Japanese/[English]

 

2019515日更新

 

 

宝木 和夫 博士(工学)

 

略歴

 

宝木 和夫(たからぎ かずお)

 

1975年九州工業大学制御工学科卒業,1977年東京工業大学大学院修士課程修了.同年,日立製作所入社.システム開発研究所にて,システム安全,情報セキュリティの研究に従事.1986年,工学博士号(東京大学),2004年、日立製作所システム開発研究所主管研究長,2007年秋期,独フライブルグ大学客員教授. 2012年,産業技術総合研究所へ副研究部門長として入社.現在,産総研サイバーフィジカルセキュリティ研究センタープロジェクト統括、および、(株)ハイセーフ代表取締役、中央大学客員教授を兼務.著書「ブロックチェーンをめぐる実務・政策と法」(中央経済社)、「情報セキュリティ」(近代科学社),「ファイアウォール」(昭晃堂),「インターネットセキュリティ」(オーム社).

 

1.著書・刊行物・調査報告

 

 

a.[英文]

 

1)"Information Technology for a Safe and Secure Society in Japan", K. Takaragi, Advances in cyber security, Edited by D. Frank Hsu and Dorothy Marinucci, Fordham University Press, New York, pp. 207-216, 2013.

 

b.[和文]

1)「暗号技術と量子コンピュータ開発・現状と課題を考える」、宝木和夫、スベン・ウォルゲムト、「ブロックチェーンをめぐる実務・政策と法」、久保田隆 (編集)、中央経済社、pp. 1311532018.

2)「情報セキュリティ -暗号・認証・マネジメント -」、宝木和夫、近代科学社、2012.

3)「ファイアウォール =インターネット関連技術について=」、宝木和夫、小泉稔,寺田真敏、萱島信、昭晃堂、1998.

4)「インターネットセキュリティ =基礎と対策技術=」、佐々木良一、宝木和夫、櫻庭健年、寺田真敏、浜田成泰、オーム社、1996.

 

2.招待・依頼講演

a.[国際]

1)"IT Technology for Safe and Secure Society in Japan: Towards Cyber Physical Solution", K. Takaragi, International Conference on Cyber Security, 2010.8.

2)"Security Technology for Ubiquitous Information Society", K. Takaragi, Keynote Presentation at ETRICS, 2006.6.

 

b.[国内]

1)「社会インフラへのバイオメトリクス適用状況と課題」、宝木和夫、電子情報通信学会バイオメトリクス研究会、2014.6.

2)「セキュリティ技術標準化の軌跡暗号からクラウド,M2Mのセキュリティ標準まで」、宝木和夫、電子情報通信学会ITISECWBS合同研究会、2013.3.

3)「産業界からの期待 -情報セキュリティへの応用-」、宝木和夫、ワークショップ、数学の将来シナリオを考える ―数学を基点とする分野横断型研究の展開に向けて―、文部科学省科学技術政策研究所、日本数学会、2005.6.

 

3. 解説・総説

 

 

a.[国際]

1)"IT Technology for Safe & Secure Society in the Asian Region", K. Takaragi, Keynote Speech 7th AFIT, 2009.2

2)"Security Techniques for Next Generation Cancelable bio and post quantum", K. Takaragi, ZISC Information Security Colloquium, 2007.12

3)「RFIDに残る課題」、宝木和夫RSA Conference, 2004.6

 

b.[国内]

1)「オリンピックのセキュリティ」、宝木和夫、情報処理学会誌、Vol.55, No.11, pp1196-1203, 2014.11.

2)「情報セキュリティの新しい課題について」、宝木和夫、日本セキュリティマネジメント学会誌、281号、pp.36-43, 2014.5.

3)「セキュリティ技術標準化の軌跡 —暗号からクラウド,M2Mのセキュリティ標準まで —」、宝木和夫、電子情報通信学会 基礎・境界ソサイエティ Fundamentals Reviewpp. 51-59, Vol.7, No.12013.7.

4)「次世代コアテクノロジーの最前線--情報セキュリティ技術 」、宝木和夫,日立評論, Vol.87, No.5, pp.63-68, 2005.5.

5)「21世紀初頭の暗号技術 -共通鍵暗号の進展-」、宝木和夫、角尾幸保、大熊建司、松井 充、盛合志帆・下山武司、情報処理、Vol.45, No.11, pp.1117-1122, 2004.11.

6)「暗号機能付きシステムLSIとその応用」、宝木和夫、中田邦彦、山田徹、荒井孝雄、原秀幸、日立評論、Vol. 81, No. 10, pp. 21-24, 1999.10.

7)「情報システムと暗号技術」、宝木和夫、電気学会誌、112巻9号、 pp. 721-725,1992.9.

8)「暗号方式と応用」、宝木和夫、中村勤、情報処理、Vol. 1, No. 4, pp. 714-733,1991.6.

9)「コンピュータネットワークを利用した取引における認証技術の動向」、佐々木良一、宝木和夫、電子情報通信学会誌、Vol. 71, No. 12, pp. 1285-1287, 1988.12.

10)「金融機関におけるシステムセキュリティ技術」、宝木和夫、佐々木良一、奥村誠、日立評論、Vol. 70, No. 3, pp. 103-108, 1988.3.

11)「ネットワークセキュリティ技術」、宝木和夫、佐々木良一、三浦雄、奥村誠、日立評論、Vol. 69, No. 9, pp. 67-74 1987.9.

 

4.国際会議委員会活動

1)The Fourth Resilience and IT-Risk in Social Infrastructures (RISI 20132015) PC

2)25th IFIP International Information Security Conference Security & Privacy (SEC-2010) PC

3)IFIP World Computer Congress 2010 (WCC 2010) PC

4)The 4th International Workshop on Security (IWSEC2009) General co-Chair

 

5.受賞・表彰等

1)CYBER 2018、Best Paper Award, Umezawa Katsuyuki, Mishina Yusuke, Wohlgemuth Sven, Kazuo Takaragi, 2018.

2)関東地方発明表彰発明奨励賞、渡辺大、古屋聡一、宝木和夫2013

3)情報処理学会標準化功績賞、宝木和夫2011

4)経済産業省工業標準化事業貢献者表彰、宝木和夫2010

5)電子情報通信学会基礎・境界ソサイエティ功労賞、宝木和夫2010

6)日立実績発明者トップ100宝木和夫2009

7)情報処理学会標準化貢献賞、宝木和夫2007

8)情報処理学会論文賞、佐々木良一、宝木和夫2002

9)関東地方発明表彰発明奨励賞、宝木和夫、佐々木良一、中川聡夫、2002

10)電気学会著作賞、佐々木良一、宝木和夫、櫻庭健年、寺田真敏、浜田成泰、1998

 

. 誌上発表

 a.[国際誌 査読有り 筆頭]

1)"An Ultra Small Individual Recognition Security Chip", Kazuo Takaragi, Mitsuo Usami, Ryo Imura, Rei Itsuki, Tsuneo Satoh, IEEE MICRO, November– December 2001, pp 43-49, 2001.12.

2)"System LSIs with Cryptographic Functions and Their Applications," Kazuo Takaragi, Kunihiko Nakada, Tooru Yamada, Takao Arai, Hideyuki Hara, Hitachi Review Vol. 48, No. 6, pp. 323-327, 1999

3)"On Differential Cryptanalysis", K. Takaragi, K. Hashimoto and T. Nakamura, IEICE Transactions, Vol. E 74, No. 8, pp. 2153-2159, 1991.8

4)"An Algorithm for Obtaining Simplified Prime Implicant Sets in Fault Tree and Event Tree Analysis", K. Takaragi, R. Sasaki and S. Shingai, IEEE Transaction on Reliability, Vol. R-32, No. 4, pp. 386-392, 1983.10.

5)"A Method for Rapid Markov Reliability Calculation", K. Takaragi, R. Sasaki, S. Shingai, IEEE Transaction on Reliability, Vol. R-34, No. 3, pp. 262-268, 1985.8

6)"An Probability Bound Estimation Method in Markov Reliability Analysis", K. Takaragi, R. Sasaki, S. Shingai, IEEE Transaction on Reliability, Vol. R-34, No. 3, pp. 257-261, 1985.8

7)"An Improved Moment-Matching Algorithm for Evaluating Top-Event Probability Bounds", K. Takaragi, R. Sasaki, S. Shingai,IEEE Transaction on Reliability, Vol. R-32, No. 4, pp. 386-392, 1983.10

 

b.[国際誌 査読有り 非筆頭]

1)"Privacy-Enhancing Trust Infrastructure for Process Mining," Sven Wohlgemuth, Kazuo Takaragi, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, E101.A.149, pp. 149-156, 2018.

2)"Verifying a signature architecture: a comparative case study," David Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi, Burkhart Wolff, Formal Aspects of Computing (2007) 19: 63–91, 2007.

3)"A Formal Analysis of a Digital Signature Architecture," David Basin, Kunihiko Miyazaki, Kazuo Takaragi, Integrity and Internal Control in Information Systems VI pp 31-47, 2004.

4)"A New Keystream Generator MUGI," Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E87-A   No.1   pp.37-45, 2003.1.

5)"Integrity-Aware Mode of Stream Cipher," Soichi Furuya, Dai Watanabe, Yoichi Seto, Kazuo Takaragi, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E85-A   No.1   pp.58-65, 2002.1.

6)"A Threshold Digital Signature Scheme for a Smart Card Based System," Kunihiko Miyazaki, Kazuo Takaragi, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E84-A   No.1   pp.205-213, 2001.1.

7)"A Threshold Digital Signature Scheme for a Smart Card Based System", K. Miyazaki, K. Takaragi, IEICE Transactions, Vol. E84-A, No. 1, pp. 205-213, 2001.1.

8)"A lightweight Encryption Method Suitable for Copyright Protection", M. Aikawa, K. Takaragi, S. Furuya and M. Sasamoto, IEEE Transactions on Consumer Electronics, Vol. 44, No. 3, pp.902-910, 1998.8

9)"Group Cipher System for Intranet Security", H. Ito, S. Susaki, M. Arai, M. Koizumi and K. Takaragi, IEICE Transactions, Vol. E81 A, No. 1, pp. 28-34, 1998.1.

 

c.[和文誌 査読有り 筆頭]

1)「公開鍵暗号HIME(R)〔ハイムアール〕を中心とした日立の暗号化技術」、宝木和夫、西岡玄次、日立評論、Vol.88, No.07, 592-593, pp 74-79, 2006.7.

2)「電子認証向けラビン型公開鍵暗号アルゴリズムの改良」、宝木和夫、佐々木良一、電子情報通信学会学会誌 D-I, Vol. J73-D-I, No. 3, pp. 350-3571990.3.

3)「情報システムにおけるリスク分析の一方法」、宝木和夫、佐々木良一、永井康彦、電気学会論文誌C,108巻4号、pp. 260-2671988.4.

4)「ICカード利用の電子取引用認証方式」、宝木和夫、白石高義、佐々木良一、電気学会論文誌C,107巻1号、pp. 46-531987.1.

5)「構造体と構成要素に関する故障データを併用した事故発生ひん度推定方法」、宝木和夫、佐々木良一、新谷定則、富永研司、電気学会論文誌C,101巻8号、pp.185-192.1981.8.

 

d.[和文誌 査読有り 非筆頭]

1)「形式手法を用いたディジタル署名システムの安全性評価 」、宮崎邦彦, 來間啓伸, 宝木和夫, デイビットベイジン, 手塚悟、日本ソフトウェア科学会論文誌特集号, Vol.22, No.2, pp.74-84, 2005.4.

2)「印鑑と電子印鑑の歴史と類似性の分析」、佐々木良一、宝木和夫、情報処理学会論文誌 Vol. 42, No. 8, pp. 1968-19742001.8.

3)「RSA暗号鍵高速生成方式」、後藤寧子、宝木和夫、佐々木良一、電子情報通信学会学会誌 D-I, Vol. J72-D-I, No. 3, pp. 213-2201989.3.

4)「離散最適化のためのMao & Wallingfordの手法の拡張」、佐々木良一、新谷定則、宝木和夫、電気学会論文誌C,100巻5号、pp. 167-1731980.5.

 

e.Proceedings 査読有り 筆頭]

1)"A Practical and Fair Protocol for Signing Contract", K. Takaragi, T. Shiraishi and R. Sasaki, Proceedings of International Symposium in Information Theory, October 1986.

2)"A New Phased Mission Method and Its Application to FBR Shutdown Heat Removal Systems", K. Takaragi, R. Sasaki and S. Shingai, Proceedings of American Nuclear Society/European Nuclear Society Probabilistic Risk Analysis Topical Meeting, Vol. III, USA, pp. 1267-1276, 1981.9.

3)"A Technique for Analyzing Common Cause Failure in Subsystems", K. Takaragi, K. Tominaga, R. Sasaki and S. Shingai, Proceedings of American Nuclear Society Annual Meeting, pp. 298-299, 1979.6.

 

f.Proceedings 査読有り 非筆頭]

1)"Competitive Compliance with Blockchain," Sven Wohlgemuth, Katsuyuki Umezawa, Yusuke Mishina and Kazuo Takaragi,PerCom 2019 Workshop SPT-IOT, 2019.3.

2)"Threat Analysis using Vulnerability Databases – Matching Attack Cases and Vulnerability Database by Topic Model Analysis –," Katsuyuki Umezawa, Yusuke Mishinay, Sven Wohlgemuthz and Kazuo Takaragi, CYBER 2018, 2018.11.

3)"A Method of Threat Analysis for Cyber-Physical System using Vulnerability Databases," Yusuke Mishina, Kazuo Takaragi, Katsuyuki Umezawa, the 18th Annual IEEE Symposium on Technologies for Homeland Security, 2018.10.

4)"Privacy with Secondary Use of Personal Information," Sven Wohlgemuth, Kazuo Takaragi, Isao Echizen, MKWI 2016.

5)"A Toolset for Usable Security with ICT Service Networks," Sven Wohlgemuth, Kazuo Takaragi, The 11th International Workshop on Security (IWSEC) 2016.

6)"Verification of a Signature Architecture with HOL-Z", David A. Basin, Hironobu Kuruma, Kazuo Takaragi, Burkhart Wolff, FM, pp. 269-285, 2005.

7)Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, "A New Keystream Generator MUGI," FSE 2002, pp.179-194, 2002.

8)"Generalized Powering Functions and Their Application to Digital Signatures", Hisayoshi Sato,

Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, ASIACRYPT, pp. 434-451, 2003.

9)"Legally Authorized and Unauthorized Digital Evidence", Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki, Security Protocols Workshop, pp. 67-73, 2002.

10)"A New Keystream Generator MUGI", Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, Proceedings of 9th International Workshop, FSE 2002, Leuven, Belgium, pp. 179-194, 2002.2.

11)"Observations on Hierocrypt-3/L1 Key-scheduling Algorithms", Soichi Furuya, Hirotaka Yoshida, Dai Watanabe, Yoichi Seto, Kazuo Takaragi, 2nd NESSIE Workshop, Sep.2001.

12)"A Multi-OS Approach to Trusted Computer Systems", Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki, Security Protocols Workshop, pp. 107-114, 2001.

13)Hiroshi Yoshiura, Ryoichi Sasaki, Kazuo Takaragi, "Secure Fingerprinting Using Public-Key Cryptography," International Workshop on Security Protocols, pp 83-89, 1998.

14)"Application of Probabilistic Safety Assessment Method to Evaluate the Effect of Test and Inspection on Nuclear Power Plant", K. Seki, K. Kumasaka, S. Itooka, K. Takaragi, SMiRT 11 Transactions Vol. G, Tokyo, Japan, pp. 381-386, 1991.8.

15)"Development of Computer Program to Assist Event Tree Analysis", R. Sasaki, K. Tominaga, K. Takaragi, S. Shingai, Proceedings of American Nuclear Society Annual Meeting, pp. 294-295, 1979.

 

7.口頭発表・ポスター発表

a.[国際]

なし.

 

b.[国内]

1)「仮想通貨・ブロックチェーンの技術的課題と研究の方向性」、宝木和夫、国際取引法学会・UNCITRAL共催シンポジウム「UNCITRALモデル法と仮想通貨・ブロックチェーン」、2019.3.

2)「脆弱性データベースを使用した脅威分析方法~トピックモデルの活用と過去の分析結果の再利用について~」、梅澤 克之、三科 雄介、Sven Wohlgemuth寳木和夫、暗号と情報セキュリティシンポジウム(SCIS2019), 2019.1.

3)「ブロックチェーンとIoT」、宝木和夫、日本計量機器工業連合会講演会、2018.9.

4)「脆弱性データベースを使用した脅威分析方法の提案」、梅澤克之、三科雄介、田口研治、宝木和夫2018年暗号と情報セキュリティシンポジウム、2018123.

5)「セキュリティ技術を促進する 標準・ガイドラインと運用策」、宝木和夫 、大崎人士 、三科雄介 、半田剣一 、坂根広史 、田口研治 、梅澤克之、産総研 情報・人間工学領域シンポジウムーIoTとセキュリティ 2017 –Connected Industriesのセキュリティ-20171220

6)「セキュリティ技術の普及を促進する標準・ガイドラインと運用策」、宝木和夫SIP重要インフラ等におけるサイバーセキュリティの確保シンポジウム201720171012日、13.

7)「個人情報の有効活用を可能にするブロックチェーンの考察」、宝木和夫、早稲田大学産研アカデミック・フォーラム、ブロックチェーンが切り拓く未来2017513.

8)「研究開発技術の社会実装を促す適合性確認のあり方」、宝木和夫SIP重要インフラ等におけるサイバーセキュリティの確保シンポジウム201620161125.

9)「重要インフラ等におけるサイバーセキュリティの認証制度設計」、宝木和夫、大崎 人士、坂根 広史、半田 剣一、田口 研治、相馬 大輔、産総研 情報・人間工学領域シンポジウム「IoTとセキュリティ」、201637.

10)「バイオメトリクス適用状況と課題」、宝木和夫、産総研技術交流サロン、産総研中国センター 、2014.11.

11)「バイオメトリクス・セキュリティ」、大木哲史、大塚玲、山田朝彦、宝木和夫、産総研第2回セキュアシステムシンポジウム、2014.3.

12)「データベースの秘匿検索技術」、花岡悟一郎、宝木和夫、産総研オープンラボ、AISTechトーク、2013.10.

13)「生体認証装置に対するなりすまし行為の現状と課題」、大木哲史、大塚玲、宝木和夫、電子情報通信学会バイオメトリクス研究会、Biox2013-16, pp. 59-63, 2013.8.

14)「情報リスクとマネジメント」、宝木和夫、リスクを科学するフォーラム、日本学術会議、2012.9.

15)「企業から数学会への期待  -暗号の開発現場から- 」、宝木和夫、九州大学 マス・フォア・インダストリ研究所開所式、2011.4.

 

8.工業所有権

a.[外国特許 (優先日)]

1)"Unique code generating apparatus, method, program and recording medium," Masahiro Mimura, Kenta Takahashi, Kazuo Takaragi, Masakatsu Nishigaki, Yoichi Shibata, US7447339B2, 2003-10-17.

2)"Time stamp generating system," Kunihiko Miyazaki, Seiichi Susaki, Kazuo Takaragi, Hiroshi Yoshiura, Takeshi Matsuki, Hisashi Toyoshima,Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, US7200682B2, 2002-05-08.

3)"RFID tag, and RFID tag-related determining device and method, and management system and method," Masaru Ohki, Hideki Tokuyama, Rei Itsuki, Shojiro Asai, Kazuo Takaragi, Atsushi Tanaka, US7173515B2, 2002-03-07.

4)"Handling support method and handling support system," Hajime Morito, Yasuko Fukuzawa, Kazuo Takaragi, Shojiro Asai, US7138915B2, 2001-11-30.

5)"Trusted computer system," Kunihiko Miyazaki, Shinji Itoh, Hiroshi Yoshiura, Kazuo Takaragi, Masato Arai, Toshiaki Arai, Takeshi Matsuki, Hisashi Toyoshima, US7210043B2, 2001-04-24.

6)"Pseudorandom number generating apparatus or encryption or decryption apparatus using the same," Dai Watanabe, Soichi Furuya, Kazuo Takaragi, US7280659B2, 2001-01-23.

7)Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Hisanori Mishima, Takeshi Matsuki, Kunihito Takeuchi, Mitsuru Iwamura, Tsutomu Matsumoto, "Digital signature generating method and digital signature verifying method," US6816969B2, 2000-12-07.

8)"Database integration management method and apparatus and processing program, medium therefor," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, Hideki Tokuyama, Mitsuo Usami, US6922686B2, 2000-11-02.

9)"Database integration management method and apparatus and processing program, medium therefor," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, Hideki Tokuyama, Mitsuo Usami, US7333972B2, 2000-11-02.

10)"Identification code management method and management system," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, US6934842B2, 2000-07-06.

11)"Identification code management method and management system," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, US7178026B2, 2000-07-06.

12)Soichi Furuya, Kazuo Takaragi, Hiroyuki Kurumatani, Masashi Takahashi, Kunihiko Miyazaki, Hisayoshi Sato, Dai Watanabe, "Method and apparatus for symmetric-key encryption," US7110545B2, 2000-03-09.

13)Soichi Furuya, Kazuo Takaragi, Hiroyuki Kurumatani, Masashi Takahashi, Kunihiko Miyazaki, Hisayoshi Sato, Dai Watanabe, "Method and apparatus for symmetric-key decryption," US7359515B2, 2000-03-09.

14)"Method and system for recovering the validity of cryptographically signed digital data," Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki, US7694126B2, 1999-10-22.

15)"Method and system for recovering the validity of cryptographically signed digital data," Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki, US7134021B2, 1999-10-22.

16)"Digital signing method," Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Toshiyuki Moritsu, Mizuhiro Sakai, Mitsuru Iwamura, Tsutomu Matsumoto, US7305558B1, 1999-10-22.

17)"Digital signing method," Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Toshiyuki Moritsu, Mizuhiro Sakai, Mitsuru Iwamura, Tsutomu Matsumoto, US7770009B2, 1999-10-22.

18)"Processing apparatus, program, or system of secret information," Kunihiko Miyazaki, Kazuo Takaragi, Yasuko Fukuzawa, US6873706B1, 1999-09-29.

19)"Control system and method of controlling information written into storage media," Kazuo Takaragi, Chikashi Okamoto, US6592032B1, 1999-08-27.

20)"Terminal for use in a system interfacing with storage media," Kazuo Takaragi, Chikashi Okamoto, US7089388B1, 1999-08-27.

21)Kazuo Takaragi, Chikashi Okamoto, "Terminal for use in a system interfacing with storage media," US7330949B2, 1999-08-27.

22)"Semiconductor devices," Mitsuo Usami, Kazutaka Tsuji,Takeshi Saito, Akira Sato, Kenji Sameshima, Kazuo Takaragi, Chizuko Yasunobu, US7061083B1, 1998-12-17.

23)"Method of checking authenticity of sheet with built-in electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Isobe, Yasuhiro Tsunemi, Hiroyuki Yagi, US7007854B2, 1998-12-07.

24)"Method of checking authenticity of sheet with built-in electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Isobe, Yasuhiro Tsunemi, Hiroyuki Yagi,US7309019B2, 1998-12-07.

25)"Method for mounting electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Sobe, Yasuhiro Tsunemi, Hiroyuki Yagi, US6731509B1, 1998-11-30.

26)"Method of checking authenticity of sheet with built-in electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Isobe, Yasuhiro Tsunemi, Hiroyuki Yagi, US6659353B1, 1998-07-12.

27)"Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus," Makoto Aikawa, Shigeru Hirahata, Kazuo Takaragi, Yoshimichi Kudo,US20030026430A1, 1998-05-29.

28)"Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus," Makoto Aikawa, Shigeru Hirahata, Kazuo Takaragi, Yoshimichi Kudo, US6683956B1, 1998-05-29.

29)"Network system using a threshold secret sharing method," Seiji Miyazaki, Kazuo Takaragi, US6477254B1, 1998-02-13..

30)"IC card equipped with elliptical curve encryption processing facility," Seiji Miyazaki, Kazuo Takaragi, US6466668B1, 1998-01-28

31)"IC card equipped with elliptic curve encryption processing facility," Seiji Miyazaki, Kazuo Takaragi , US6714648B2, 1998-01-28.

32)"Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same," Makoto Aikawa, Kazuo Takaragi, Hiroyuki Koreeda, Manabu Sasamoto, Hiroo Okamoto, Takaharu Noguchi, Soichi Furuya, Shigeru Hirahata, US6606385B1, 1997-08-07.

33)"Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same," Makoto Aikawa, Kazuo Takaragi, Hiroyuki Koreeda, Manabu Sasamoto, Hiroo Okamoto, Takaharu Noguchi, Soichi Furuya, Shigeru Hirahata, US20010014154A1, 1997-08-07.

34)"Digital data authentication method," Hiroshi YoshiuraKazuo Takaragi, Ryoichi Sasaki, Seiichi Susaki, Hisashi Toyoshima, Tsukasa Saito, US6499105B1, 1997-06-05.

35)"Key recovery method and system," Kazuo Takaragi, Hiroyuki Kurumatani, US6236729B1, 1997-06-06.

36)"Digital data authentication method," Hiroshi Yoshiura, Kazuo Takaragi, Ryoichi Sasaki, Seiichi Susaki, Hisashi Toyoshima, Tsukasa Saito, US6131162A, 1997-06-05.

37)"Encrypted data recovery method using split storage key and system thereof," Eiji Okamoto, Masahiro Mambo, Seiichi Domyo, Hiroyoshi Tsuchiya, Tooru Kawai, Kazuo Takaragi, Naoya Torii, Takeshi Tanida, US6118874A, 1997-03-31.

38)"Method and apparatus for generating hash value," Kazuo Takaragi, Hiroyuki Kurumatani, US6141421A , 1996-12-10.

39)"Hash value generating method and device, data encryption method and device, data decryption method and device," Kazuo Takaragi, Hiroyuki Kurumatani, US6370247B1, 1996-12-10.

40)"Hash value generating method and device, data encryption method and device, data decryption method and device," Kazuo Takaragi, Hiroyuki Kurumatani, US6122375A, 1996-12-10.

41)"Digital signature generating/verifying method and system using public key encryption," Kazuo Takaragi, Hiroyuki Kurumatani, US6341349B1, 1996-10-31.

42)"Method and device for managing computer network," Kazuo Takaragi, Seiichi Domyo, Hiroshi Yoshiura, US6311277B1, 1996-03-22.

43)"Method and a device for managing a computer network," Kazuo Takaragi, Seiichi Domyo, Hiroshi Yoshiura, US7139759B2, 1996-03-22.

44)"Method and apparatus for encrypting data," Hiroshi Yoshiura, Kazuo Takaragi, Mayuko Shimizu, US6157720A, 1996-02-28.

45)"Method and apparatus for encrypting data," Hiroshi Yoshiura, Kazuo Takaragi, Mayuko Shimizu, US6504931B1, 1996-02-28.

46)"Data compression/encryption method and system," Hiroshi Yoshiura, Kazuo Takaragi, Yusuke Hino, Yutaka Otsu, US6122378A, 1995-09-13.

47)"Cryptographic communication system," Hikari Namba, Kazuo Takaragi, Satoshi Miyazaki, US5966448A, 1995-08-30.

48)"Electronic document processing system and method of forming digital signature," Hiroshi Matsumoto, Kazuo Takaragi, Seiichi Susaki, Hiroyuki Maezawa, Shinobu Koizumi, US5465299A, 1992-12-03.

49)"Group cipher communication method and group cipher communication system," Kazuo Takaragi, Seiichi Susaki, Hiroshi Matsumoto, Tsutomu Nakamura, US5309516A, 1990-12-07.

50)"Encipher method and decipher method," Hiroshi Matsumoto, Kazuo Takaragi, Yasuko Fukuzawa, US5218638A, 1990-12-07.

51)"Limited broadcast system," Hiroshi Matsumoto, Kazuo Takaragi, Yasuko Fukuzawa, US5351294A, 1990-12-07.

52)"Cryptographic method and apparatus," Kazuo Takaragi, Tsutomu Nakamura, Masahiro Yamashita, Kazuo Hashimoto, Hiroshi Matsumoto, US5222139A, 1990-11-02.

53)"File encryption method and file cryptographic system," Masafumi Nozawa, Akinobu Shimada, Toshifumi Nishimura, Katsuharu Kakuse, Tokuhiro Tsukiyama, Kiyoshi Yata, Yasuhiro Ishii, Kazuo Takaragi, Yasushi Kuba, Fujio Fujita, US5235641A, 1990-03-13.

54)"Cryptographic communication method and system," Kazuo Takaragi, Yasuhiro Ishii, Tsutomu Nakamura, US5144665A, 1990-02-21.

55)"Secret information service system and method," Kazuo Takaragi, Ryoichi Sasaki, Tsutomu Nakamura, Minoru Koizumi, Yasuko Fukuzawa, Kenji Kataoka, US5117458A, 1989-11-01.

56)"Automatic trading method and apparatus," Kazuaki Tanaka, Takeshi Matsuki, Kazuo Takaragi, US5315634A, 1989-09-04.

57)"System and method for performing interlocution at a plurality of terminals connected to communication network," Yoshiyuki Nakayama, Kenjiro Mori, Kazuo Takaragi, Singi Domen,US5280583A, 1988-05-13.

58)"Encipher method and decipher method," Kazuo Takaragi, Fusao Nakagawa, Ryoichi Sasaki, US5103479A, 1988-04-28.

59)"Encipher method and decipher method," Kazuo Takaragi, Fusao Nakagawa, Ryoichi Sasaki, US4982429A, 1988-04-28.

60)"Encrypting system of data," Kazuo Takaragi, Fusao Nakagawa, Yasuhiko Nagai, Ryoichi Sasaki, US4969190A, 1988-04-13.

61)"IC card," Kazuo Takaragi, Takayoshi Shiraishi, Ryoichi Sasaki, US4885788A, 1986-02-17.

62)"Method for electronic transaction with digital signature," Kazuo Takaragi, Ryoichi Sasaki, US5018196A, 1985-09-04.

63)"Electronic transaction system," Kazuo Takaragi, Ryoichi Sasaki, Takayoshi Shiraishi, Nobuhiro Kurashiki, US4885777A, 1985-09-04.

 

c.[国内特許]

省略