Patents by Inventor Wataru Inoha

Wataru Inoha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6889323
    Abstract: A signal representative of a key is generated from authenticator-value information and key base information. The authenticator-value information represents a specified authenticator value. The key base information contains identification information which is set to reproduce the specified authenticator value according to a predetermined degeneration function. Contents information is encrypted into encryption-resultant contents information in response to the key signal. The key base information and the encryption-resultant contents information are transmitted or recorded.
    Type: Grant
    Filed: December 1, 2000
    Date of Patent: May 3, 2005
    Assignee: Victor Company of Japan, Ltd.
    Inventors: Takayuki Sugahara, Toshio Kuroiwa, Wataru Inoha, Kenjiro Ueda, Seiji Higurashi
  • Publication number: 20040120404
    Abstract: A predetermined code word is allocated to each of data values in the number of time series data obtained by orthogonal transform of a supplied picture signal or audio signal, and a variable length coding table is obtained. From among the code words written in the variable length coding table, code words to which the same number of time series data are allocated and differ from each other are exchanged to generate an exchanged variable length coding table. Then, a coding selection signal is generated by a CPU to determine either the variable length coding table or the exchanged variable length coding table with which variable length coding is performed by a VLC unit. The coding selection signal is thereafter outputted together with a compressed and encoded signal, and a configuration of a contents signal encoding apparatus is thus realized.
    Type: Application
    Filed: November 25, 2003
    Publication date: June 24, 2004
    Inventors: Takayuki Sugahara, Masayoshi Nishitani, Wataru Inoha
  • Publication number: 20030081773
    Abstract: An encryption key is generated in response to a plurality of information pieces being bases for the encryption key. Original information is encrypted into encryption-resultant information in response to the generated encryption key. The encryption-resultant information is divided into units. Each of the units is loaded with encryption control information for identifying the plurality of information pieces being the bases for the encryption key.
    Type: Application
    Filed: August 26, 2002
    Publication date: May 1, 2003
    Inventors: Takayuki Sugahara, Wataru Inoha, Seiji Higurashi, Toshio Kuroiwa, Kenjiro Ueda
  • Publication number: 20020131595
    Abstract: The present invention relates to an encryption method for encrypting information including a series of multiple unit blocks, one at a time, a decryption method for decrypting multiple encrypted unit blocks, one at a time, and a recording and reproducing apparatus that uses those methods. The seed of an encryption key for encrypting each unit block and the seed of an encryption key for decrypting each encrypted unit block, which are used by those methods and the recording and reproducing apparatus, are based on a unit block that is one or more unit blocks before the current unit block in a reproduction order or on information generated by encrypting one or more unit blocks before the current unit block. Alternatively, the seed of an encryption key for encrypting each unit block and the seed of an encryption key for decrypting each encrypted unit block are information based on an encryption key for encrypting a unit block before the current unit block in a reproduction order.
    Type: Application
    Filed: March 8, 2002
    Publication date: September 19, 2002
    Inventors: Kenjiro Ueda, Takayuki Sugahara, Wataru Inoha, Seiji Higurashi, Toshio Kuroiwa
  • Publication number: 20020085714
    Abstract: A recording apparatus generates key information based at least on contents reproduction permission information, encrypts contents based on the key information, and records the encrypted contents and recording date/time information on a recording medium. A reproducing apparatus reads the encrypted contents and the recording date/time information from the recording medium, acquires reproduction date/time information on the encrypted contents and, based on the recording date/time information that was read, the reproduction date/time information, and reproduction permission limit information on the encrypted contents, generates contents reproduction permission information indicating that the encrypted contents maybe reproduced. The reproducing apparatus generates key information based at least on the contents reproduction permission information and decrypts the encrypted contents that were read.
    Type: Application
    Filed: December 21, 2001
    Publication date: July 4, 2002
    Inventors: Wataru Inoha, Takayuki Sugahara, Kenjiro Ueda, Toshio Kuroiwa, Seiji Higurashi
  • Publication number: 20020037161
    Abstract: Executes a re-encoding after decoding data of a connection section A of a first MPEG picture data. This re-encoding is executed based on a control such that a transition of a VBV buffer occupation value starts from a VBV buffer occupation value at a position a and ends with a VBV buffer occupation value at a position d. Up to the position a of the first MPEG picture data, the first MPEG picture data is reproduced. Next, re-encoded MPEG picture data of the connection section A is reproduced. Thereafter, the data is connected to the position d of a second MPEG picture data, and the second MPEG picture data of the position d and after is reproduced.
    Type: Application
    Filed: September 25, 2001
    Publication date: March 28, 2002
    Inventors: Takayuki Sugahara, Seiji Higurashi, Toshio Kuroiwa, Wataru Inoha, Kenjiro Ueda
  • Publication number: 20010047481
    Abstract: A method according to the present invention starts reproduction of contents while contents validity is verified based on signature information. If it is found that the contents are invalid as a result of contents validity verification based on the signature information, the method stops the reproduction of contents and inhibits subsequent reproduction. The method may verify the validity only when a flag indicates that the signature information for contents validity to be reproduced is present. Also, the method may compare an invalid signature information entry recorded in signature information memory with the signature information read from the recording medium. If the signature information memory contains an entry that matches the signature information, the method does not request a signature verification unit to verify the contents of the signature but determines the contents as invalid.
    Type: Application
    Filed: May 22, 2001
    Publication date: November 29, 2001
    Inventors: Wataru Inoha, Seiji Higurashi, Takayuki Sugahara, Yoshito Kuroda
  • Publication number: 20010011251
    Abstract: A signal representative of a key is generated from authenticator-value information and key base information. The authenticator-value information represents a specified authenticator value. The key base information contains identification information which is set to reproduce the specified authenticator value according to a predetermined degeneration function. Contents information is encrypted into encryption-resultant contents information in response to the key signal. The key base information and the encryption-resultant contents information are transmitted or recorded.
    Type: Application
    Filed: December 1, 2000
    Publication date: August 2, 2001
    Inventors: Takayuki Sugahara, Toshio Kuroiwa, Wataru Inoha, Kenjiro Ueda, Seiji Higurashi
  • Publication number: 20010009579
    Abstract: Bits of a first bit sequence are rearranged in a first matrix according to a predetermined arrangement rule. The first bit sequence represents information being a base of a key. Blocks are formed in the first matrix. Each of the blocks has bits, the number of which is smaller than the number of bits composing the first matrix. Logical operation is executed among bits in each of the blocks, and a bit being a result of the logical operation is generated. The logical-operation-result bits are combined into a second bit sequence. The number of bits composing the second bit sequence is smaller than the number of bits composing the first bit sequence. There is a second matrix composed of predetermined third bit sequences. The second matrix is accessed and one is read out from among the third bit sequences in response to the second bit sequence. The read-out third bit sequence is outputted as information representative of the key.
    Type: Application
    Filed: December 11, 2000
    Publication date: July 26, 2001
    Inventors: Wataru Inoha, Takayuki Sugahara, Toshio Kuroiwa, Kenjiro Ueda, Seiji Higurashi
  • Publication number: 20010009006
    Abstract: A first-key signal representative of a first key is generated from first-key base information being a base of the first key. Contents information is encrypted into encryption-resultant contents information in response to the first-key signal. A second-key signal representative of a second key is generated from second-key base information being a base of the second key. The first-key base information is encrypted into encryption-resultant first-key base information in response to the second-key signal. Second-key-related information is generated from the second-key base information and additional information according to a predetermined function. The encryption-resultant contents information, the encryption-resultant first-key base information, and the second-key-related information are transmitted or recorded.
    Type: Application
    Filed: December 1, 2000
    Publication date: July 19, 2001
    Inventors: Takayuki Sugahara, Toshio Kuroiwa, Wataru Inoha, Kenjiro Ueda, Seiji Higurashi