
    Abstract: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information.
    Type: Application
    Filed: February 14, 2013
    Publication date: August 14, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita, Toshihiro Suzuki, Noboru Shibata
  • Publication number: 20140223188
    Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.
    Type: Application
    Filed: April 8, 2014
    Publication date: August 7, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Yuji NAGAI, Taku KATO, Tatsuyuki MATSUSHITA
  • Publication number: 20140223173
    Abstract: A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the first controller identification information. A decryptor decrypts the encrypted medium device key using the controller unique key to obtain a medium device key. An authentication/key exchange process unit performs authentication/key exchange process with the host device through an interface unit using the medium device key and the medium device key certificate to establish the secure channel.
    Type: Application
    Filed: April 11, 2014
    Publication date: August 7, 2014
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
  • Publication number: 20140208117
    Abstract: A server apparatus according to an embodiment generates a random number on receiving from a user apparatus a notification showing that a re-encryption key should be updated, and calculates re-encryption key data on the basis of the re-encryption key stored and the random number generated. The server apparatus transmits the re-encryption key to the user apparatus and receives, from the user apparatus, the user private key not updated yet and re-encryption key updating data calculated from the re-encryption key data on the basis of the user private key updated. The server apparatus calculates the re-encryption key updated, on the basis of the re-encryption key updating data and the random number, and replaces the re-encryption key stored in the storage device with the updated re-encryption key.
    Type: Application
    Filed: March 19, 2014
    Publication date: July 24, 2014
    Applicants: Toshiba Solutions Corporation, Kabushiki Kaisha Toshiba
    Inventors: Ryotaro HAYASHI, Tatsuyuki MATSUSHITA, Yoshihiro FUJII, Takuya YOSHIDA, Koji OKADA
  • Patent number: 8762717
    Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: June 24, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita