H
Hisashi Toyoshima
Researcher at Hitachi
Publications - 41
Citations - 840
Hisashi Toyoshima is an academic researcher from Hitachi. The author has contributed to research in topics: Authentication & Watermark. The author has an hindex of 14, co-authored 41 publications receiving 840 citations.
Papers
More filters
Patent
Digital data authentication method
Hiroshi Yoshiura,Kazuo Takaragi,Ryoichi Sasaki,Seiichi Susaki,Hisashi Toyoshima,Tsukasa Saito +5 more
TL;DR: In this paper, the authors proposed a method for identifying a purchaser who purchased content from which an illegal copy was produced by using a watermarking scheme to identify the buyer who purchased the content from the source of the illegal copy.
Patent
Digital signature or electronic seal authentication system and recognized mark management program
TL;DR: A mark management server for certifying digital data based on a digital mark to enable realization of identity authentication and data certification when the digital data is transmitted or received on a network is described in this paper.
Patent
Method and system for recovering the validity of cryptographically signed digital data
Kunihiko Miyazaki,Hiroshi Yoshiura,Seiichi Susaki,Ryoichi Sasaki,Kazuo Takaragi,Hisashi Toyoshima,Takeshi Matsuki +6 more
TL;DR: In this article, a method for validating a restored message, having an entry generated in a signature log for a message, where the entry includes cryptographic information associated with the message, was presented.
Patent
Method of detecting changed contents
TL;DR: In this paper, a method for detecting the falsification of contents of a plurality of files is presented, which includes producing first falsification-detecting information corresponding to current filenames or current contents of the plurality of file and then comparing the falsified contents of file at the time of registration or renewal with the first falsified information.
Patent
Trusted computer system
Kunihiko Miyazaki,Shinji Ito,Hiroshi Yoshiura,Kazuo Takaragi,Masato Arai,Toshiaki Arai,Takeshi Matsuki,Hisashi Toyoshima +7 more
TL;DR: In this article, a method and apparatus for providing the information processing system with functions and areas usable only by a specific user different from a system administrator is described, and the areas are provided with an access control function in order to prevent the access control functions from being tampered.