$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for establishing user authenication with composite session keys among cryptographically communicating nodes 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0722091 (1985-04-11)
발명자 / 주소
  • Bass Walter E. (Sunnyvale CA) Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 111  인용 특허 : 3

초록

A method for authenticating nodes/users and in protecting data flow between nodes. This is facilitated by creating a dialogue involving authenticated encryption among the nodes. During each session, a key for use in cryptographic conversion is constructed among the node participants in order to perm

대표청구항

A method for establishing a key commutatively among n cryptographically communicating nodes and for authenticating node and user identities, said key being valid only for the duration of a single cryptographic session, each of the nodes having a local cryptographic facility including a plurality of

이 특허에 인용된 특허 (3)

  1. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
  2. Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY) Prentice Paul N. (Hyde Park NY) Tuchman Walter L. (Woodstock NY), Cryptographic verification of operational keys used in communication networks.
  3. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.

이 특허를 인용한 특허 (111)

  1. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  2. Brendel, Juergen, Atomic session-start operation combining clear-text and encrypted sessions to provide ID visibility to middleware such as load-balancers.
  3. Brendel, Juergen, Atomic session-start operation combining clear-text and encrypted sessions to provide id visibility to middleware such as load-balancers.
  4. Fielder Guy L. ; Alito Paul N., Bilateral authentication and encryption system.
  5. Thomas Francis Johnston GB, Communication security.
  6. Smith, Ned M.; Cahill, Conor, Continuous multi-factor authentication.
  7. Smith, Ned M.; Cahill, Conor, Continuous multi-factor authentication.
  8. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  9. Brachtl Bruno O. (Baden-Wuerttenberg NY DEX) Coppersmith Don (Ossining NY) Hyden Myrna M. (Manassas VA) Matyas ; Jr. Stephen M. (Manassas VA) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY), Data authentication using modification detection codes based on a public one way encryption function.
  10. Dahl, Ulf, Data security system for a database.
  11. Hara, Kazuhiro, Data transmission controlling method and data transmission system.
  12. Hara, Kazuhiro, Data transmission controlling method and data transmission system.
  13. Merkle Ralph C. (1134 Pimento Ave. Sunnyvale CA 94087), Digital signature system and method based on a conventional encryption function.
  14. Mullin, Ronald C.; Vanstone, Scott A.; Lambert, Robert J.; Gallant, Rob, Digital signatures on a smartcard.
  15. Tuttle, Mark E., Electronic communication devices, methods of forming electrical communication devices, and communications methods.
  16. Gonsalves,Brian; Jones,Kenneth Roger; Chen,Zesen, Enhanced CSU/DSU (channel service unit/data service unit).
  17. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  18. Guo, Shang Q.; Lenchner, Jonathan, Identity verification for at least one party to a text-based communication.
  19. Elliott,Brig Barnum, Key distribution center for quantum cryptographic key distribution networks.
  20. Elliott,Brig Barnum; Pearson,David Spencer, Key transport in quantum cryptographic networks.
  21. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  22. Dolan Donald T. ; French Dale A. ; Lawton Kathryn V., Method and apparatus for ensuring debiting in a postage meter prior to its printing a postal indicia.
  23. Guski Richard Henry ; Dayka John Carr ; McGee Harvey Tildon ; Wells Bruce Robert, Method and apparatus for entity authentication and session key generation.
  24. Graunke Gary L. ; Aucsmith David W., Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation.
  25. Hornbuckle Gary D. (Pebble Beach CA), Method and apparatus for remotely controlling and monitoring the use of computer software.
  26. Peyravian, Mohammad; Zunic, Nevenko, Method and apparatus for secure password transmission and password changes.
  27. Michener John R. (Princeton NJ), Method and apparatus for securing access to a computer facility.
  28. Gargiulo Joseph L. (5418 Main St. Trumbull CT 06611) Pastor Jose (191 Wilton Rd. Westport CT 06880), Method and apparatus for the generation and synchronization of cryptographic keys.
  29. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  30. Janson Philippe,CHX ; Tsudik Gene,CHX, Method and system for providing secure key distribution in a communication system.
  31. Fielder, Guy, Method and system for securing communication.
  32. Fielder, Guy, Method and system for securing communication.
  33. Fielder, Guy, Method and system for securing communication.
  34. Fielder, Guy, Method and system for securing communication.
  35. Fielder, Guy, Method and system for securing communication.
  36. Fielder, Guy, Method and system for securing communication.
  37. Fielder, Guy, Method and system for securing communication.
  38. Fielder, Guy, Method and system for securing communication.
  39. Aaro Tore I. (Åkersberg SEX) Rustan Torgny O. (Stockholm SEX) man Pr (Kungsngen SEX) Blom Rolf J. (Linkoping SEX) Forchheimer Robert (Linkoping SEX) Fak Viiveke A. (Linkoping SEX) Ingemarsson Bror I, Method and system for the mutual encyphered indentification between data communicating stations and stations for use wit.
  40. Hazard Michel (Mareil/Mauldre FRX), Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a trans.
  41. Patel, Sarvar, Method for establishing session key agreement.
  42. Moreillon, Guy, Method for generating and managing a local area network.
  43. Mueller Kurt H. (Wallisellen CHX), Method for secure session key generation.
  44. Dean H. Vogler, Method for transferring an encryption key.
  45. Hazard Michel (Mareil/Mauldre FRX) Desjardins Jean-Michel (Montigny Le Bretonneux FRX) Chemin Francois (Plaisir FRX), Method of dispatching secret keys to security modules and user cards in a data processing network.
  46. Tuttle Mark E. ; Tuttle John R. ; Lake Rickie C., Method of manufacturing an enclosed transceiver.
  47. Tuttle Mark E. ; Tuttle John R. ; Lake Rickie C., Method of manufacturing an enclosed transceiver.
  48. Tuttle Mark E. ; Tuttle John R. ; Lake Rickie C., Method of manufacturing an enclosed transceiver.
  49. Tuttle, Mark E.; Tuttle, John R.; Lake, Rickie C., Method of manufacturing an enclosed transceiver.
  50. Bosen Robert J. (Pittsburg CA) Tucker James J. (Berkeley CA), Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer.
  51. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P., Methods and apparatus for persistent control and protection of content.
  52. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P., Methods and apparatus for persistent control and protection of content.
  53. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  54. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  55. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  56. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  57. Lidinsky William P. (Naperville IL) Roediger Gary A. (Downers Grove IL) Steele Scott B. (Naperville IL) Weddige Ronald C. (Western Springs IL) Zelle Bruce R. (Naperville IL), Metropolitan area network arrangement for serving virtual data networks.
  58. Curtis, Pavel; Dixon, Michael D.; Frederick, Ronald A.; Nichols, David A., Multimedia coordination system.
  59. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  60. Hart, III,John J.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G., Optical storage medium having distortion regions, and a method of modifying an optical storage medium to include distortion regions.
  61. Hoffmann Gerhard (Munchen DEX) Lukas Klaus (Ingolstadt DEX) Lechner Stephan (Munchen DEX) Steiner Ferdinand (Munchen DEX) Baumgartner Helmut (Munchen DEX) Lohmann Ekkehard (Bonn DEX) Leclerc Matthias, Process for detecting unauthorized introduction of any data transmitted by a transmitter to a receiver.
  62. Elliott,Brig Barnum, Quantum cryptographic key distribution networks with untrusted switches.
  63. Elliott, Brig Barnum, Quantum cryptography with multi-party randomness.
  64. Tuttle, John R., Radio frequency identification device and method.
  65. Tuttle, John R., Radio frequency identification device and method.
  66. Raziel, Michael; Bhargav-Spantzel, Abhilasha; Khosravi, Hormuzd M., Secure authentication protocol systems and methods.
  67. Raziel, Michael; Bhargav-Spantzel, Abhilasha; Khosravi, Hormuzd M., Secure authentication protocol systems and methods.
  68. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT), Secure computer communication method and system.
  69. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure file system server architecture and methods.
  70. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Secure file system server architecture and methods.
  71. Fielder, Guy, Secure island computing system and method.
  72. Fielder, Guy, Secure island computing system and method.
  73. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  74. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  75. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  76. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  77. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  78. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  79. Pearson,David Spencer; Elliott,Brig Barnum, Simple untrusted network for quantum cryptography.
  80. Fielder, Guy, System and method for authenticating users.
  81. Fielder, Guy, System and method for authenticating users.
  82. Fielder, Guy, System and method for authenticating users.
  83. Fielder, Guy, System and method for authenticating users.
  84. Smith, Ned M., System and method for combining user and platform authentication in negotiated channel security protocols.
  85. Smith, Ned M., System and method for combining user and platform authentication in negotiated channel security protocols.
  86. Fielder, Guy, System and method for creating and protecting secrets for a plurality of groups.
  87. Garrison, Greg B., System and method for encrypting data messages.
  88. Simms,Timothy J., System and method for establishing secure communication.
  89. Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
  90. Fielder, Guy, System and method for protecting secrets file.
  91. Fielder, Guy, System and method for protecting secrets file.
  92. Garrison Greg B., System and method for securely accessing a database from a remote location.
  93. Tuttle, John R., System and method to track articles at a point of origin and at a point of destination using RFID.
  94. Pastor Jose (Westport CT), System for conveying information for the reliable authentification of a plurality of documents.
  95. Pikalo, Oleksiy; Schlafer, John D.; Elliot, Brig B., Systems and methods for implementing path length control for quantum cryptographic systems.
  96. Pearson, David Spencer; Elliott, Brig Barnum, Systems and methods for implementing routing protocols and algorithms for quantum cryptographic key transport.
  97. Elliott,Brig Barnum, Systems and methods for managing quantum cryptographic networks.
  98. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; LeVine, Richard B., Systems and methods for media authentication.
  99. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; Levine, Richard B., Systems and methods for media authentication.
  100. Merkle, Jr., James A.; LeVine, Richard B.; Howard, Daniel G.; Lee, Andrew R., Systems and methods for media authentication.
  101. Hart, III, John J.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G., Systems and methods for optical media modification.
  102. Pearson,David Spencer; Elliott,Brig Barnum, Systems and methods for quantum cryptographic key transport.
  103. Elliott, Brig Barnum, Systems and methods for reserving cryptographic key material.
  104. Davis Mark Charles ; Kuehr-McLaren David Gerard ; Powers Calvin Stacy, Systems, methods and computer program products that use an encrypted session for additional password verification.
  105. McCabe Arthur Barney ; Tuttle John R. ; Wood ; Jr. Clifton W., Tamper resistant smart card and method of protecting data in a smart card.
  106. Tuttle John R. ; Wood ; Jr. Clifton W. ; McCabe Arthur Barney, Tamper resistant smart card and method of protecting data in a smart card.
  107. Tuttle John R. ; Wood ; Jr. Clifton W. ; McCabe Arthur Barney, Tamper resistant smart card and method of protecting data in a smart card.
  108. Mihm ; Jr. Thomas J. (Mesa AZ), Teleconferencing method for a secure key management system.
  109. Fielder, Guy, Token for securing communication.
  110. Bissell, Robert Andrew; Bosworth, Kevin Paul; Britnell, Michael John; Harding, Peter Maxwell; Hicks, Richard Middleton; Kingan, Jonathan James; Meyerstein, Michael Victor; Nolde, Keith Eric; Rabson, , User authentication in a communications network.
  111. Smith, Ned M.; Moore, Victoria C., User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로