$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Crytographic key notarization methods and apparatus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0192129 (1980-09-29)
발명자 / 주소
  • Smid Miles E. (Silver Spring MD) Branstad Dennis K. (Gaithersburg MD)
인용정보 피인용 횟수 : 100  인용 특허 : 5

초록

Cryptographic keys for a cryptographic function are notarized by encrypting the keys with the cryptographic function using a notarizing cryptographic key derived from identifier designations associated with the encryptor and intended decryptor, respectively, and an interchange key which is accessibl

대표청구항

A method for notarizing a cryptographic key used in the encryption and decryption of data with a cryptographic function controlled by cryptographic keys such that the data encryptor and intended decryptor are positively identified, the method comprising the step of: encrypting the cryptographic key

이 특허에 인용된 특허 (5)

  1. Check ; Jr. Frank T. (Orange CT), Computer accessing system.
  2. Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY) Prentice Paul N. (Hyde Park NY) Tuchman Walter L. (Woodstock NY), Cryptographic verification of operational keys used in communication networks.
  3. Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Tuchman Walter L. (Woodstock NY), Digital signature system and apparatus.
  4. Atalla Martin M. (Atherton CA), Method and apparatus for securing data transmissions.
  5. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.

이 특허를 인용한 특허 (100)

  1. Lawrence, David; Junnarkar, Ajay, Automated global risk management.
  2. Matumoto Tutomu (Yokohama JPX) Imai Hideki (Yokohama JPX), Common cryptokey generation system and communication system using common cryptokeys.
  3. Schrter Klaus G. (Hhenweg 1 1000 Berlin 20 DEX), Communication system.
  4. Mizutani Hiroyuki (Yokohama JPX) Kamitake Takashi (Tokyo JPX), Communications network using an enciphering and deciphering device.
  5. Blakely ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Configurable password integrity servers for use in a shared resource environment.
  6. Matyas ; Jr. Stephen M. (Manassas VA) Meyer Carl H. W. (Kingston NY) Brachtl Bruno O. (Boeblingen DEX), Controlled use of cryptographic keys via generating station established control values.
  7. Saito, Makoto, Controlling database copyrights.
  8. Saito, Makoto, Controlling database copyrights.
  9. Saito, Makoto, Controlling database copyrights.
  10. Chen, Yuqun; Kirovski, Darko; Yacobi, Yacov; Yuval, Gideon A., Counterfeit and tamper resistant labels with randomly occurring features.
  11. Chen,Yuqun; Kirovski,Darko; Yacobi,Yacov; Yuval,Gideon A., Counterfeit and tamper resistant labels with randomly occurring features.
  12. Elander Robert C. (Saugerties NY) Lennon Richard E. (Saugerties NY) Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY) Shuck Robert E. (West Hurley NY) Tuchman Walter L. (Boulder CO), Cryptographic application for interbank verification.
  13. Goss Kenneth C (Oceano CA), Cryptographic method and apparatus for public key exchange with authentication.
  14. Saito, Makoto, Data copyright management.
  15. Saito, Makoto, Data copyright management.
  16. Saito, Makoto, Data copyright management system.
  17. Saito,Makoto, Data copyright management system.
  18. Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Johnson Donald B. (Manassas VA) Karne Ramesh K. (Herndon VA) Le An V. (Arlington VA) Prymak Rostislaw (Dumfries VA) Thomas Julian (Lagra, Data cryptography operations using control vectors.
  19. Saito, Makoto, Data management.
  20. Saito, Makoto, Data management system.
  21. Saito, Makoto, Data management system.
  22. Saito, Makoto, Data management system.
  23. Brothers, Harlan J., Data-conditioned encryption method.
  24. Lerner, Daniel Maurice, Devices for transmitting and communicating randomized data utilizing sub-channels.
  25. Saito, Makoto, Digital content management system and apparatus.
  26. Saito, Makoto, Digital content management system and apparatus.
  27. Saito, Makoto, Digital content management system and apparatus.
  28. Lee, Lane W.; Zaharris, Daniel R., Digital rights management within an embedded storage device.
  29. Duncanson, Jr., Paul T., Electronic information and cryptographic key management system.
  30. Durst Robert T. (83 Harwich Rd. Fairfield CT 06430) Hunter Kevin D. (440 Allwyndale Dr. Stratford CT 06497), Electronic notary.
  31. Takaragi Kazuo (Yokohama JPX) Sasaki Ryoichi (Fujisawa JPX) Shiraishi Takayoshi (Chigasaki JPX) Kurashiki Nobuhiro (Yokohama JPX), Electronic transaction system.
  32. Everhart Joseph R. (Holmdel NJ) Osborn Jeffrey G. (Old Bridge NJ), Encryption system key distribution method and apparatus.
  33. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  34. Gammie Keith B. (Markham CAX), External security module for a television signal decoder.
  35. Gammie,Keith B., External security module for a television signal decoder.
  36. Lawrence, David, Gaming industry risk management clearinghouse.
  37. Lawrence, David, Gaming industry risk management clearinghouse.
  38. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  39. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  40. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  41. Foster Robert I. (Mesa AZ) Pfeifer Robert F. (Scottsdale AZ) Mihm ; Jr. Thomas J. (Mesa AZ), Hierarchical key management system.
  42. Akashika, Hideki; Ogishima, Jun; Hanaki, Naofumi, Information processing apparatus, information processing method, and program.
  43. Felsher, David Paul, Information record infrastructure, system and method.
  44. Schonberg,Daniel; Kirovski,Darko, Iris-based biometric identification.
  45. Schonberg,Daniel; Kirovski,Darko, Iris-based biometric identification.
  46. Carter, Stephen R, Maintaining a soft-token private key store in a distributed environment.
  47. Carter, Stephen R., Maintaining a soft-token private key store in a distributed environment.
  48. Rajasekaran, Sanguthevar; Hird, Geoffrey R.; Kausik, Balas Natarajan, Method and apparatus for camouflaging of data, information and functional transformations.
  49. Matt,Brian J., Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique.
  50. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  51. Michener John R. (Princeton NJ), Method and apparatus for securing access to a computer facility.
  52. Rajasekaran,Sanguthevar; Hird,Geoffrey R.; Kausik,Balas Natarajan, Method and system for camouflaging access-controlled data.
  53. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  54. Saito, Makoto, Method for controlling database copyrights.
  55. Saito,Makoto, Method for controlling database copyrights.
  56. Saito,Makoto, Method for controlling database copyrights.
  57. Saito,Makoto, Method for controlling database copyrights.
  58. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  59. Hillhouse Robert D.,CAX, Method of securing a cryptographic key.
  60. Lawrence, David; Nitze, Peter; MacDonald, Alasdair, Method, system, apparatus, program code and means for determining a redundancy of information.
  61. Lawrence, David; Nitze, Peter; MacDonald, Alasdair, Method, system, apparatus, program code and means for identifying and extracting information.
  62. Bosen Robert J. (Pittsburg CA) Tucker James J. (Berkeley CA), Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer.
  63. Hoffberg, Steven M., Multifactorial optimization system and method.
  64. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E.; Osborne,Anthony C.; Herath,Nishad P., Network-based risk-assessment tool for remotely detecting local computer vulnerabilities.
  65. Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Johnson Donald B. (Manassas VA) Karne Ramesh K. (Herndon VA) Le An V. (Arlington VA) Prymak Rostislaw (Dumfries VA) Thomas Julian (Lagra, Personal identification number processing using control vectors.
  66. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  67. Mollier Jean H. (Bougival FRX), Process and system for transmission of signed messages.
  68. Blakley ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Propagating plain-text passwords from a main registry to a plurality of foreign registries.
  69. Lawrence, David, Proprietary risk management clearinghouse.
  70. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  71. Carter, Stephen R.; Burch, Lloyd Leon, Remote authorization for operations.
  72. Carter, Stephen R; Burch, Lloyd Leon, Remote authorization for operations.
  73. Hopkins W. Dale, Remote financial transaction system.
  74. Blakley ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Retrieving plain-text passwords from a main registry by a plurality of foreign registries.
  75. Feldman,Timothy R.; Lee,Lane W.; Braitberg,Michael F.; Rayburn,Douglas M.; Kiwimagi,Gary G., Secure access method and system.
  76. Constant James N. (1603 Danbury Dr. Claremont CA 91711), Secure computer.
  77. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  78. Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Johnson Donald B. (Manassas VA) Le An V. (Arlington VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA) Yeh Phil C. (Poug, Secure key management using control vector translation.
  79. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Martin William C. (Concord NC) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure key management using programable control vector checking.
  80. Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Johnson Donald B. (Manassas VA) Karne Ramesh K. (Herndon VA) Le An V. (Arlington VA) Prymak Rostislaw (Dumfries VA) Thomas Julian (Lagra, Secure management of keys using control vectors.
  81. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  82. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  83. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  84. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  85. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  86. Hoffberg, Steven M., System and method for determining contingent relevance.
  87. Nakae, Masayuki, System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product.
  88. Nakae, Masayuki, System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product.
  89. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  90. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  91. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  92. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  93. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  94. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  95. Monk, David; Canessa, John C.; Canessa, Giancarlo; Canessa, Gino G., System and method of encryption for DICOM volumes.
  96. Canessa, John C.; Canessa, Giancarlo; Canessa, Gino G., System and methods for metadata management in content addressable storage.
  97. Kirovski, Darko, Systems and methods for encoding randomly distributed features in an object.
  98. Lawrence, David; Nitze, Peter; MacDonald, Alasdair, Systems and methods for managing information associated with legal, compliance and regulatory risk.
  99. Lawrence, David; Nitze, Peter; MacDonald, Alasdair, Systems, methods, apparatus, and schema for storing, managing and retrieving information.
  100. Grynberg Avigdor (23 Hagderoth Street Savyon ILX), User authorization verification apparatus for computer systems including a central device and a plurality of pocket size.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로