$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] Method, apparatus and article for identification and signature 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0883247 (1986-07-09)
발명자 / 주소
  • Shamir Adi (Rehovot ILX) Fiat Amos (Rehovot ILX)
출원인 / 주소
  • Yeda Research and Development Company Limited (Rehovot ILX 03)
인용정보 피인용 횟수 : 282  인용 특허 : 0

초록

A method and apparatus for simple identification and signature which enable any user to prove his identity and the authenticity of his messages to any other user. The method and apparatus are provably secure against any known or chosen message attack if factoring is difficult, and require only 1% to

대표청구항

A method of creating a unique identifier for use by an entity which cannot be forged by others including those capable or verifying the entity, comprising the steps of: (a) selecting a modulus n which is the product of at least two secret primes; (b) selecting a pseudo random function f capable of m

이 특허를 인용한 특허 (282) 인용/피인용 타임라인 분석

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Struik, Marinus, Accelerated verification of digital signatures and public keys.
  6. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  7. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  8. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  9. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  10. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  11. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  12. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  13. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  14. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  15. Camenisch,Jan, Anonymous payment with a verification possibility by a defined party.
  16. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  17. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  18. Rosen Sholom S., Apparatus and method for secure transacting.
  19. Adam Lucas Young ; Marcel Mordechay Yung, Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys.
  20. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  21. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems with fast key generation.
  22. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  23. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys.
  24. Adam Lucas Young ; Marcel Mordechay Yung, Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys.
  25. Dixon, Steven Alan; Huster, Keith A.; Hood, Michael S.; Allen, James Maurice; Christie, John D.; Sing, Jack Barney; Tallent, Dan R.; Owsley, Clay Gerome; Rajani, Umesh Jairamdas; Heil, Thomas F.; Schuman, Sr., Richard Joseph; Wildman, Timothy D., Bed/room/patient association systems and methods.
  26. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Card-computer moderated systems.
  27. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  28. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  29. David W. Deaton ; Rodney G. Gabriel, Check transaction processing, database building and marketing method and system utilizing automatic check reading.
  30. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Check transaction processing, database building and marketing method and system utilizing automatic check reading.
  31. Peacham, Anthony David, Codelets.
  32. Peachman, Anthony David; Simmons, Ian Stephen, Configuration of IC card.
  33. Harrison, Keith Alexander; Chen, Liqun, Cryptographic method and apparatus.
  34. Goss Kenneth C (Oceano CA), Cryptographic method and apparatus for public key exchange with authentication.
  35. Vanstone Scott A,CAX, Data card verification system.
  36. Vanstone, Scott A., Data card verification system.
  37. Vanstone, Scott A., Data card verification system.
  38. Vanstone, Scott A., Data card verification system.
  39. Vanstone, Scott Alexander, Data card verification system.
  40. Vanstone,Scott A, Data card verification system.
  41. Smeets,Ben, Data integrity mechanisms for static and dynamic data.
  42. Moskowitz, Scott A., Data protection method and device.
  43. Moskowitz, Scott A., Data protection method and device.
  44. Moskowitz, Scott A., Data protection method and device.
  45. Moskowitz, Scott A., Data protection method and device.
  46. Merkle Ralph C. (1134 Pimento Ave. Sunnyvale CA 94087), Digital signature system and method based on a conventional encryption function.
  47. Yossef Tsuria IL; Yonatan Silver IL, Distributed IRD system.
  48. Haimovich Yosef,ILX ; Armoni Yehuda,ILX ; Auerbach Michael,ILX, Electronic filament netting.
  49. Haimovich Yosef,ILX ; Armoni Yehuda,ILX ; Auerbach Michael,ILX, Electronic monitoring apparatus.
  50. Rosen Sholom S., Electronic-monetary system.
  51. Rosen Sholom S., Electronic-monetary system.
  52. Rosen Sholom S., Electronic-monetary system.
  53. Rosen Sholom S., Electronic-monetary system.
  54. Vanstone Scott A.,CAX ; Mullin Ronald C.,CAX ; Agnew Gordon B.,CAX, Elliptic curve encryption systems.
  55. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  56. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  57. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  58. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  59. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  60. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Flexibly loading a tamper resistant module.
  61. Haimovich Yosef,ILX ; Armoni Yehuda,ILX, Fueling system.
  62. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  63. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  64. Kahn, Raynold M., Hidden identification.
  65. Richards Timothy Philip,GBX, IC card with shell feature.
  66. Levy, Jordan Yaakov, Identification protocols.
  67. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  68. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Integrated circuit card with application history list.
  69. Okamoto Eiji (Tokyo JPX), Key distribution method.
  70. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  71. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  72. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  73. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  74. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  75. Timothy Philip Richards GB, Key transformation unit for an IC card.
  76. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  77. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  78. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  79. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  80. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  81. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  82. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  83. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  84. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  85. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  86. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  87. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  88. Shabbir A. Khan ; Saeed A. Rajput ; Basit Hussain, Method and apparatus for binding electronic impressions made by digital identities to documents.
  89. Smeets,Bernhard Jan Marie; Poon,Kar Fat; Bodensjo,Marcus, Method and apparatus for secure leveled access control.
  90. Shamir Adi (Rehovot ILX), Method and apparatus for user identification based on permuted kernels.
  91. Craymer, Jonathan; Howes, Stephen, Method and apparatus for verifying a person's identity or entitlement using one-time transaction codes.
  92. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  93. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  94. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  95. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  96. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive.
  97. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving one of a plurality of thresholds.
  98. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving threshold.
  99. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving threshold.
  100. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving threshold.
  101. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  102. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database and performing marketing based upon prior shopping history.
  103. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database for use with selective incentive marketing in response to customer shopping hi.
  104. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database for use with selective incentive marketing in response to customer shopping hi.
  105. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database for use with selective incentive marketing in response to customer shopping hi.
  106. Deaton David W. ; Gabriel Rodney G., Method and system for building a database for use with selective incentive marketing in response to customer shopping histories.
  107. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  108. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  109. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  110. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  111. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  112. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  113. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  114. Hazard Michel (Mareil/Mauldre FRX), Method and system for diversification of a basic key and for authentication of a thus-diversified key.
  115. Daugaard, Kim, Method and system for ensuring connection of a module to an electronic apparatus.
  116. Kim Daugaard DK, Method and system for ensuring connection of a module to an electronic apparatus.
  117. Yuan Chuan K. ; Hao Feng Q., Method and system for establishing a cryptographic key agreement using linear protocols.
  118. Deaton,David W.; Gabriel,Rodney G., Method and system for facilitating consumer purchases.
  119. Deaton David W. ; Gabriel Rodney G., Method and system for generating incentives based on substantially real-time product purchase information.
  120. Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
  121. Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
  122. David W. Deaton ; Rodney G. Gabriel, Method and system for selective incentive point-of-sale marketing in response to customer shopping histories.
  123. David W. Deaton ; Rodney G. Gabriel, Method and system for selective incentive point-of-sale marketing in response to customer shopping histories.
  124. Barakat Simon (Andresy FRX), Method and system for suthenticating electronic memory cards.
  125. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  126. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  127. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  128. Marc A. Jacobs, Method for controlling experimental inventory.
  129. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Method for executing trusted-path commands.
  130. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  131. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  132. M'Raihi David,FRX ; Naccache David,FRX, Method for implementing a private-key communication protocol between two processing devices.
  133. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  134. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  135. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  136. Christopher W. Jones, Method, circuit and apparatus for preserving and/or correcting product engineering information.
  137. Johnson, Alan E., Methods and systems for IC card application loading.
  138. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  139. Hamm,Gregory Philip; Lake,John Michael, Methods, systems and computer program products for developing resource monitoring systems from observational data.
  140. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  141. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  142. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  143. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  144. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  145. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  146. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  147. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  148. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  149. Ugon Michel (Maurepas FRX) Guillou Louis (Bourgbarre FRX), Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system.
  150. Auerbach, Micha; Shekel, Joseph; Zelzion, Alon; Golan, Eli; Eizen, Noach; Cohen, Ronny; Levy, Eli, Monitorable locking assemblies.
  151. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  152. Katz Ronald A., Multiple format telephonic interface control system.
  153. Stedron, Robert Allen, Multiple level security system and method for encrypting data within documents.
  154. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  155. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  156. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  157. Goldwasser Shafi (Cambridge MA) Kilian Joseph (Cambridge MA) Wigderson Avi (Jerusalem ILX) Ben-Or Michael (Jerusalem ILX), Multiprover interactive verification system.
  158. Canetti,Ran; Charikar,Moses Samson; Rajagopalan,Sridhar; Ravikumar,Shanmugasundaram; Sahai,Amit; Tomkins,Andrew S., Non-transferable anonymous credentials.
  159. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  160. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  161. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  162. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  163. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  164. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  165. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  166. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  167. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  168. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  169. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  170. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  171. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  172. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  173. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  174. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  175. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  176. Chaco John ; Hersh Israel ; Orlovsky Dmitry ; Vincens Joe, Patient care and communication system.
  177. Chaco, John; Hersh, Israel; Orlovsky, Dmitry; Vincens, Joe; Ram, Yaron, Patient care and communication system.
  178. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  179. Deaton, David W.; Gabriel, Rodney G., Point-of-sale server and method.
  180. Deaton,David W.; Gabriel,Rodney G., Point-of-sale server and method.
  181. Holzknecht, Dirk; Mauch, Ernst; Schumacher, Michael, Portable firearms having identification marks.
  182. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  183. Khosla Vinod, Process for issuing coupons for goods or services to purchasers at non-secure terminals.
  184. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  185. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  186. Chen Lidong ; Williams Charles S., Public key sterilization.
  187. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  188. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  189. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  190. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  191. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  192. Burke, Christopher John, Remote entry system.
  193. Burger Wilhelm F. (Bethesda MD) Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD) Stokes Ellen J. (Liberty Hill TX), Remote trusted path mechanism for telnet.
  194. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  195. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  196. Smeets, Bernard; Selander, Goran; Nerbrant, Per-Olof, Secure implementation and utilization of device-specific security data.
  197. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  198. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephens; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  199. Everett,David Barrington; Miller,Stuart James; Peacham,Anthony David; Simmons,Ian Stephen; Richards,Timothy Philip; Viner,John Charles, Secure multiple application card system and process.
  200. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  201. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  202. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  203. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  204. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  205. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  206. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  207. Näslund, Mats; Norrman, Karl; Goldbeck-Löwe, Tomas, Security and privacy enhancements for security devices.
  208. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  209. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  210. Rosen, Sholom S., Security systems and methods applicable to an electronic monetary system.
  211. Haimovich Yosef,ILX ; Armoni Yehuda,ILX ; Auerbach Michael,ILX, Self-locking seal.
  212. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  213. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  214. Chang Chung Nan, Simiplified secure swift cryptographic key exchange.
  215. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  216. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  217. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  218. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  219. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  220. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  221. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  222. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  223. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  224. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  225. Rosen Sholom S., System and method for connecting money modules.
  226. Markakis, Dimitrios; Hochfield, Barry; Beric, John; Roberts, David Anthony, System and method for controlling access to computer code in an IC card.
  227. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, System and method for flexibly loading an IC card.
  228. David Barrington Everett GB; Stuart James Miller GB; Anthony David Peacham GB; Ian Stephen Simmons GB; Timothy Philip Richards GB; John Charles Viner GB, System and method for flexibly loading in IC card.
  229. Rosen Sholom S., System and method for updating security information in a time-based electronic monetary system.
  230. Hammond, II, Frank J.; Carlander, Steven J.; Ricotta, Jr., Frank J., System and method of non-centralized zero knowledge authentication for a computer network.
  231. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  232. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  233. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  234. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  235. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  236. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  237. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  238. Davis,Samuel D.; Gerdes,Reiner J.; Stearns,Fred; Johnson,Mark E., System for detecting, tracking, and translating changing identification codes.
  239. Osborn William R., System for preventing electronic memory tampering.
  240. Stedron, Robert Allen; Chmielewski, John L., System for transmitting encrypted data.
  241. Deaton, David W.; Wood, Robert Scott, System, method, and database for processing transactions.
  242. Hammond, II, Frank J.; Ricotta, Jr., Frank J.; Dykstra, Hans Michael; Williams, Blake Andrew; Carlander, Steven James; Williams Gerber, Sarah, Systems and methods for enterprise security with collaborative peer to peer architecture.
  243. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  244. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  245. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  246. Boneh,Dan; Franklin,Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  247. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  248. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  249. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  250. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  251. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  252. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  253. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  254. Thomas S. Lee, Technique for creating a unique item identification number in a multi-threaded/multi-process environment.
  255. Ronald A. Katz, Telephone interface call processing system with call selectivity.
  256. Katz Ronald A., Telephone-interface lottery system.
  257. Ronald A. Katz, Telephone-television interface statistical analysis system.
  258. Katz, Ronald A., Telephonic-interface game control system.
  259. Ronald A. Katz, Telephonic-interface lottery system.
  260. Katz Ronald A., Telephonic-interface statistical analysis system.
  261. Katz Ronald A., Telephonic-interface statistical analysis system.
  262. Katz Ronald A., Telephonic-interface statistical analysis system.
  263. Katz Ronald A., Telephonic-interface statistical analysis system.
  264. Katz Ronald A., Telephonic-interface statistical analysis system.
  265. Katz, Ronald A., Telephonic-interface statistical analysis system.
  266. Ronald A. Katz, Telephonic-interface statistical analysis system.
  267. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  268. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  269. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Undeniable signature systems.
  270. Ramzan,Zulfikar Amin; Gentry,Craig B.; Bruhn,Bernhard, Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates.
  271. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  272. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  273. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  274. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  275. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  276. Shamir Adi (Rehovot ILX), Variants of the fiat-shamir identification and signature scheme.
  277. Zurko,Mary Ellen; Casey, Jr.,Thomas Andrew; Gasser,Morrie; Hall,Judith Shelhorse; Kahn,Clifford Earl; Mason,Andrew Halstead; Sawyer,Paul Douglas; Kendall,Leslie Richard; Lipner,Steven B., Verification of trusted-path commands.
  278. Zaverucha, Gregory Marc, Verifying implicit certificates and digital signatures.
  279. Katz, Ronald A., Voice-data telephonic interface control system.
  280. Haimovich Yosef,ILX ; Armoni Yehuda,ILX ; Auerbach Michael,ILX, Weapon tag.
  281. Seger,Paul Joseph, Wireless security access management for a portable data storage cartridge.
  282. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 특허

해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로