Patents by Inventor Yusuke Kawasaki

Yusuke Kawasaki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6549993
    Abstract: In a system having an internal memory storing internal contents wherein an external memory for storing external contents is detachably mounted on said processing apparatus, for performing a processing according to the internal contents stored in said internal memory and the external contents stored in said external memory, a contents check method decides validity of the external contents stored in said external memory. The external contents stored in said external memory involve original check result information representative of a check result associated with validity of the external contents and original check result position information representative of a storage position of the original check result information. The external contents stored in said external memory is checked in accordance with a predetermined check algorithm to obtain a check result.
    Type: Grant
    Filed: December 8, 2000
    Date of Patent: April 15, 2003
    Assignee: Fujitsu Limited
    Inventors: Yusuke Kawasaki, Hiroshi Sakurai, Shigeru Hashimoto
  • Patent number: 6536673
    Abstract: A circuit, of a simple structure, for detecting the presence or absence of a proximity IC card (PICC) in a proximity coupling device (PCD) which transmits data to and receives data from the PICC. This circuit includes an antenna for receiving a carrier signal outputted to a proximity IC card, a D.C. detecting device for rectifying a carrier signal received from the antenna and for detecting a D.C. component of the received carrier signal, and a level judgment device for determining the level of the D.C. component detected by the D.C. detecting device and for judging, when the level of the direct component is within a predetermined range that a proximity IC card is present in an RF field.
    Type: Grant
    Filed: February 15, 2000
    Date of Patent: March 25, 2003
    Assignee: Fijitsu Limited
    Inventors: Yusuke Kawasaki, Yoshiyasu Sugimura, Shigeru Hashimoto
  • Patent number: 6519650
    Abstract: The present invention relates to a method and system capable of gaining access (data transfer) to portable type mediums whose number is larger than the number of ports on a processing unit side. Thus, in this invention, by using a demultiplexer, to one or more portable type medium ports provided in a processing unit there are connected a plurality of portable type mediums whose number is larger than the number of the ports. The demultiplexer selectively switches the ports and, of the plurality of portable type mediums, the mediums to be accessed by the processing unit for establishing the connections therebetween. This invention is applicable to data transfer between a plurality of portable type mediums such as IC cards capable of storing digital money and a processing unit having an ability to gain access to these portable type mediums.
    Type: Grant
    Filed: August 18, 1999
    Date of Patent: February 11, 2003
    Assignee: Fujitsu Limited
    Inventors: Yusuke Kawasaki, Shigeru Hashimoto, Koken Yamamoto
  • Publication number: 20030014643
    Abstract: An electronic apparatus is provided that can prevent wrongful reverse analysis by a third party. Authorization functions are provided in the electronic apparatus for judging whether or not to enable utilization of debugging functions. The authorization functions send command data to an external device connected to the electronic apparatus, based on a debug request containing the designation of a prescribed address range in the internal circuitry of the electronic apparatus, a first authorization is performed, based on the command data and on reply data to the command data received from the external device, a second authorization is performed, based on a user code received from the external device following the reply data, and use of the debugging functions is enabled, based on the first authorization and the second authorization.
    Type: Application
    Filed: March 26, 2002
    Publication date: January 16, 2003
    Applicant: Fujitsu Limited
    Inventors: Tomomi Asami, Shigeru Hashimoto, Koken Yamamoto, Yoshiyasu Sugimura, Yusuke Kawasaki
  • Publication number: 20020174383
    Abstract: An information processing apparatus includes a process part for implementing a reset process by a program based on an interrupt signal and hard-resetting by a hard reset signal, an information holding part for holding switching information that determines whether an external reset input is supplied to the process part as the interrupt signal or the hard reset signal, and a switch part for switching a supply of the external reset input to the process part as either the interrupt signal or the hard reset signal based on the switching information.
    Type: Application
    Filed: March 11, 2002
    Publication date: November 21, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Takahiro Hikosaka, Yusuke Kawasaki
  • Publication number: 20020174278
    Abstract: An information processing apparatus includes a process part implementing an access to a designated address having an access level, an access detector detecting the access, and an access part being capable of changing the access level of the designated address when the access is detected by the access detector.
    Type: Application
    Filed: March 12, 2002
    Publication date: November 21, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Shimpei Komatsu, Yusuke Kawasaki
  • Publication number: 20020029345
    Abstract: The present invention relates to a processing apparatus comprised with an internal circuit having a CPU and internal devices and an external circuit including external devices provided externally of the internal circuit, and the like, and is aimed to prevent illicit access and reverse engineering.
    Type: Application
    Filed: December 20, 2000
    Publication date: March 7, 2002
    Inventors: Yusuke Kawasaki, Hiroshi Sakurai, Shigeru Hashimoto, Koken Yamamoto
  • Publication number: 20020016914
    Abstract: An encryption control apparatus for encrypting and decrypting data that ensures data security by preventing illegal deciphering or leakage of the data is provided. A CPU 11A for running a program, a ROM 13A for storing the program run by the CPU, a RAM 12A used as a work area while the CPU is running the program, an I/O section 14A for sending/receiving data to/from an external device, and an encryption section 15A for decrypting encrypted data and encrypting plain text data are formed on a single semiconductor device.
    Type: Application
    Filed: December 12, 2000
    Publication date: February 7, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Yuji Seki, Yusuke Kawasaki, Shigeru Hashimoto, Ryoichi Yanagi
  • Publication number: 20020010856
    Abstract: Authentication circuits 2-3 to 2-11 are provided between a debug I/F circuit 2-1 and a debug terminal. The authentication circuit transmits a transmission key to externally at the time of activation, and authenticates from a received signal and the transmission key, and enables to access a debug I/F. It is possible to prevent a spurious access from the debug I/F by a third person by the authentication circuit.
    Type: Application
    Filed: February 16, 2001
    Publication date: January 24, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Yusuke Kawasaki, Shigeru Hashimoto
  • Publication number: 20020002702
    Abstract: The installation method makes possible the installation of new programs, while maintaining security, in a system LSI device. The installation method comprises a step for receiving the signature data 7 of a program 6, a step for checking for interference with other already installed programs on the basis of said signature data 7, and a step for authorizing the installation of programs with which there is no interference. A declaration of signature data is elicited from a program being installed; a check for interference among programs is performed based on this, authentication is performed, and the installation of interfering programs is prevented or the installation of programs with which there is no interference is executed. It therefore becomes possible to install new programs while protecting high-security programs.
    Type: Application
    Filed: February 1, 2001
    Publication date: January 3, 2002
    Applicant: FUJITSU LIMITED
    Inventors: Tomomi Shiobara, Yusuke Kawasaki, Shigeru Hashimoto
  • Publication number: 20020002676
    Abstract: In a system having an internal memory storing internal contents wherein an external memory for storing external contents is detachably mounted on said processing apparatus, for performing a processing according to the internal contents stored in said internal memory and the external contents stored in said external memory, a contents check method decides validity of the external contents stored in said external memory. The external contents stored in said external memory involve original check result information representative of a check result associated with validity of the external contents and original check result position information representative of a storage position of the original check result information. The external contents stored in said external memory is checked in accordance with a predetermined check algorithm to obtain a check result.
    Type: Application
    Filed: December 8, 2000
    Publication date: January 3, 2002
    Inventors: Yusuke Kawasaki, Hiroshi Sakurai, Shigeru Hashimoto
  • Publication number: 20010021966
    Abstract: An access violation of the program is monitored by the access monitor which is a hardware. The access monitor acquires a signal input from the CPU to a memory. The access monitor includes an access permission table as information of the memory region to be permitted to each program, and detects the access violation of the signal from the CPU by referring thereto. In this manner, the unjust access is monitored by the hardware, thereby preventing the unjust access by rewriting in software.
    Type: Application
    Filed: December 20, 2000
    Publication date: September 13, 2001
    Applicant: FUJITSU LIMITED
    Inventors: Yusuke Kawasaki, Shigeru Hashimoto, Koken Yamamoto, Tomomi Shiobara, Ryoichi Yanagi