M
Masayuki Takada
Researcher at Sony Broadcast & Professional Research Laboratories
Publications - 80
Citations - 1239
Masayuki Takada is an academic researcher from Sony Broadcast & Professional Research Laboratories. The author has contributed to research in topics: Smart card & Assisted GPS. The author has an hindex of 18, co-authored 80 publications receiving 1239 citations.
Papers
More filters
Patent
Data access management system and management method using access control ticket
TL;DR: In this paper, the authors present a data access management system capable of executing access control management for a data file stored in a memory in a device that is able to perform accesses of various types in accordance with the access apparatuses.
Patent
Information terminal apparatus, information processing apparatus and information communication system
Masayuki Takada,Takayasu Muto +1 more
TL;DR: In this article, a secret key holding section is provided for holding different secret keys for different apparatuses, and the position/time information measured based on an electromagnetic wave received from a positioning satellite is digitally signed by means of the secret key.
Patent
Memory access control system and management method using access control ticket
TL;DR: In this article, a memory access control system capable of independent management of partitions as divided memory regions generated in a device is presented, where various types of access control tickets are issued under management of a device or partition manger and a process based on a rule described in each of the tickets is executed in the device mounted.
Patent
Authentication method, communication method, and information processing apparatus
Kusakabe Susumu,Masayuki Takada +1 more
TL;DR: In this article, a reader/writer transmits to an IC card a code C1 such that a random number RA is encrypted using a key KB, and the IC card decodes the code C4 into plain text M4 using the key KB.
Patent
System and method for authentication, and device and method for authentication
TL;DR: In this article, a plurality of cipher keys corresponding to these areas are read out, and reduction processing section generates one reduction key from these cipher keys, which is transferred to the IC card, and an encipherment section enciphers the random number using the reduction key.