$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of providing digital signatures 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0072363 (1979-09-05)
발명자 / 주소
  • Merkle Ralph C. (Mountain View CA)
출원인 / 주소
  • The Board of Trustees of the Leland Stanford Junior University (Stanford CA 02)
인용정보 피인용 횟수 : 369  인용 특허 : 1

초록

The invention comprises a method of providing a digital signature for purposes of authentication of a message, which utilizes an authentication tree function of a one-way function of a secret number.

대표청구항

A method of authenticating an item in a list of items comprising the steps of: defining an authentication tree with an authentication tree function comprising a one way function of the items in the list; authenticating the root of the authentication tree and the authentication tree function; and aut

이 특허에 인용된 특허 (1)

  1. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.

이 특허를 인용한 특허 (369)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Uzun, Ersin; Kurihara, Jun; Wood, Christopher A., Access control framework for information centric networking.
  3. Scott, Glenn C., Accountable content stores for information centric networks.
  4. Libin,Phil, Actuating a security system using a wireless device.
  5. Jacobson, Van L.; Thornton, James D., Adaptive multi-interface use for content networking.
  6. Wood, Christopher A.; Scott, Glenn C., Adjusting entries in a forwarding information base in a content centric network.
  7. Wood, Christopher A.; Scott, Glenn C., Adjusting entries in a forwarding information base in a content centric network.
  8. Uzun, Ersin; Mosko, Marc E.; Plass, Michael F.; Scott, Glenn C., Aggregate signing of data in content centric networking.
  9. Benjamin K. Gibbs, Apparatus and method for an authenticated electronic userid.
  10. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  11. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  12. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  13. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  14. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  15. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  16. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  17. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  18. Solis, Ignacio; Herlich, Matthias, Associating consumer states with interests in a content-centric network.
  19. Gentry,Craig B.; Silverberg,Alice, Authenticated ID-based cryptosystem with no key escrow.
  20. Wilson, Kelce S, Authenticating printed paper documents and websites against a blockchain record.
  21. Solis, Ignacio; Scott, Glenn C., Auto-configurable transport stack.
  22. Mosko, Marc E., Bit-aligned header compression for CCN messages using dictionary.
  23. Mosko, Marc E.; Solis, Ignacio, CCN routing using hardware-assisted hash tables.
  24. Ayyagari, Ramesh C.; Goel, Priti; Konezny, Mark D., Cache management on high availability routers in a content centric network.
  25. Micali Silvio, Certificate issue lists.
  26. Micali Silvio, Certificate revocation system.
  27. Micali Silvio, Certificate revocation system.
  28. Micali, Silvio, Certificate revocation system.
  29. Gentry, Craig B., Certificate-based encryption and public key infrastructure.
  30. Gentry, Craig B., Certificate-based encryption and public key infrastructure.
  31. Gentry, Craig B., Certificate-based encryption and public key infrastructure.
  32. Wood, Christopher A.; Scott, Glenn C., Chandra-Toueg consensus in a content centric network.
  33. Kuhtz, Lars; Erickson, John Thomas; Sengupta, Sudipta; Sridharan, Vinod; Dou, Xianzheng; Schulte, Wolfram, Chunk storage deduplication using graph structures.
  34. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  35. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  36. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit.
  37. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit.
  38. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit.
  39. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit having security features.
  40. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit having security features.
  41. Dotan, Yedidya; Girardi, Brian P.; Blatt, Marcelo; Freylafert, Oleg; Bowers, Kevin D.; Shreve, Michael S., Collaborative analytics for independently administered network domains.
  42. Dotan, Yedidya; Girardi, Brian P.; Blatt, Marcelo; Freylafert, Oleg; Bowers, Kevin D.; Shreve, Michael S., Collaborative analytics for independently administered network domains.
  43. Mosko, Marc E., Collection synchronization using equality matched network names.
  44. Rohatgi, Pankaj, Commitments in signatures.
  45. Mosko, Marc E.; Scott, Glenn C., Concurrent hashes and sub-hashes on data streams.
  46. Sevilla, Spencer; Mahadevan, Priya; Garcia-Luna-Aceves, Jose J., Content name resolution for information centric networking.
  47. Wood, Christopher A., Content object return messages in a content centric network.
  48. Mosko, Marc E.; Uzun, Ersin, Content-based transport security.
  49. Uzun, Ersin; Mosko, Marc E., Content-based transport security for distributed producers.
  50. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  51. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  52. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  53. Jacobson, Van L.; Smetters, Diana K., Controlling the spread of interests and content in a content centric network.
  54. Jacobson, Van L.; Smetters, Diana K., Controlling the spread of interests and content in a content centric network.
  55. Papamanthou, Charalampos; Tamassia, Roberto; Triandopoulos, Nikolaos, Cryptographic accumulators for authenticated hash tables.
  56. Papamanthou, Charalampos; Tamassia, Roberto; Triandopoulos, Nikolaos, Cryptographic accumulators for authenticated hash tables.
  57. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  58. Bleichenbacher, Daniel; Wool, Avishai, Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers.
  59. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  60. Mosko, Marc E.; Solis, Ignacio, Cut-through forwarding of CCNx message fragments with IP encapsulation.
  61. Solis, Ignacio, Data deduping in content centric networking manifests.
  62. Jacobson, Van L.; Mosko, Marc E., Data transport by named content synchronization.
  63. Solis, Ignacio, Decoupled name security binding for CCN objects.
  64. Langer,Randy, Deterring reverse-engineering of software systems by randomizing the siting of stack-based data.
  65. Eldardiry, Hoda M. A.; Liao, Linxia; Honda, Tomonori; Saha, Bhaskar; Abreu, Rui, Device health estimation by combining contextual information with sensor data.
  66. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  67. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  68. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  69. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  70. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  71. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  72. Haber Stuart A. ; Stornetta ; Jr. W. Scott, Digital document authentication system.
  73. Takenaka, Masahiko; Yoshioka, Takashi; Matsuo, Fumitsugu; Chiba, Fumiaki, Digital signature program, digital signature apparatus, and digital signature method.
  74. Merkle Ralph C. (1134 Pimento Ave. Sunnyvale CA 94087), Digital signature system and method based on a conventional encryption function.
  75. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  76. Garcia-Luna-Aceves, Jose J., Distance-based routing in an information-centric network.
  77. Engberg, David, Distributed delegated path discovery and validation.
  78. Marry Patrick J. (Cary IL) Wilson Gregory P. (Lake Zurich IL) Houghton Michael W. (Hoffman Estates IL), Duplex analog scrambler.
  79. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  80. Micali,Silvio, Efficient certificate revocation.
  81. Rohatgi, Pankaj, Efficient hybrid public key signature scheme.
  82. Mosko, Marc E.; Wood, Christopher A., Encrypted CCNx.
  83. Solis, Ignacio; Scott, Glenn C.; Plass, Michael F.; Crabtree, Ian B., End-to end route tracing over a named-data network.
  84. Braunschvig, Gilad; Ben-Moshe, Tal; Schneider, Zvi; Krakov, David; Alkalay, Amitai, End-to-end data protection for distributed storage.
  85. Wood, Christopher A.; Scott, Glenn C., Explicit content deletion commands in a content centric network.
  86. Solis, Ignacio, Explicit strategy feedback in name-based forwarding.
  87. Solis, Ignacio; Mosko, Marc E., Express header for packets with hierarchically structured variable-length identifiers.
  88. Plocher, John; Zheng, Xitao; Hughes, James, Fast object fingerprints.
  89. Wood, Christopher A.; Scott, Glenn C., Flexible command and control in content centric networks.
  90. Greene, Daniel H.; Nabi-Abdolyousefi, Marzieh; Klenk, Matthew E.; de Kleer, Johan; Gupta, Shekhar; Matei, Ion; Dent, Kyle D., Frugal user engagement help systems.
  91. Mosko, Marc E.; Garcia-Luna-Aceves, Jose J., Gateways and routing in software-defined manets.
  92. Owlett, John; Thompson, George M.; Walton, Keith A., Generation of a digital signature.
  93. Mosko, Marc E., Header compression for CCN messages using dictionary.
  94. Mosko, Marc E., Header compression for CCN messages using dictionary learning.
  95. Gentry, Craig B.; Silverberg, Alice, Hierarchical identity-based encryption and signature schemes.
  96. Gentry,Craig B.; Silverberg,Alice, Hierarchical identity-based encryption and signature schemes.
  97. Gentry,Craig B.; Silverberg,Alice, Hierarchical identity-based encryption and signature schemes.
  98. Gentry,Craig B.; Silverberg,Alice, Hierarchical identity-based encryption and signature schemes.
  99. Wood, Christopher A.; Scott, Glenn C., Information and data framework in a content centric network.
  100. Felsher, David Paul, Information record infrastructure, system and method.
  101. Cormode, Graham; Yi, Ke, Interactive proof to validate outsourced data stream processing.
  102. Mahadevan, Priya; Scott, Glenn C.; Mosko, Marc E., Interest keep alives at intermediate routers in a CCN.
  103. Scott, Glenn C.; Mahadevan, Priya, Interest messages with a payload for a named data network.
  104. Mosko, Marc E.; Solis, Ignacio; Uzun, Ersin, Interest return control message.
  105. Wood, Christopher A.; Scott, Glenn C., Interest scheduling by an information and data framework in a content centric network.
  106. Fox, Kevin C.; Scott, Glenn C., Interface discovery and authentication in a name-based network.
  107. Sadler, John J.; Goodman, Larry; Galaher, Robert; Nacke, Dana; Gallagher, William; Bakshi, Paul; Lamoreux, Scott; Pierce, Hughes; Dvonch, Robert; Foster, Dana; Lizzol, EvaMarie; Hunsicker, Lynn; Hess, Jim; Sexton, John; Patel, Himesh; Kooken, Robert; Blalock, John; Smith, Diane; Johnson, Albert J., Item attribute preverification.
  108. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system and method.
  109. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system method.
  110. Wood, Christopher A.; Scott, Glenn C., Key catalogs in a content centric network.
  111. Kocher, Paul C.; Jaffe, Joshua M., Leak-resistant cryptographic payment smartcard.
  112. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  113. Huang, Shih-I; Shieh, Shiuh-Pyng; Chang, Sheng-Ming; Wang, Chi-Wei, Light weight authentication and secret retrieval.
  114. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  115. Uzun, Ersin, Low-cost authenticated signing delegation in content centric networking.
  116. Lee Stephen G. (Beckenham Kent GBX) Smith Peter R. (Alresford GBX), Management of cryptographic keys.
  117. Mahadevan, Priya; Scott, Glenn C.; Meike, Roger C., Marketplace for presenting advertisements in a scalable data broadcasting system.
  118. Hashimoto, Mikio; Yamada, Naoko; Hayashi, Ryotaro, Memory management device and non-transitory computer readable storage medium.
  119. Hashimoto, Mikio; Yamada, Naoko; Kanai, Jun; Hayashi, Ryotaro, Memory management device and non-transitory computer readable storage medium.
  120. Yamada, Naoko; Hashimoto, Mikio; Hayashi, Ryotaro, Memory management device and non-transitory computer readable storage medium.
  121. Brown, Michael Kenneth; Hu, Anthony Chun Li; Paruzel, Marek; Yamada, Atsushi, Merkle signature scheme using subtrees.
  122. Gibbs, Benjamin K., Method and apparatus for an adapted digital signature.
  123. Mosko, Marc E.; Jacobson, Van L., Method and apparatus for configuring routing paths in a custodian-based routing architecture.
  124. David P. Maher, Method and apparatus for defining private currencies.
  125. Mahadevan, Priya; Quereilhac, Alina, Method and apparatus for deploying a minimal-cost CCN topology.
  126. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  127. Solis, Ignacio, Method and apparatus for establishing a virtual interface for a set of mutual-listener devices.
  128. Mosko, Marc E., Method and apparatus for exchanging bidirectional streams over a content centric network.
  129. Atallah, Mikhail J.; Bryant, Eric D., Method and apparatus for hiding a private key.
  130. Silberstein, Rebecca Lynn Braynard; Plass, Michael F.; Meike, Roger C., Method and apparatus for performing server handoff in a name-based content distribution system.
  131. Silberstein, Rebecca Lynn Braynard; Plass, Michael F.; Meike, Roger C., Method and apparatus for pre-fetching remote content based on static and dynamic recommendations.
  132. Silberstein, Rebecca Lynn Braynard; Plass, Michael F.; Meike, Roger C., Method and apparatus for prefetching content in a data stream.
  133. Solis, Ignacio; Mosko, Marc E., Method and apparatus for preventing insertion of malicious content at a named data network router.
  134. Solis, Ignacio; Mosko, Marc E., Method and apparatus for preventing insertion of malicious content at a named data network router.
  135. Mahadevan, Priya; Meike, Roger C.; Scott, Glenn C., Method and apparatus for scalable data broadcasting.
  136. Gentry, Craig B.; Ramzan, Zulfikar Amin, Method and apparatus for secure and small credits for verifiable service provider metering.
  137. Gentry, Craig B.; Ramzan, Zulfikar Amin, Method and apparatus for secure and small credits for verifiable service provider metering.
  138. Walker Jay S. ; Schneier Bruce ; Jorasch James A. ; Van Luchene Andrew S., Method and apparatus for securing a computer-based game of chance.
  139. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Van Luchene, Andrew S., Method and apparatus for securing a computer-based game of chance.
  140. Duke,Andrew; Stephens,George, Method and apparatus for storing and updating information in a multi-cast system.
  141. Mahadevan, Priya; Scott, Glenn C.; Meike, Roger C., Method and apparatus for streaming advertisements in a scalable data broadcasting system.
  142. Wood, Christopher A.; Solis, Ignacio; Ioannou, Andriana; Scott, Glenn C., Method and system for collecting historical network information in a content centric network.
  143. Wood, Christopher A.; Scott, Glenn C., Method and system for interest groups in a content centric network.
  144. Mahadevan, Priya; Scott, Glenn C.; Mosko, Marc E., Method and system for keeping interest alive in a content centric network.
  145. Mahadevan, Priya; Scott, Glenn C.; Mosko, Marc E., Method and system for keeping interest alive in a content centric network.
  146. Mahadevan, Priya; Uzun, Ersin; Afanasyev, Alexander, Method and system for mitigating interest flooding attacks in content-centric networks.
  147. Wood, Christopher A.; Scott, Glenn C., Method and system for name encryption agreement in a content centric network.
  148. Sevilla, Spencer; Mahadevan, Priya; Garcia-Luna-Aceves, Jose J., Method and system for name resolution across heterogeneous architectures.
  149. Almgren, Hans, Method and system for providing a way to verify the integrity of a document.
  150. Wood, Christopher A.; Scott, Glenn C., Method and system for reference counted pending interest tables in a content centric network.
  151. Wood, Christopher A.; Scott, Glenn C., Method and system for routable prefix queries in a content centric network.
  152. Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
  153. Herzberg, Amir; Krawczyk, Hugo Mario; Kutten, Shay; Le, An Van; Matyas, Stephen Michael; Yung, Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
  154. Herve Robert J. L. A. (Versailles FRX), Method and system for transmission of confidential data.
  155. Solis, Ignacio; Mosko, Marc E.; Uzun, Ersin, Method and system for verifying renamed content using manifests in a content centric network.
  156. Naor Moni,ILX ; Nissim Yaacov,ILX, Method for authentication item.
  157. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  158. Tseng, Huei-Ru; Tsai, Pei-Chuan; Jan, Rong-Hong; Chen, Chien; Li, Hsia-Hsin; Lin, Chih-Che, Method for certificate generation and revocation with privacy preservation.
  159. Garcia Morchon, Oscar; Erdmann, Bozena; Baldus, Heribert, Method for distributed identification of a station in a network.
  160. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  161. Estes,Jacquelyn; Orbke,Wayne H.; Penn,Maria C.; Pensabene,Phillip A.; Ray,Christine R. L.; Rios,Julie F.; Robinson,Jacquelyn M.; Troxel,Kerry J., Method for shipping a package privately to a customer.
  162. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  163. Law, Laurie E.; Matt, Brian J., Method of identifying invalid digital signatures involving batch verification.
  164. Estes,Jacquelyn; Orbke,Wayne H.; Penn,Maria C.; Pensabene,Phillip A.; Ray,Christine R. L.; Rios,Julie F.; Robinson,Jacquelyn M.; Troxel,Kerry J., Method, system, and computer readable medium for shipping a package to a customer while preserving customer privacy.
  165. Jakobsson, Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  166. Jakobsson, Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  167. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  168. Orbke, Wayne H.; Tremaine, Samuel R., Methods and systems for establishing an electronic account for a customer.
  169. Orbke, Wayne H.; Tremaine, Samuel R., Methods and systems for establishing an electronic account for a customer.
  170. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer.
  171. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key.
  172. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  173. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  174. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  175. Campbell,Leo J.; Cook,Jon L., Methods and systems for proofing identities using a certificate authority.
  176. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  177. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  178. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  179. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  180. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  181. Freudiger, Julien F.; Brito, Alejandro E.; Rane, Shantanu; Uzun, Ersin, Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks.
  182. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  183. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  184. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  185. Owlett, John; Thompson, George M.; Walton, Keith A., Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes.
  186. Mosko, Marc E.; Garcia-Luna-Aceves, Jose J., Multi-publisher routing protocol for named data networks.
  187. Hoffberg, Steven M., Multifactorial optimization system and method.
  188. Kurihara, Jun; Uzun, Ersin; Garcia-Luna-Aceves, Jose J., Network coding for content-centric network.
  189. Mosko, Marc E.; Wood, Christopher A., Network named fragments in a content centric network.
  190. Uzun, Ersin; Wood, Christopher A.; Mosko, Marc E., Network-layer application-specific trust model.
  191. Scanlon Edward Francis, OCR error correction methods and apparatus utilizing contextual comparison.
  192. Matyas Stephen M. (Kingston NY), Offline PIN validation with DES.
  193. Mosko, Marc E.; Solis, Ignacio; Scott, Glenn C.; Wood, Christopher A., Order encoded manifests in a content centric network.
  194. Solis, Ignacio, Ordered-element naming for name-based packet forwarding.
  195. Wilson, Kelce S, Page substitution verification preparation.
  196. Hall,William E.; Jutla,Charanjit S., Parallelizable authentication tree for random access storage.
  197. Kocher, Paul C., Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks.
  198. Mosko, Marc E., Peer-to-peer sharing in a content centric network.
  199. Mosko, Marc E.; Solis, Ignacio; Garcia-Luna-Aceves, Jose J., Pending interest table behavior.
  200. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  201. Cohen, Simona; Naor, Dalit; Ramati, Leeat; Reshef, Petra; Ronen, Shahar, Preservation aware fixity in digital preservation.
  202. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  203. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  204. Mahadevan, Priya; Scott, Glenn C., Probabilistic lazy-forwarding technique without validation in a content centric network.
  205. Mollier Jean H. (Bougival FRX), Process and system for transmission of signed messages.
  206. Schwenk, Joerg, Process for establishing a common cryptographic key for N subscribers.
  207. Wood, Christopher A.; Solis, Ignacio; Ioannou, Andriana; Scott, Glenn C., Protocol to query for historical network information in a content centric network.
  208. Nakano,Toshihisa; Ohmori,Motoji; Tatebayashi,Makoto; Ishihara,Hideshi, Public key certificate revocation list generation apparatus, revocation judgement apparatus, and authentication system.
  209. Ryan, Mark, Public-key certificate management system and method.
  210. Burbridge, Trevor; Soperra, Andrea, Radio frequency identification transponder security.
  211. Mosko, Marc E., Reconstructable content objects.
  212. Mosko, Marc E., Reconstructable content objects.
  213. Preslan, Kenneth; O'Keefe, Matthew T.; Ortberg, Todd, Remote backup and restore.
  214. Preslan, Kenneth; O'Keefe, Matthew T.; Ortberg, Todd, Remote backup and restore.
  215. O'Keefe, Matthew T.; Preslan, Kenneth, Remote backup and restore system and method.
  216. Mahadevan, Priya; Scott, Glenn C., Reputation-based instruction processing over an information centric network.
  217. Mahadevan, Priya; Scott, Glenn C., Reputation-based strategy for forwarding and responding to interests over a content centric network.
  218. Solis, Ignacio; Scott, Glenn C.; Walendowski, Alan, Resource allocation using CCN manifests.
  219. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  220. Mosko, Marc E., Secure collection synchronization using matched network names.
  221. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  222. Cilibrasi, Rudi, Service associated with persistent storage.
  223. Cilibrasi, Rudi, Service associated with persistent storage.
  224. Mosko, Marc E., Service discovery using collection synchronization with exact names.
  225. Mosko, Marc E.; Garcia-Luna-Aceves, Jose J., Service-oriented routing in software-defined MANETs.
  226. B. Gentry, Craig, Signature schemes using bilinear mappings.
  227. Gentry, Craig B., Signature schemes using bilinear mappings.
  228. Gentry, Craig B., Signature schemes using bilinear mappings.
  229. Gentry, Craig B., Signature schemes using bilinear mappings.
  230. Gentry, Craig B., Signature schemes using bilinear mappings.
  231. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  232. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  233. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  234. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  235. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  236. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  237. Silberstein, Rebecca Lynn Braynard; Garcia-Luna-Aceves, Jose J., System and method for accessing digital content using a location-independent name.
  238. Mosko, Marc E.; Solis, Ignacio, System and method for all-in-one content stream in content-centric networks.
  239. Mosko, Marc E.; Solis, Ignacio, System and method for circular link resolution with computable hash-based names in content-centric networks.
  240. Mosko, Marc E.; Solis, Ignacio, System and method for circular link resolution with hash-based names in content-centric networks.
  241. Solis, Ignacio, System and method for compressing content centric networking messages.
  242. Provenzano, Christopher A., System and method for creating deduplicated copies of data by sending difference data between near-neighbor temporal states.
  243. Provenzano, Christopher A.; Roman, Mark A., System and method for creating deduplicated copies of data by tracking temporal relationships among copies using higher-level hash structures.
  244. Provenzano, Christopher A.; Roman, Mark A., System and method for creating deduplicated copies of data by tracking temporal relationships among copies using higher-level hash structures.
  245. Solis, Ignacio; Scott, Glenn C., System and method for creating virtual interfaces based on network characteristics.
  246. Hoffberg, Steven M., System and method for determining contingent relevance.
  247. Mosko, Marc E., System and method for direct storage access in a content-centric network.
  248. Garcia-Luna-Aceves, Jose J., System and method for distance-based interest forwarding.
  249. Mahadevan, Priya; Scott, Glenn C., System and method for dynamic name configuration in content-centric networks.
  250. Uzun, Ersin, System and method for efficient and secure distribution of digital content.
  251. Garcia-Luna-Aceves, Jose J., System and method for efficient name-based content routing using link-state information in information-centric networks.
  252. Dilger, Andreas E.; Barton, Eric; Deshmukh, Rahul S., System and method for end-to-end data integrity in a network file system.
  253. Wood, Christopher A.; Scott, Glenn C., System and method for ephemeral entries in a forwarding information base in a content centric network.
  254. Fox, Kevin C., System and method for forwarder connection information in a content centric network.
  255. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  256. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  257. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  258. Doyle,Michael D.; Hamilton,Robert G.; Perrone,Marc C.; Doyle,Paul F.; Bernsohn,Glenn W., System and method for graphical indicia for the certification of records.
  259. Doyle,Michael D.; Hamilton,Robert G.; Perrone,Marc V.; Doyle,Paul F.; Bernsohn,Glenn W., System and method for graphical indicia for the certification of records.
  260. Mosko, Marc E.; Plass, Michael F., System and method for hash-based forwarding of packets with hierarchically structured variable-length identifiers.
  261. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  262. Scott, Glenn C., System and method for maintaining a distributed and fault-tolerant state over an information centric network.
  263. Scott, Glenn C.; Goel, Priti, System and method for making optimal routing decisions based on device-specific parameters in a content centric network.
  264. Yamagishi,Yasuaki; Gonno,Yoshihisa; Nishio,Fumihiko; Tsunoda,Tomohiro, System and method for managing changes in a public key certificate directory.
  265. Ashutosh, Ashutosh; Chang, David F.; Mutalik, Madhav, System and method for managing data with service level agreements that may specify non-uniform copying of data.
  266. Mahadevan, Priya; Scott, Glenn C., System and method for managing devices over a content centric network.
  267. Mosko, Marc E., System and method for minimum path MTU discovery in content centric networks.
  268. Garcia-Luna-Aceves, Jose J., System and method for multi-source multicasting in content-centric networks.
  269. Garcia-Luna-Aceves, Jose J., System and method for multi-source multicasting in content-centric networks.
  270. Mosko, Marc E., System and method for packet forwarding using a conjunctive normal form strategy in a content-centric network.
  271. Solis, Ignacio; Scott, Glenn C.; Uzun, Ersin, System and method for parallel secure content bootstrapping in content-centric networks.
  272. Ashutosh, Ashutosh; Chang, David F.; Mutalik, Madhav, System and method for performing a plurality of prescribed data management functions in a manner that reduces redundant access operations to primary storage.
  273. Ashutosh, Ashutosh; Chang, David F.; Mutalik, Madhav, System and method for performing a plurality of prescribed data management functions in a manner that reduces redundant access operations to primary storage.
  274. Abercrombie, Philip J.; Mutalik, Madhav; Provenzano, Christopher A.; Roman, Mark A., System and method for performing backup or restore operations utilizing difference information and timeline state information.
  275. Mahadevan, Priya; Uzun, Ersin; Sevilla, Spencer; Garcia-Luna-Aceves, Jose J., System and method for performing key resolution over a content centric network.
  276. Wood, Christopher A., System and method for piggybacking routing information in interests in a content centric network.
  277. Mosko, Marc E., System and method for process migration in a content centric network.
  278. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  279. Mosko, Marc E., System and method for ranking content popularity in a content-centric network.
  280. Mosko, Marc E.; Solis, Ignacio, System and method for reconstructable all-in-one content stream.
  281. Garcia-Luna-Aceves, Jose J., System and method for routing packets in a content centric network using anonymous datagrams.
  282. Hunacek, Didier; Macchetti, Marco; Servet, Patrick, System and method for secure loading data in a cache memory.
  283. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  284. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  285. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  286. Scott, Glenn C.; Mosko, Marc E., System and method for simple service discovery in content-centric networks.
  287. Wood, Christopher A.; Scott, Glenn C., System and method for throttling traffic based on a forwarding information base in a content centric network.
  288. Doyle,Michael D.; Doyle,Paul F.; Bernsohn,Glenn W.; Roberts,Jeffrey D.; Wolf,Kirk James; Goetze,Stephen P., System and method for widely witnessed proof of time.
  289. Krause, Robert G.; Orbke, Wayne H., System and methods for electronic message content identification.
  290. Duane,William; R철stin,Peter, System and methods for maintaining and distributing personal security devices.
  291. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  292. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  293. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  294. Wood, Christopher A.; Mosko, Marc E., System for a secure encryption proxy in a content centric network.
  295. Mosko, Marc E., System for distributing nameless objects using self-certifying names.
  296. Wood, Christopher A.; Mosko, Marc E.; Uzun, Ersin, System for key exchange in a content centric network.
  297. Wood, Christopher A.; Mosko, Marc E.; Uzun, Ersin, System for key exchange in a content centric network.
  298. Estes, Jacquelyn; Orbke, Wayne H.; Penn, Maria C.; Pensabene, Phillip A.; Ray, Christine R. L.; Rios, Julie F.; Robinson, Jacquelyn M.; Troxel, Kerry J., System, method and article of manufacture for shipping a package privately to a customer.
  299. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  300. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  301. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  302. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  303. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  304. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  305. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  306. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  307. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  308. Cuende, Luis Iván; Sánchez de Pedro Crespo, Adán, Systems and methods for certification of data units and/or certification verification.
  309. Krause, Robert G.; Orbke, Wayne H., Systems and methods for electronic message content identification.
  310. Chamberlain, Charles R., Systems and methods for electronic postmarking of data including location data.
  311. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  312. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  313. Buie, James W.; Tartal, William; Webster, Janet L., Systems and methods for providing mail item retrieval.
  314. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  315. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  316. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  317. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  318. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  319. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  320. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  321. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  322. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  323. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  324. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  325. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  326. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  327. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  328. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  329. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  330. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  331. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  332. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  333. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  334. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  335. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  336. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  337. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  338. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  339. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  340. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  341. Solis, Ignacio, Transferring state in content centric network stacks.
  342. Wood, Christopher A., Transparent encryption in a content centric network.
  343. Wood, Christopher A.; Solis, Ignacio, Transport session state protocol.
  344. Wood, Christopher A.; Scott, Glenn C., Transport stack name scheme and identity management.
  345. Micali Silvio, Tree-based certificate revocation system.
  346. Micali Silvio, Tree-based certificate revocation system.
  347. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  348. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  349. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  350. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  351. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  352. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  353. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  354. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  355. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  356. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  357. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  358. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  359. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  360. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  361. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  362. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  363. Maheshwari, Umesh; Vingralek, Radek; Sibert, W. Olin, Trusted storage systems and methods.
  364. Maheshwari,Umesh; Vingralek,Radek; Sibert,W. Olin, Trusted storage systems and methods.
  365. Gibbs Benjamin K. ; Roeder G. R. Konrad, Unique digital signature.
  366. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  367. Devar,Rodney C., Universal delivery and collection box unit (UDCBU).
  368. Fox, Kevin C.; Scott, Glenn C., Updating a transport stack in a content centric network.
  369. Kenji Kawano JP; Masahiro Taguchi JP; Kazuo Saito JP, Verification data generating apparatus, data verification apparatus and storage medium for storing verification data generating program.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로