Patents by Inventor Tetsutaro Kobayashi
Tetsutaro Kobayashi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200084185Abstract: The present invention makes it possible to improve confidentiality. A communication terminal stores a session key shared with other communication terminals (S3). The communication terminal makes a pair of an index generated by using the session key for a character string relating to a message and a message identifier, and transmits it to a server apparatus (S4). The server apparatus stores the pair of the index and the message identifier (S5). The communication terminal generates, when the session key is updated, a re-encryption key with a session key before update and a session key after update (S8). The server apparatus updates, by using the re-encryption key, the stored index to an index generated by using the session key after update (S9). The communication terminal encrypts a search keyword with the session key to generate a search query (S10). The server apparatus extracts a message identifier of which the index matches the search query (S11).Type: ApplicationFiled: December 6, 2017Publication date: March 12, 2020Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki OKANO, Reo YOSHIDA, Tetsutaro KOBAYASHI
-
Patent number: 10546140Abstract: A leakage prevention apparatus stores an assumed use permission range, stores an information asset caused to be in an unavailable state by encryption, stores an information asset caused to be in an available state by decryption, and stores an information asset caused to be in a leakage-concerned state. When use of an information asset in the unavailable state is requested by an application corresponding to the use permission range, the information asset is decrypted to cause the information asset to be in the available state. When the use of the information asset in the available state by the application ends, the information asset is encrypted to cause the information asset to be in the unavailable state. When use of an information asset in the unavailable state is requested by an application not corresponding to the use permission range, the information asset is caused to be in the leakage-concerned state.Type: GrantFiled: January 14, 2016Date of Patent: January 28, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reo Yoshida, Hitoshi Fuji, Tetsutaro Kobayashi, Junya Akiba, Tomoaki Washio, Tsuyoshi Miyamoto
-
Patent number: 10419213Abstract: A random number generating unit generates random numbers s1, s2, s?1, and s?2. A public keys randomizing unit generates first randomized public keys information obtained by randomizing public keys using the random number s1 and second randomized public keys information obtained by randomizing the public keys using the random number s2. A proxy calculation unit calculates a first commission result by using a secret key and calculates a second commission result by using the secret key. A verification unit calculates a first verification value by using the random number s2, calculates a second verification value by using the random number s1, and verifies whether or not the first verification value and the second verification value coincide with each other. A common key calculation unit calculates a common key by using the random numbers s?1 and s?2 if the first verification value and the second verification value coincide with each other.Type: GrantFiled: January 12, 2016Date of Patent: September 17, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Akira Nagai, Tsunekazu Saito, Tetsutaro Kobayashi
-
Publication number: 20190238523Abstract: A communication terminal shares a session key with and sends cipher text to another communication terminal via a server device, including: a common key cipher text obtaining unit that encrypts a message based on a common key to obtain common key cipher text; a function computation result obtaining unit that computes the common key and the session key based on a predetermined first function to obtain a function computation result; a public key cipher text obtaining unit that encrypts the function computation result based on a public key to obtain public key cipher text; and a cipher text sending unit that sends the common key cipher text and the public key cipher text to the server device. The communication terminal can update data previously saved in a server to data that can be decrypted on the communication terminal side using an updated session key, without the server decrypting the data.Type: ApplicationFiled: July 6, 2017Publication date: August 1, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki OKANO, Reo YOSHIDA, Ryo NISHIMAKI, Tetsutaro KOBAYASHI
-
Patent number: 10361841Abstract: A computing apparatus outputs ?1 and ?2 corresponding to a ciphertext x, a capability providing apparatus uses ?1 to correctly compute f(?1) with a probability greater than a certain probability and sets the result of the computation as z1, uses ?2 to correctly compute f(?2) with a probability greater than a certain probability and sets the result of the computation as z2, the computing apparatus generates a computation result u=f(x)bx1 from z1, generates a computation result v=f(x)ax2 from z2, and outputs ub?va? if the computation results u and v satisfy a particular relation, where G and H are groups, f(x) is a function for obtaining an element of the group G for x?H, X1 and X2 are random variables having values in the group G, x1 is a realization of the random variable X1, and x2 is a realization of the random variable X2.Type: GrantFiled: August 23, 2017Date of Patent: July 23, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Go Yamamoto, Tetsutaro Kobayashi
-
Key exchange method, key exchange system, key distribution device, communication device, and program
Patent number: 10355856Abstract: Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key generation unit computes Ri and ci based on a twisted pseudo-random function. A session ID generation unit generates sid based on a target-collision resistant hash function and transmits (sid, R?, R?) to communication devices Ui. A second key generation unit of a representative communication device U1 computes T1 based on a pseudo-random function. A second key generation unit of general communication devices Uj computes Tj based on the pseudo-random function. A third key generation unit computes k? based on the twisted pseudo-random function and computes T?j with respect to each j. A session key generation unit of the general communication devices Uj computes Kjl and k1. The session key generation unit generates a common key K2 based on the pseudo-random function.Type: GrantFiled: April 21, 2016Date of Patent: July 16, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reo Yoshida, Hitoshi Fuji, Tetsutaro Kobayashi, Tomohide Yamamoto, Yuto Kawahara, Kazuki Yoneyama -
ENCRYPTED MESSAGE SEARCH METHOD, MESSAGE TRANSMISSION/RECEPTION SYSTEM, SERVER, TERMINAL AND PROGRAM
Publication number: 20190215158Abstract: There is provided an encrypted message search technique making it difficult to, at the time of searching for a message in a state of being encrypted, guess content of the search and a result of the search.Type: ApplicationFiled: August 30, 2017Publication date: July 11, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuki OKANO, Reo YOSHIDA, Ryo NISHIMAKI, Tetsutaro KOBAYASHI -
Patent number: 10313106Abstract: A computing apparatus outputs ?1 and ?2 corresponding to a ciphertext x, a capability providing apparatus uses ?1 to correctly compute f(?1) with a probability greater than a certain probability and sets the result of the computation as z1, uses ?2 to correctly compute f(?2) with a probability greater than a certain probability and sets the result of the computation as z2, the computing apparatus generates a computation result u=f(x)bx1 from z1, generates a computation result v=f(x)ax2 from z2, and outputs ub?va? if the computation results u and v satisfy a particular relation, where G and H are groups, f(x) is a function for obtaining an element of the group G for x?H, X1 and X2 are random variables having values in the group G, x1 is a realization of the random variable X1, and x2 is a realization of the random variable X2.Type: GrantFiled: August 23, 2017Date of Patent: June 4, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Go Yamamoto, Tetsutaro Kobayashi
-
Patent number: 10275960Abstract: At the time of setting authority, a management apparatus stores a database in which authority information corresponding to authority to physically drive a drive apparatus, which is a tangible object, using a terminal apparatus, and registration identification information corresponding to a subject that is given the authority are associated, and outputs information representing any of the registration identification information; and a permission apparatus receives and stores the information. At the time of exercising the authority, the terminal apparatus outputs information representing identification information, and the permission apparatus receives the information and, when the identification information corresponds to registration identification information comprised in setting information, outputs information representing authority exercise information required to exercise the authority.Type: GrantFiled: May 12, 2015Date of Patent: April 30, 2019Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hitoshi Fuji, Tomohide Yamamoto, Tetsutaro Kobayashi, Reo Yoshida
-
Publication number: 20190124058Abstract: To provide a terminal device that can share a session key for use in encryption communication with multiple terminal devices at a certain timing without relying on an existing server device.Type: ApplicationFiled: June 8, 2017Publication date: April 25, 2019Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Yuto KAWAHARA, Hitoshi FUJI, Tetsutaro KOBAYASHI, Reo YOSHIDA, Tomohide YAMAMOTO
-
Patent number: 10163370Abstract: A decoding apparatus performs self-correcting processing with a decoding capability providing apparatus holding a decoding key for decoding first ciphertext which can be decoded by homomorphic operation to obtain a decoding value of the first ciphertext, and performs non-homomorphic operation using a value corresponding to or deriving from the decoding value of the first ciphertext and an addition value to output plaintext.Type: GrantFiled: June 30, 2014Date of Patent: December 25, 2018Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reo Yoshida, Go Yamamoto, Tetsutaro Kobayashi
-
Publication number: 20180359234Abstract: A client apparatus converts second input authentication information having a data content compliant with a second authentication method different from a first authentication method into authentication target information in a data format compliant with the first authentication method and transmits information corresponding to the authentication target information to a communication server apparatus. A server apparatus is capable of carrying out both a first process of providing a first authentication server apparatus that carries out an authentication process compliant with the first authentication method with first information corresponding to the authentication target information and a second process of providing a second authentication server apparatus that carries out an authentication process compliant with the second authentication method with second information corresponding to the authentication target information.Type: ApplicationFiled: December 15, 2016Publication date: December 13, 2018Applicants: NIPPON TELEGRAPH AND TELEPHONE CORPORATION, NTT Innovation Institute, Inc.Inventors: Tetsutaro KOBAYASHI, Hitoshi FUJI, Akira NAGAI, Go YAMAMOTO
-
Patent number: 10033711Abstract: Name information which is generated by using a value corresponding to a decryption key and address information of a key cloud device which provides a cloud-key management type decryption service in which the decryption key is used are stored in a storage of a directory service device in a manner to associate the name information with the address information, and a searching unit of the directory service device searches the storage by using the inputted name information to obtain address information corresponding to the inputted name information.Type: GrantFiled: July 16, 2014Date of Patent: July 24, 2018Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tomohide Yamamoto, Go Yamamoto, Tetsutaro Kobayashi
-
KEY EXCHANGE METHOD, KEY EXCHANGE SYSTEM, KEY DISTRIBUTION DEVICE, COMMUNICATION DEVICE, AND PROGRAM
Publication number: 20180183583Abstract: Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key generation unit computes Ri and ci based on a twisted pseudo-random function. A session ID generation unit generates sid based on a target-collision resistant hash function and transmits (sid, R?, R?) to communication devices Ui. A second key generation unit of a representative communication device U1 computes T1 based on a pseudo-random function. A second key generation unit of general communication devices Uj computes Tj based on the pseudo-random function. A third key generation unit computes k? based on the twisted pseudo-random function and computes T?j with respect to each j. A session key generation unit of the general communication devices Uj computes Kjl and k1. The session key generation unit generates a common key K2 based on the pseudo-random function.Type: ApplicationFiled: April 21, 2016Publication date: June 28, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reo YOSHIDA, Hitoshi FUJI, Tetsutaro KOBAYASHI, Tomohide YAMAMOTO, Yuto KAWAHARA, Kazuki YONEYAMA -
Patent number: 9960906Abstract: A computing apparatus outputs ?1 and ?2 corresponding to a ciphertext x, a capability providing apparatus uses ?1 to correctly compute f(?1) with a probability greater than a certain probability and sets the result of the computation as z1, uses ?2 to correctly compute f(?2) with a probability greater than a certain probability and sets the result of the computation as z2, the computing apparatus generates a computation result u=f(x)bx1 from z1, generates a computation result v=f(x)ax2 from z2, and outputs ub?va? if the computation results u and v satisfy a particular relation, where G and H are groups, f(x) is a function for obtaining an element of the group G for x?H, X1 and X2 are random variables having values in the group G, x1 is a realization of the random variable X1, and x2 is a realization of the random variable X2.Type: GrantFiled: December 22, 2016Date of Patent: May 1, 2018Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Go Yamamoto, Tetsutaro Kobayashi
-
Publication number: 20180115414Abstract: A server sends a key update request for requesting updating of the key, to a client terminal. The client terminal sends, to a key delivery server, a key delivery request for requesting the delivery of a key to the client terminal. The key delivery server delivers a key to the client terminal. The client terminal sends, to the server, a key reception notice indicating that the delivered key was received. The server sends, to the client terminal, a key-use start notice indicating that the client terminal starts data transmission and reception by using the delivered key with a different client terminal from the aforementioned client terminal. The client terminal performs data transmission and reception with the different client terminal by using the delivered key.Type: ApplicationFiled: April 20, 2016Publication date: April 26, 2018Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reo YOSHIDA, Hitoshi FUJI, Tetsutaro KOBAYASHI, Tomohide YAMAMOTO, Yuto KAWAHARA
-
Patent number: 9894056Abstract: The risk of leakage of secret information caused by leakage of a secret key is reduced. A segmented secret-key storage system segments a secret key SK into segments that can be combined at the time of decryption or at the time of generation of a signature and records the secret-key segments sk1, . . . , skN in segment storage apparatuses. The secret-key segments are changed, periodically or under a predetermined condition, to another set of secret-key segments that satisfies a condition for combination. In the segmented secret-key storage system, the secret key SK is not revealed unless the secret-key segments are stolen from all the segment storage apparatuses in an interval between changes made to the secret-key segments. Accordingly, the risk of leakage can be greatly reduced in comparison with the risk of leakage of the secret key from a single apparatus.Type: GrantFiled: January 16, 2014Date of Patent: February 13, 2018Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tetsutaro Kobayashi, Go Yamamoto, Reo Yoshida
-
Publication number: 20170372086Abstract: An assumed use permission range storage stores a predetermined assumed use permission range. An unavailable state storage stores an information asset in an unavailable state by encryption. An available state storage stores an information asset in an available state by decryption. A leakage-concerned state storage stores an information asset in a leakage-concerned state. When use of an information asset in the unavailable state is requested by an application corresponding to the assumed use permission range, a state changing part decrypts the information asset into the available state. When use of the information asset in the available state by the application ends, the state changing part encrypts the information asset into the unavailable state. When use of an information asset in the unavailable state is requested by an application not corresponding to the assumed use permission range, a state monitoring part puts the information asset in the leakage-concerned state.Type: ApplicationFiled: January 14, 2016Publication date: December 28, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Reo YOSHIDA, Hitoshi FUJI, Tetsutaro KOBAYASHI, Junya AKIBA, Tomoaki WASHIO, Tsuyoshi MIYAMOTO
-
Publication number: 20170373841Abstract: A random number generating unit generates random numbers s1, s2, s?1, and s?2. A public keys randomizing unit generates first randomized public keys information obtained by randomizing public keys using the random number s1 and second randomized public keys information obtained by randomizing the public keys using the random number s2. A proxy calculation unit calculates a first commission result by using a secret key and calculates a second commission result by using the secret key. A verification unit calculates a first verification value by using the random number s2, calculates a second verification value by using the random number s1, and verifies whether or not the first verification value and the second verification value coincide with each other. A common key calculation unit calculates a common key by using the random numbers s?1 and s?2 if the first verification value and the second verification value coincide with each other.Type: ApplicationFiled: January 12, 2016Publication date: December 28, 2017Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Akira NAGAI, Tsunekazu SAITO, Tetsutaro KOBAYASHI
-
Patent number: 9842086Abstract: A first calculation unit is capable of calculating f(x)bx1 and sets a calculation result of f(x)bx1 to u, and a second calculation unit is capable of calculating f(x)ax2, and sets a calculation result of f(x)ax2 to v. A final calculation unit outputs (ub?va?)1/d for d=a?a+b?b when the calculation result u and the calculation result v satisfy ua=vb. Here, G and H are groups, f is a function for mapping an element x of the group H to the group G, X1 and X2 are random variables values of which are in the group G, a realization of the random variable X1 is x1, a realization of the random variable X2 is x2, and a, b, a?, and b? are integers.Type: GrantFiled: June 30, 2014Date of Patent: December 12, 2017Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tetsutaro Kobayashi, Go Yamamoto