1
Toshio Okamoto, Atsushi Shimbo, Masahiro Ishiyama: User identification data management scheme for networking computer systems using wide area network. Kabushiki Kaisha Toshiba, Foley & Lardner, August 31, 1999: US05944794 (213 worldwide citation)

A user identification data management scheme for a networking computer systems formed by a plurality of computers which are mutually connected through a network. In this scheme, at each computer, whether an access request from a user at another computer to each computer is to be permitted or not is ...


2
Atsushi Shimbo, Toshinari Takahashi, Ichiro Tomoda, Masao Murota: File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing. Kabushiki Kaisha Toshiba, Foley & Lardner, November 10, 1998: US05835601 (158 worldwide citation)

A file editing system that provides a high file content secrecy, a file version management, and an asynchronous editing is disclosed. For a high file content secrecy, the block data of files managed by a file management server device are enciphered in units of blocks, and a client device obtains the ...


3
Atsushi Inoue, Masahiro Ishiyama, Atsushi Fukumoto, Yoshiyuki Tsuda, Atsushi Shimbo, Toshio Okamoto: Mobile computing scheme using encryption and authentication processing based on mobile computer location and network operating policy. Kabushiki Kaisha Toshiba, Foley & Lardner, December 26, 2000: US06167513 (142 worldwide citation)

A mobile computing scheme capable of carrying out a proper packet transfer according to a current location of the mobile computer by accounting for the network operating policy. A mobile computer carries out a prescribed communication processing according to recognition results as to whether the mob ...


4
Atsushi Shimbo, Atsushi Inoue, Masahiro Ishiyama, Toshio Okamoto: Packet authentication and packet encryption/decryption scheme for security gateway. Kabushiki Kaisha Toshiba, Foley & Lardner, July 18, 2000: US06092191 (128 worldwide citation)

A packet authentication and packet encryption/decryption scheme for a security gateway suitable for a hierarchically organized network system and a mobile computing environment. For the packet authentication, in addition to the end-to-end authentication at the destination side packet processing devi ...


5
Atsushi Inoue, Masahiro Ishiyama, Atsushi Fukumoto, Yoshiyuki Tsuda, Atsushi Shimbo, Toshio Okamoto: Mobile computer and method of packet encryption and authentication in mobile computing based on security policy of visited network. Kabushiki Kaisha Toshiba, Foley & Lardner, January 2, 2001: US06170057 (95 worldwide citation)

A mobile computer and a packet encryption and authentication method which are capable of controlling an activation of a packet encryption and authentication device belonging to the mobile computer according to the security policy at the visited network of the mobile computer. The mobile computer is ...


6
Atsushi Inoue, Masahiro Ishiyama, Atsushi Fukumoto, Yoshiyuki Tsuda, Atsushi Shimbo, Toshio Okamoto: Packet processing device and mobile computer with reduced packet processing overhead. Kabushiki Kaisha Toshiba, Foley & Lardner, May 29, 2001: US06240514 (76 worldwide citation)

A packet processing and packet transfer scheme capable of reducing the packet processing overhead by eliminating a need to decrypt and re-encrypt the entire packet at a time of relaying encrypted packets. In a packet processing device for relaying encrypted packets, a packet transferred to the packe ...


7
Atsushi Shimbo, Atsushi Inque, Masahiro Ishiyama, Toshio Okamoto: Packet authentication and packet encryption/decryption scheme for security gateway. Kabushiki Kaisha Toshiba, Foley & Lardner, February 6, 2001: US06185680 (69 worldwide citation)

A packet authentication and packet encryption/decryption scheme for a security gateway suitable for a hierarchically organized network system and a mobile computing environment. For the packet authentication, in addition to the end-to-end authentication at the destination side packet processing devi ...


8
Atsushi Shimbo: Scheme for computing Montgomery division and Montgomery inverse realizing fast implementation. Kabushiki Kaisha Toshiba, Oblon Spivak McClelland Maier & Neustadt P C, July 11, 2000: US06088453 (50 worldwide citation)

A scheme for performing high speed Montgomery division within the Montgomery space. Montgomery division Y=B.multidot.A.sup.-1 .multidot.2.sup.n mod N for a positive integer N, a positive integer A which is relatively prime with respect to N and satisfying 0.ltoreq.A.ltoreq.N, a positive integer B, a ...


9
Atsushi Inoue, Masahiro Ishiyama, Osamu Moriya, Atsushi Shimbo, Toshio Okamoto: Method and apparatus for communication control of mobil computers in communication network systems using private IP addresses. Kabushiki Kaisha Toshiba, Foley & Lardner, August 27, 2002: US06442616 (50 worldwide citation)

A communication control in a communication network system using a mobile computer, capable of realizing flexible address control and management for the mobile computer. When the mobile computer is located within a home network, a communication with the mobile computer is carried out by transferring ...


10
Shinichi Kawamura, Atsushi Shimbo: Cryptographic communication method and cryptographic communication device. Kabushiki Kaisha Toshiba, Oblon Spivak McClelland Maier & Neustadt, August 4, 1992: US05136642 (48 worldwide citation)

A cryptographic communication method comprises a step for carrying out cryptographic communication between a sending station and one or more receiving stations by using (1) a ciphertext formed by encrypting a unit of sending information under the intervention of at least a cryptographic key and (2) ...