scispace - formally typeset
H

Hisashi Toyoshima

Researcher at Hitachi

Publications -  41
Citations -  840

Hisashi Toyoshima is an academic researcher from Hitachi. The author has contributed to research in topics: Authentication & Watermark. The author has an hindex of 14, co-authored 41 publications receiving 840 citations.

Papers
More filters
Patent

Digital data authentication method

TL;DR: In this paper, the authors proposed a method for identifying a purchaser who purchased content from which an illegal copy was produced by using a watermarking scheme to identify the buyer who purchased the content from the source of the illegal copy.
Patent

Digital signature or electronic seal authentication system and recognized mark management program

TL;DR: A mark management server for certifying digital data based on a digital mark to enable realization of identity authentication and data certification when the digital data is transmitted or received on a network is described in this paper.
Patent

Method and system for recovering the validity of cryptographically signed digital data

TL;DR: In this article, a method for validating a restored message, having an entry generated in a signature log for a message, where the entry includes cryptographic information associated with the message, was presented.
Patent

Method of detecting changed contents

TL;DR: In this paper, a method for detecting the falsification of contents of a plurality of files is presented, which includes producing first falsification-detecting information corresponding to current filenames or current contents of the plurality of file and then comparing the falsified contents of file at the time of registration or renewal with the first falsified information.
Patent

Trusted computer system

TL;DR: In this article, a method and apparatus for providing the information processing system with functions and areas usable only by a specific user different from a system administrator is described, and the areas are provided with an access control function in order to prevent the access control functions from being tampered.