scispace - formally typeset
Search or ask a question
Author

Hirobumi Muratani

Other affiliations: Panasonic
Bio: Hirobumi Muratani is an academic researcher from Toshiba. The author has contributed to research in topics: Watermark & Algebraic torus. The author has an hindex of 10, co-authored 35 publications receiving 418 citations. Previous affiliations of Hirobumi Muratani include Panasonic.

Papers
More filters
Patent
23 Jun 1997
TL;DR: A software use method control system including a storage device and an access controller is described in this article, where a privilege protecting section includes an input receiver for receiving an execution request made by a software user, a program-executing device for executing a program having a right to access all system resources of the operating systems, and a program execution inhibiting device for determining whether the program executing device is allowed to execute the program, from the execution request which the input receiver has received.
Abstract: A software use method control system including a storage device and an access controller. The storage device stores information for designating a right to access system resources of operating systems which are to be executed in the software use method control system. The access controller controls access to the system resources of the operating systems. The system also includes a privilege protecting section. The privilege protecting section includes an input receiver for receiving an execution request made by a software user, a program-executing device for executing a program having a right to access all system resources of the operating systems, and a program-execution inhibiting device for determining whether the program-executing device is allowed to executed the program, from the execution request which the input receiver has received, and for inhibiting the program executing device from executing the programs when the programs are not allowed to be executed.

112 citations

Patent
Hirobumi Muratani1
30 Apr 1998
TL;DR: The first key is included in message data, which is associated with the content data and is transmitted separately to a user site as mentioned in this paper, and the second key is further encrypted using a third key within the security module.
Abstract: An information providing system comprises an encryption unit for encrypting content data using a first key. The first key is included in message data which is associated with the content data and is separately transmitted to a user site. The message data is also encrypted using a second key within a security module. The second key is further encrypted using a third key within the security module. The third key is never read out to the outside of the security module.

54 citations

Patent
11 Jul 2001
TL;DR: Expanded key schedule circuit for common key encryption system in which expanded keys are used in a predetermined order in data randomizing process for encryption and in a reversed order for decryption, comprises round processing circuits connected in series as discussed by the authors.
Abstract: Expanded key schedule circuit for common key encryption system in which expanded keys are used in a predetermined order in data randomizing process for encryption and in a reversed order in data randomizing process for decryption, comprises round processing circuits connected in series. The round processing circuits subject the common key or sub key of a previous stage to a round function to output a sub key. The sub key of the last stage is equal to the common key. The expanded keys are generated from the sub keys.

42 citations

Patent
Hirobumi Muratani1
28 Sep 2005
TL;DR: In this paper, a digital watermark detecting device comprises a sequence generator which generates a predetermined sequence of numbers corresponding to a watermark which is to be detected, a shift circuit which shifts the digital content in unit of a predetermined part of data in predetermined directions, and obtain a predetermined number of shifted contents.
Abstract: A digital watermark detecting device comprises a sequence generator which generates a predetermined sequence of numbers corresponding to a watermark which is to be detected, a shift circuit which shifts the digital content in unit of a predetermined part of data in predetermined directions, and obtain a predetermined number of shifted contents, a correlation calculator which divides the digital content and the shifted contents into blocks, arranges predetermined data obtained from the blocks of the contents to form sequences of numbers for each of the digital content and the shifted contents, and calculates correlations between the predetermined sequence of numbers and the sequences of numbers, and a determination unit which determines whether the predetermined sequence of numbers exists in the digital content based on the correlations.

29 citations

Patent
20 Sep 2005
TL;DR: A digital watermark detecting apparatus includes an acquisition unit configured to acquire a plurality of base values for computation of a watermark value, which are contained, respectively, in all or some of the divided regions obtained by dividing digital contents.
Abstract: A digital watermark detecting apparatus includes an acquisition unit configured to acquire a plurality of base values for computation of a watermark value, which are contained, respectively, in all or some of a plurality of divided regions obtained by dividing digital contents, a computation unit configured to compute variance of the base values, and a determination unit configured to determine whether the digital watermark is contained in the digital contents, based on comparison of the computed variance with a threshold.

27 citations


Cited by
More filters
Patent
27 Jul 2007
TL;DR: In this article, the authors describe a system and methods for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences.
Abstract: Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs.

667 citations

Patent
20 Jan 2000
TL;DR: In this article, a method for securely receiving data on a user's system from a web broadcast infrastructure with a plurality of channels is presented, which includes receiving promotional metadata from a first web broadcast channel, the promotional metadata related to data available for reception; assembling at least part of the promotional offering into a promotional offering for review by a user; selecting by the user, data to be received related to the metadata; and receiving data from a second web broadcast channels, the data selected from the promoted metadata, and wherein the data has been previously encrypted using a first encrypting key;
Abstract: A method of securely receiving data on a user's system from a web broadcast infrastructure with a plurality of channels. The method comprising receiving promotional metadata from a first web broadcast channel, the promotional metadata related to data available for reception; assembling at least part of the promotional metadata into a promotional offering for review by a user; selecting by a user, data to be received related to the promotional metadata; receiving data from a second web broadcast channel, the data selected from the promotional metadata, and wherein the data has been previously encrypted using a first encrypting key; and receiving the first decrypting key via a computer readable medium, the first decrypting key for decrypting at least some of the data received via the second web broadcast channel. In another embodiment, a method and system to transmit data securely from a web broadcast center is disclosed.

665 citations

Patent
18 Oct 2006
TL;DR: In this paper, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized, and in some embodiments, the licenses contain control programs that are executable by the digital right management engine.
Abstract: Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine.

472 citations

Patent
16 May 2006
TL;DR: In this article, the authors present a software container format for protecting digital property content (e.g., audio, video, game, etc.) and control object (i.e., set of rules) information.
Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations. A secure “software container” can be used to protectively encapsulate (e.g., by cryptographic techniques) various digital property content (e.g., audio, video, game, etc.) and control object (i.e., set of rules) information. A standardized container format is provided for general use on/with various mediums and platforms. In addition, a special purpose container may be provided for DVD medium and appliances (e.g., recorders, players, etc.) that contains DVD program content (digital property) and DVD medium specific rules. The techniques, systems and methods disclosed herein are capable of achieving compatibility with other protection standards, such as for example, CGMA and Matsushita data protection standards adopted for DVDs. Cooperative rights management may also be provided, where plural networked rights management arrangements collectively control a rights management event on one or more of such arrangements.

437 citations

Patent
25 May 2006
TL;DR: A data management system for managing the storage of data on primary and secondary storage from a primary information source having original file content to be stored that may be accessed without stateful middleware.
Abstract: The present invention provides a system to ensure security of data in a computer network system A center certifies a public-key of user of the system and distributes a secret-key A first system comprises the center in a network, an information provider and a plurality of users The center identifies utilization status by requests of the secret-key The data is encrypted by the secret-key and is stored and transferred, while the data to be stored and transferred is encrypted by a secret-key different from the secret-key of the transferred data An original data label is added to the original data, and an edit label is added to the edited data, and the center does not store the data and stores only the original data label and the edit label A second system comprises a center and an information provider in a network, and a plurality of users utilizing the network The center stores the original data and editing scenario, and also the original data label, user label and edit label The data is not transferred between the users, but data label encrypted by the public-key is transferred In electronic commerce system, every data is distributed through a mediator in the network, data which is transferred from a maker to a user is encrypted by a secret-key for encryption, and data which is transferred from the user to the maker is encrypted by a secret-key for re-encryption

413 citations