Patent application number | Description | Published |
20080250119 | DATA TRANSFER SCHEME USING CACHING AND DIFFERENTIAL COMPRESSION TECHNIQUES FOR REDUCING NETWORK LOAD - In a data transfer scheme using a caching technique and/or a compression technique which is capable of reducing the network load of a network connecting between data transfer devices, correspondences between data and their names are registered at the data transfer devices and the corresponding names are transferred, instead of transferring the data, for those data for which the correspondences are registered, so that it is possible to reduce the amount of transfer data among the data transfer devices. Even when the name corresponding to the data is not registered so that it is impossible to transfer the corresponding name instead of transferring the data, it is possible to reduce the amount of transfer data among the data transfer devices by transferring the compressed data in which this data is expressed in a compressed form by utilizing the name corresponding to the registered reference data. | 10-09-2008 |
20090138714 | COMMUNICATION APPARATUS, KEY SERVER, MANAGEMENT SERVER, COMMUNICATION SERVER, CONTENT DISTRIBUTION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM - A plurality of first encrypted pieces is generated by encrypting the pieces with a first encryption key. The second encrypted piece is generated by encrypting at least one of the pieces with a second encryption key. The first encryption key and the second encryption key for encrypting the same piece are different from each other. A communication apparatus receives a first encrypted piece or a second encrypted piece from other communication apparatus for each piece, transmits a request message for requesting a decryption key for decrypting the encrypted piece to a key server, and receives the decryption key from the key server in response to the request message. | 05-28-2009 |
20090249490 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, TRANSMISSION METHOD, AND COMPUTER PROGRAM PRODUCT - A communication apparatus stores encrypted pieces having plural pieces as a part of a content encrypted, and number of transmission times. At least one first piece is encrypted by plural different encryption keys. The communication apparatus selects as priority pieces plural encrypted pieces corresponding to at least one first piece among the first pieces, based on number of untransmitted encrypted pieces of which number of transmission times is zero among plural encrypted pieces of which first piece is encrypted, and stores priority piece information specifying the priority piece. When a piece request is received from other communication apparatus, the communication apparatus determines an encrypted piece to be transmitted, based on priority piece information, and transmits the encrypted piece to the other communication apparatus. | 10-01-2009 |
20090282250 | COMMUNICATION APPARATUS, SERVER, AND COMPUTER PROGRAM PRODUCT THEREFOR - A communication apparatus receives, from another communication apparatus, a plurality of encrypted pieces obtained by encrypting a plurality of pieces constituting a part of a content and obtains a part or all of decryption keys used for decrypting the encrypted pieces. The communication apparatus also obtains an invalid piece list showing one or more identifiers of one or more encrypted pieces that can respectively be decrypted by using one or more decryption keys that have already been invalidated. In the case where at least one of the encrypted pieces is listed in the invalid piece list, the communication apparatus deletes the at least one of the encrypted pieces, based on an obtainment status of the encrypted pieces or an obtainment status of the decryption keys. | 11-12-2009 |
20090327604 | STORAGE DEVICE, CONTROL DEVICE, STORAGE SYSTEM, AND STORAGE METHOD - A size storage unit stores therein a block size of a memory element. A buffering unit executes buffer processing configured to store data received from a RAID (Redundant Arrays of Inexpensive/Independent Disks) controller into a buffer, and to write the data stored in the buffer into the memory element. A stripe-size receiving unit receives a stripe size that indicates a size of a unit of access at time of access to the memory element by the RAID controller. Writing processing is configured to write data received from the RAID controller into the memory element without executing the buffer processing by the buffering unit, when the stripe size is n times of the block size (n is a positive integer). | 12-31-2009 |
20090327802 | STORAGE CONTROL DEVICE, DATA RECOVERY DEVICE, AND STORAGE SYSTEM - When data in one semiconductor memory device is corrupted during a padding process by a padding unit and the data cannot be recovered even by using an error correcting code for correcting a data error, a storage control device issues a data recovery request to a data recovery device. The data recovery device reads the data from other semiconductor memory device in response to the data recovery request to recover the data, and returns a recovery result to the padding unit in the storage control device to perform the padding process. | 12-31-2009 |
20090327803 | STORAGE CONTROL DEVICE AND STORAGE CONTROL METHOD - A RAID is configured using plural nonvolatile semiconductor memory devices to enable recovery of data stored in the nonvolatile semiconductor memory devices, and data is read from the nonvolatile semiconductor memory device included in the RAID in response to a data reading request inputted from outside. When an error occurs during the reading, data for which the reading error occurs is recovered, and rewritten into an area of the nonvolatile semiconductor memory device in which the reading error occurs. | 12-31-2009 |
20100005228 | DATA CONTROL APPARATUS, STORAGE SYSTEM, AND COMPUTER PROGRAM PRODUCT - A data control apparatus includes a mapping-table managing unit that manages a mapping table that is associated with a corrupted-data recovery function of recording data and error correcting code data as redundant data that is given separately from the data, distributed and stored in units of stripe blocks in the plural nonvolatile semiconductor memory devices, the mapping table containing arrangement information of the data and the error correcting code data; a determining unit that determines whether to differentiate frequencies of writing the data into the semiconductor memory devices; and a changing unit that changes the arrangement information by switching the data stored in units of the stripe blocks managed using the mapping table to differentiate the frequencies of writing the data into the semiconductor memory devices, when the determining unit determines that the frequencies of writing the data into the semiconductor memory devices are to be differentiated. | 01-07-2010 |
20100008509 | COMMUNICATION APPARATUS, KEY SERVER, AND MANAGEMENT SERVER - A communication apparatus obtains file information indicating all or a part of first and second encrypted pieces obtained by encrypting a plurality of pieces constituting a part of a content and version management information with which it is possible to judge whether the file information has validity and receives, for each of the pieces, one of the first encrypted piece and the second encrypted piece from another communication apparatus, by using the file information. The communication apparatus transmits, to a key server, a request message for requesting decryption keys each being used for decrypting the one of the first encrypted piece and the second encrypted piece received for a different one of the pieces and the version management information of the file information used to obtain the one of the first encrypted piece and the second encrypted piece in correspondence with each of the pieces and receives the decryption keys. | 01-14-2010 |
20100223531 | SEMICONDUCTOR STORAGE - A semiconductor storage includes a receiver configured to receive a write request from a host device; a storage unit configured to hold redundancy data generation/non-generation information; a writing unit configured to write data in a semiconductor memory array and write redundancy data generation/non-generation information of the written data in the storage unit; a first data extracting unit configured to extract data whose redundancy data is not generated from among the data held by the semiconductor memory array; a first redundancy data generating unit configured to generate redundancy data; a first redundancy data writing unit configured to write the generated redundancy data in the semiconductor memory array; and a first redundancy data generation/non-generation information updating unit configured to update the redundancy data generation/non-generation information of the data whose redundancy data held by the storage unit is generated. | 09-02-2010 |
20120205839 | METHOD FOR OPERATING BLAST FURNACE - A coke layer and an ore layer are formed in a blast furnace. The coke layer is formed of conventional coke and the ore layer is formed of carbon iron composite, conventional coke, and ore. The mixing percentage of the conventional coke in the ore layer with respect to the ore is 0.5 mass % or more. Slowing of the gasification reaction of carbon iron composite in the cohesive zone can be suppressed. | 08-16-2012 |
20130259233 | COMMUNICATION APPARATUS AND KEY MANAGING METHOD - According to an embodiment, a communication apparatus includes a key storage unit configured to store therein a cryptographic key; a receiving unit configured to receive a message; an analyzing unit configured to analyze whether the message includes an access request for the cryptographic key; a generating unit configured to, when the message includes the access request, generate request information used to request an access to the cryptographic key requested by the access request; and an access controller configured to control the access to the cryptographic key based on the request information. | 10-03-2013 |
20140044260 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, COMPUTER-READABLE MEDIUM, AND COMMUNICATION SYSTEM - According to an embodiment, a communication apparatus includes a finding unit; a negotiating unit; and a communicating unit. The finding unit is configured to, in response to a request from an application that makes use of key information, find out a key generating device that generates the key information. The negotiating unit is configured to perform a negotiation operation with respect to the key generating device to determine conditions for key information that is to be generated. The communicating unit is configured to receive, from the key generating device, the key information that is generated based on the conditions determined in the negotiation operation, and send the received key information to the application. | 02-13-2014 |
20140143443 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a communication device is structured to be connected to a plurality of external devices. The communication device includes an acquisition unit and a selector. The acquisition unit is configured to acquire resource information that represents a resource of cryptographic keys available from each external device. The selector is configured to select a path from among a plurality of paths for one of the external devices, based on a bottleneck and a hop count of the resource on the path. | 05-22-2014 |
20140181508 | COMMUNICATION DEVICE AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a communication device includes a cryptographic communication unit, a first communicating unit, and a control unit. The cryptographic communication unit is configured to perform cryptographic communication with an external device via a first network. The first communicating unit is configured to perform communication with a key generating device via a second network, the key generating device being configured to generate a cryptographic key to be used in the cryptographic communication. The control unit is configured to perform control to transmit an address registration request containing address information to the key generating device via the first communicating unit when a predetermined specific request is issued from among requests used in the cryptographic communication. | 06-26-2014 |