Patents by Inventor Yusuke Nemoto

Yusuke Nemoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070234138
    Abstract: A check computation circuit executes a computation corresponding to a computation for generating confidential CRC data, with respect to confidential data read from a non-volatile device. A comparison circuit compares the result of the computation in the check computation circuit with confidential CRC data read from the non-volatile device. When the result of the comparison indicates a mismatch, i.e., an error is detected, an encryption circuit encrypts the confidential data and the confidential CRC data using a secret key registered in a secret key register, and outputs the encrypted confidential data and confidential CRC data to the outside of a semiconductor integrated circuit.
    Type: Application
    Filed: February 8, 2007
    Publication date: October 4, 2007
    Inventors: Yuishi Torisaki, Makoto Fujiwara, Yusuke Nemoto
  • Publication number: 20070217614
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Application
    Filed: May 14, 2007
    Publication date: September 20, 2007
    Applicant: Matsushita Electric Industrial Co., Ltd
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Publication number: 20070168902
    Abstract: A Control Data Flow Graph (CDFG) which is an intermediate representation obtained by analyzing a behavioral-level circuit description of hardware, is subjected to a process of changing a shape of the CDFG by adding an operation before or after scheduling, so as to conceal design information. A CDFG to which a hardware resource has been allocated may be subjected to a process of changing the allocation of the hardware resource.
    Type: Application
    Filed: December 5, 2006
    Publication date: July 19, 2007
    Inventors: Osamu Ogawa, Kentaro Shiomi, Yusuke Nemoto, Yuishi Torisaki
  • Publication number: 20070015589
    Abstract: A communication card comprised of: an interface unit which communicates with the host; a first communication unit which communicates with an external device other than the host; an encryption unit which performs encryption processing onto data transferred between the host device and the external device via the interface unit and the first communication unit; a storage unit which stores: list information indicating a list of identifiers of unauthorized communication cards; and communication key information used for encryption; and a control unit which performs authentication processing, and only when the authentication processing has been completed normally, allows the host to control the first communication unit, causes said encryption unit to encrypt the data by using the communication key information after the authentication processing, and transfers the encrypted data to the host via the interface unit, in which the authentication processing includes processing of revoking an unauthorized communication car
    Type: Application
    Filed: July 11, 2006
    Publication date: January 18, 2007
    Applicant: Matsushita Electric Industrial Co., Ltd.
    Inventors: Kazuya Shimizu, Tomoya Sato, Kentaro Shiomi, Yusuke Nemoto, Yuishi Torisaki, Makoto Fujiwara
  • Patent number: 7133524
    Abstract: In the key installation system for improving the confidentiality and concealment of the key, a first decrypting circuit decrypts an encrypted key EKEY1(EDK(MK1)) using an encrypted key EDK1(MK1) as the key. A second decrypting circuit decrypts an encrypted key EMK1(KEY1) using the output of the second decrypting circuit, that is, an internal key KEY1 as the key. A third decrypting circuit decrypts the encrypted key EDK1(MK1) using the output of the second decrypting circuit, that is, an internal key MK1 as the key, to generate a final secret key DK1.
    Type: Grant
    Filed: September 19, 2002
    Date of Patent: November 7, 2006
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Makoto Fujiwara, Yusuke Nemoto
  • Publication number: 20060206634
    Abstract: A DMA controller is connected by a bus to a plurality of master devices and a plurality of slave devices, and performs a data transfer between slave devices which are specified as a source and a destination of the data transfer by a transfer condition received from any of the plurality of master devices. Each of the plurality of master devices and the plurality of slave devices has a rank used for judging data transfer permissibility. The DMA controller enables the data transfer if the data transfer is judged to be permitted as a result of a comparison between a rank of the master device and a rank of any of the specified slave devices, and disables the data transfer if the data transfer is judged to be prohibited.
    Type: Application
    Filed: February 23, 2006
    Publication date: September 14, 2006
    Inventors: Yuishi Torisaki, Makoto Fujiwara, Yusuke Nemoto
  • Publication number: 20060136749
    Abstract: In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique, extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus.
    Type: Application
    Filed: September 13, 2005
    Publication date: June 22, 2006
    Inventors: Tomoya Satou, Makoto Fujiwara, Kentarou Shiomi, Yusuke Nemoto, Yuishi Torisaki, Kazuya Shimizu, Shinji Inoue, Kazuya Fujimura, Makoto Ochi
  • Publication number: 20050271201
    Abstract: An encryption circuit of a secret key cryptosystem which inputs a plain text and a secret key 4A, inputs R partial keys Kn obtained from the secret key 4A and applies repeatedly R times of round operations to the plain text so that the plain text is encrypted including: registers 4G and 4H which store the values after the round operations of the plain text; a fault detection circuit 1A which decides whether a degenerate fault exists or not by the values of the registers 4G and 4H; and a circuit 1B which invalidates the secret key 4A when the degenerate fault exists in the detection result. The invention provides an encryption circuit which can appropriately respond to a new element of causing occurrence of the degenerate fault, suppress the cost of the hardware, and has a measure against the fault analysis while suppressing an increase in an encryption processing time.
    Type: Application
    Filed: May 20, 2005
    Publication date: December 8, 2005
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Kazuya Shimizu, Tomoya Sato, Kentaro Shiomi, Yusuke Nemoto, Yuishi Torisaki, Makoto Fujiwara
  • Publication number: 20050226410
    Abstract: To make the strict management of the security information possible, in a security information packaging system 120 which comprises a storing portion 120a for storing first encrypted security information EDK(MK)/address obtained by encrypting final security information DK by using internal security information MK and second encrypted security information EMK(CK)/address obtained by encrypting the internal security information MK by using converted security information CK, and an LSI 120b, the LSI 120b includes a seed generating portion 131 for storing a first constant IDfuse/address containing address information and serving as a generation source of a conversion seed and a second constant IDtst serving as a generation source of a conversion seed for testing and a third constant Const and then outputting either the conversion seed or the conversion seed for testing in response to a test signal.
    Type: Application
    Filed: March 30, 2005
    Publication date: October 13, 2005
    Inventors: Makoto Fujiwara, Yusuke Nemoto
  • Publication number: 20050120245
    Abstract: In a system which processes confidential information, use of a confidential information processing LSI due to unauthorized tampering of software, spoofing or the like is prevented and data on a bus are protected against analysis using a probe, etc. Within the confidential information processing LSI, software which controls the LSI 1002 is subjected to tampering detection which is executed by a comparator 1008 and authentication processing which is executed by a comparator 1020,thereby confirming the validity of the software and preventing use of the confidential information processing LSI by unauthorized software. The LSI and the software share session keys 1035 and 1038 which are based on a random number used for authentication processing and encrypted communications are attained using the session keys, which protects data on the bus.
    Type: Application
    Filed: November 26, 2004
    Publication date: June 2, 2005
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Yuishi Torisaki, Makoto Fujiwara, Yusuke Nemoto
  • Publication number: 20040186947
    Abstract: A CPU (Central Processing Unit) sets an unrewritable area in a nonvolatile memory in accordance with a program for system initialization stored in a boot ROM (Read Only Memory). An access control circuit controls permission/prohibition of rewriting based on a written flag set in the unrewritable area. This allows a system creator to freely write information which needs protection against tampering and also ensures protection against tampering of the information.
    Type: Application
    Filed: March 15, 2004
    Publication date: September 23, 2004
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Taichi Nagata, Yusuke Nemoto
  • Publication number: 20040153657
    Abstract: An development environment of a high security level is provided for a key-installed system. Development of a program for a system having an LSI device which includes a secure memory is performed by providing another LSI device having the same structure and setting the provided LSI device to a development mode which is different from a product operation mode. Alternatively, the provided LSI device is set to an administrator mode to perform development and encryption of a key-generation program. The LSI device is set to a key-generation mode to execute the encrypted key-generation program, thereby generating various keys.
    Type: Application
    Filed: July 23, 2003
    Publication date: August 5, 2004
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Publication number: 20040105548
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Application
    Filed: October 30, 2003
    Publication date: June 3, 2004
    Applicant: MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD.
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Patent number: 6736560
    Abstract: A removing member which rotates while being in contact with the periphery of a rotating member for conveying a sheet of paper that rotates while being in contact with a printed side of a sheet of paper is provided. When undried ink on the printed side is transferred to the periphery of the rotating member at the time of conveying the printed sheet, the undried ink is thinly spread in a part where the periphery of the rotating member and the periphery of the removing member come into contact with each other and therefore dried quicker. The removing member removes a part of the ink from the periphery of the rotating member. Consequently, the printed sheet is prevented from being smudged by the re-transfer. Since double-side printing or multicolor printing can be started before the ink on the printed side of the printed sheet of paper is completely dried, the work efficiency of the double-side printing or multicolor printing is improved.
    Type: Grant
    Filed: March 21, 2000
    Date of Patent: May 18, 2004
    Assignee: Tohoku Ricoh Co., Ltd.
    Inventor: Yusuke Nemoto
  • Publication number: 20040059928
    Abstract: A secure LSI device 1 includes an encryption section 2 for encrypting a program, and an external I/F 50 for inputting/outputting a program or data from/to an external memory 100. In the encryption section 2, the operation of a private key arithmetic processing section 20 is prohibited with respect to a sequence whose execution is determined by a key-generation/update sequencer 30 to be impermissible. In the external I/F 50, a program processing section 51 and a data processing section 55 are structured independently from each other.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 25, 2004
    Applicant: Mitsushita Electric Industrial Co., Ltd.
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Publication number: 20030161674
    Abstract: A removing member which rotates while being in contact with the periphery of a rotating member for conveying a sheet of paper that rotates while being in contact with a printed side of a sheet of paper is provided. When undried ink on the printed side is transferred to the periphery of the rotating member at the time of conveying the printed sheet, the undried ink is thinly spread in a part where the periphery of the rotating member and the periphery of the removing member come into contact with each other and therefore dried quicker. The removing member removes a part of the ink from the periphery of the rotating member. Consequently, the printed sheet is prevented from being smudged by the re-transfer. Since double-side printing or multicolor printing can be started before the ink on the printed side of the printed sheet of paper is completely dried, the work efficiency of the double-side printing or multicolor printing is improved.
    Type: Application
    Filed: March 21, 2000
    Publication date: August 28, 2003
    Inventor: Yusuke Nemoto
  • Publication number: 20030074571
    Abstract: In the key installation system for improving the confidentiality and concealment of the key, a first decrypting circuit decrypts an encrypted key EKEY1(EDK(MK1)) using an encrypted key EDK1(MK1) as the key. A second decrypting circuit decrypts an encrypted key EMK1(KEY1) using the output of the second decrypting circuit, that is, an internal key KEY1 as the key. A third decrypting circuit decrypts the encrypted key EDK1(MK1) using the output of the second decrypting circuit, that is, an internal key MK1 as the key, to generate a final secret key DK1.
    Type: Application
    Filed: September 19, 2002
    Publication date: April 17, 2003
    Inventors: Makoto Fujiwara, Yusuke Nemoto