$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

RSA Public-key data encryption system having large random prime number generating microprocessor or the like 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0216435 (1980-12-15)
발명자 / 주소
  • Miller William J. (North Miami FL) Trbovich Nick G. (Hollywood FL)
출원인 / 주소
  • Racal-Milgo, Inc. (Miami FL 02)
인용정보 피인용 횟수 : 92  인용 특허 : 1

초록

A public-key data encryption system employing RSA public-key data encryption including a message encrypter capable of encrypting messages using a non-secret encryption key, a transmitter-receiver coupled to the message encrypter which transmits or receives an encrypted message to or from a remote lo

대표청구항

In a public-key data encryption system employing RSA public-key data encryption, a large random prime number generating means for generating large randomly selected prime numbers necessary for RSA public-key data encryption, each having a desired length, the random prime number generating means incl

이 특허에 인용된 특허 (1)

  1. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.

이 특허를 인용한 특허 (92)

  1. Etchegoyen, Craig S., Authentication of computing and communications hardware.
  2. Hellman Martin E., Authentication using random challenges.
  3. Chandran, Ravi; Marchok, Daniel J.; Dunne, Bruce E., Communication system tonal component maintenance techniques.
  4. Chandran,Ravi; Marchok,Daniel J.; Dunne,Bruce E., Communication system tonal component maintenance techniques.
  5. Dupaquis, Vincent, Computer-implemented method for fast generation and testing of probable prime numbers for cryptographic applications.
  6. Zhu, Bin; Feng, Min, Content encryption schema for integrating digital rights management with encrypted multicast.
  7. Djakovic,Vladan, Content protection and authentication without secret keys.
  8. Harrison, Keith Alexander; Chen, Liqun, Cryptographic method and apparatus.
  9. Sedlak Holger (Braunschweiger Strasse 1A D-3300 Braunschweig DEX), Cryptographic method and cryptographic processor for carrying out the method.
  10. Miyaguchi Shoji (Yokohama JPX), Cryptosystem.
  11. Etchegoyen, Craig S.; Harjanto, Dono; Davis, Bradley C., Device and method for secured communication.
  12. Etchegoyen, Craig S.; Harjanto, Dono, Device-bound certificate authentication.
  13. Marry Patrick J. (Cary IL) Wilson Gregory P. (Lake Zurich IL) Houghton Michael W. (Hoffman Estates IL), Duplex analog scrambler.
  14. He, Yuan; Luo, Lin; Su, Ming; Shao, Ling; Xiang, Zhe, Embedding and detecting watermarks based on embedded positions in document layout.
  15. Takaragi Kazuo (Ebina JPX) Nakagawa Fusao (Yokohama JPX) Nagai Yasuhiko (Yokohama JPX) Sasaki Ryoichi (Fujisawa JPX), Encrypting system of data.
  16. Etchegoyen, Craig Stephen, Failover procedure for server system.
  17. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  18. Hamilton, Neil F.; Low, Arthur J., Flexible architecture for processing of large numbers and method therefor.
  19. Pavlovic, Nenad, Generation of device dependent RSA key.
  20. Etchegoyen, Craig Stephen, Identification of embedded system devices.
  21. Felsher, David Paul, Information record infrastructure, system and method.
  22. Richardson, Ric B., Installing protected software product using unprotected installation image.
  23. Johnson, Donald B., Key validation scheme.
  24. Johnson, Donald B., Key validation scheme.
  25. Johnson,Donald B., Key validation scheme.
  26. Etchegoyen, Craig S., License auditing for distributed applications.
  27. Chandran, Ravi; Marchok, Daniel J.; Dunne, Bruce E., Method and apparatus for adaptively suppressing noise.
  28. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  29. Daugaard, Kim, Method and system for ensuring connection of a module to an electronic apparatus.
  30. Kim Daugaard DK, Method and system for ensuring connection of a module to an electronic apparatus.
  31. Brokenshire,Daniel Alan; Peyravian,Mohammad, Method for efficient generation of modulo inverse for public key cryptosystems.
  32. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  33. Bullock, Roddy McKee, Method for making money on internet news sites and blogs.
  34. Hori, Hironobu, Method of and apparatus for deriving prime numbers, as well as record medium having program for executing prime number deriving method recorded thereon.
  35. Felger, David, Method of billing a purchase made over a computer network.
  36. Felger, David, Method of billing a purchase made over a computer network.
  37. Felger, David, Method of billing a purchase made over a computer network.
  38. Van Den Ende Antonius C. J. (Eindhoven NLX), Method of generating a pseudo-random sequence of signs of a large sequence length.
  39. Etchegoyen, Craig S., Modular software protection.
  40. Hoffberg, Steven M., Multifactorial optimization system and method.
  41. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Hines,Larry L., Multiple cryptographic key precompute and store.
  42. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Wang,Ruth A., Multiple prime number generation using a parallel prime number search algorithm.
  43. Etchegoyen, Craig S., Network access protection.
  44. Cooper James A. (Albuquerque NM), One-way transformation of information.
  45. Wilson William J. (1239 Blevins Gap Rd. Huntsville AL 35802), Polygraphic encryption-decryption communications system.
  46. Richardson, Ric B., Post-production preparation of an unprotected installation image for downloading as a protected software product.
  47. Itoh Koichi,JPX ; Yokoyama Kazuhiro,JPX ; Torii Naoya,JPX ; Takenaka Masahiko,JPX, Prime number generation apparatus B-smoothness judgement apparatus and computer memory product.
  48. Kasahara,Masao; Sato,Yoshizo; Murakami,Yasuyuki, Prime number generation method, prime number generation apparatus, and cryptographic system.
  49. Daemen, Joan; Cuypers, Frank; Van Assche, Gilles; Liardet, Pierre-Yvan, Protection of a prime number generation for an RSA algorithm.
  50. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Public key cryptographic apparatus and method.
  51. Chen Lidong ; Williams Charles S., Public key sterilization.
  52. Etchegoyen, Craig Stephen, Remote update of computers based on physical device recognition.
  53. Frankel Yair ; Yung Marcel M. ; MacKenzie Philip D., Robust efficient distributed RSA-key generation.
  54. Frankel,Yair; Yung,Marcel M.; MacKenzie,Philip D., Robust efficient distributed RSA-key generation.
  55. Rimpo Charles Robert ; Ciccone John Charles ; Yuenyongsgool Yongyut, Secure cryptographic multi-exponentiation method and coprocessor subsystem.
  56. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  57. Etchegoyen, Craig S., Software signature tracking.
  58. Vanstone Scott A.,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Strengthened public key protocol.
  59. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua, Strengthened public key protocol.
  60. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  61. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  62. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  63. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  64. Richardson, Ric B., System and method for adjustable licensing of digital products.
  65. Etchegoyen, Craig Stephen, System and method for content delivery.
  66. Hoffberg, Steven M., System and method for determining contingent relevance.
  67. Etchegoyen, Craig S., System and method for device authentication with built-in tolerance.
  68. Richardson, Ric B.; Etchegoyen, Craig S.; Harjanto, Dono; Davis, Bradley C., System and method for device bound public key infrastructure.
  69. Andrew V. Sutherland ; Michael R. Klugerman ; Frank M. D'Ippolito, System and method for distributing postage over a public network, enabling efficient printing of postal indicia on items to be mailed and authenticating the printed indicia.
  70. Sutherland, Andrew V.; Klugerman, Michael R.; D'Ippolito, Frank M., System and method for distributing postage over a public network, enabling efficient printing of postal indicia on items to be mailed and authenticating the printed indicia.
  71. Keller,Merle L.; Mower,Vaughn L.; McEntire,Steve J.; Albertini,Victor D., System and method for fast data encryption/decryption using time slot numbering.
  72. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  73. Etchegoyen, Craig Stephen, System and method for locating network nodes.
  74. Eisen, Jeffrey N, System and method for making encrypted content available to derivable related parties.
  75. Etchegoyen, Craig Stephen, System and method for preventing multiple online purchases.
  76. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  77. Nagel, Robert H.; Felsher, David P.; Hoffberg, Steven M., System and method for secure communications involving an intermediary.
  78. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  79. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  80. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  81. Etchegoyen, Craig Stephen, System and method for secured mobile communication.
  82. Etchegoyen, Craig Stephen, System and method for securing an electronic communication.
  83. Etchegoyen, Craig S., System and method for tracking and scoring user activities.
  84. Etchegoyen, Craig Stephen, System and method for traffic information delivery.
  85. Richardson, Ric B., System of dependant keys across multiple pieces of related scrambled information.
  86. Etchegoyen, Craig Stephen, Systems and methods for auditing software usage using a covert key.
  87. Milligan, Thomas; Eastham, Bryant, Systems and methods for automatic secret generation and distribution for secure systems.
  88. Etchegoyen, Craig S., Systems and methods for game activation.
  89. Milligan, Thomas; Eastham, Bryant, Systems and methods for providing secure access to embedded devices using a trust manager and a security broker.
  90. Tie, Teck Sing; Backal, Shaul O., T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring.
  91. Etchegoyen, Craig Stephen, Use of fingerprint with an on-line or networked auction.
  92. Etchegoyen, Craig S., Web content access using a client device identifier.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로