$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computing and indicating device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0124666 (1987-11-24)
발명자 / 주소
  • Weiss Kenneth (c/o Security Dynamics Tech.
  • Inc.
  • 2067 Mass. Ave. Cambridge MA 02140)
인용정보 피인용 횟수 : 71  인용 특허 : 5

초록

A portable hand held computing and indicating device for use in a verification system of the type wherein a first non-predictable code is generated at a first mechanism in accordance with a predetermined algorithm in response to both a unique static variable and a dynamic variable and a second non-p

대표청구항

In a verification system wherein a first mechanism generates a first non-predictable code in accordance with a predetermined algorithm in response to both a unique static variable and a dynamic variable, a second mechanism generates a second non-predictable code in accordance with the predetermined

이 특허에 인용된 특허 (5)

  1. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  2. Shigenaga Yoshimi (Tokyo JPX), Identification system.
  3. Weiss Kenneth P. (Boston MA), Method and apparatus for positively identifying an individual.
  4. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  5. Cargile William P. (Half Moon Bay CA), Solid state key for controlling access to computer software.

이 특허를 인용한 특허 (71)

  1. Issa Darrell E. ; Birchfield Jerry W. ; Chen Charles,TWX, Advanced embedded code hopping system.
  2. Issa Darrell E. ; Birchfield Jerry W. ; Chen Charles,TWX, Advanced embedded code hopping system having master fixed code encryption.
  3. Palmer,Glennard D.; Doughty,Ralph O.; Antaki,Patrick R., Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation.
  4. Weiss, Kenneth P., Apparatus, system and method employing a wireless user-device.
  5. Weiss, Kenneth P., Apparatus, system and method for secure payment.
  6. Mark Andrew R., Auto-dialer housing.
  7. Clausen, Christopher Phillip; Lepage, Lisa Michelle; Suen, Darrell Lee; Cornman, Jeffrey A., Bidirectional authentication.
  8. Clausen, Christopher Phillip; Lepage, Lisa Michelle; Suen, Darrell Lee; Cornman, Jeffrey A., Bidirectional authentication.
  9. Flitcroft, Daniel Ian; O'Donnell, Graham; Langford, Conor; Carroll, James, Business-to-business commerce using financial transaction numbers.
  10. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  11. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  12. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  13. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  14. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  15. Flitcroft, Daniel I; O'Donnell, Graham, Credit card system and method.
  16. Flitcroft, Daniel Ian; O'Donnell, Graham, Credit card system and method.
  17. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  18. Flitcroft, Daniel Ian; Lyons, Garry, Credit cards system and method having additional features.
  19. Chan, Hark C., Data delivery system using local and remote communications.
  20. Flitcroft,Daniel I.; O'Donnell,Graham, Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions.
  21. Duane, William; Hamel, Jeffrey, Derivative seeds.
  22. Shin, Kil-ho; Kobayashi, Kenichi; Aratani, Toru, Device and method for authenticating user's access rights to resources.
  23. Oneda, Hideo, Electronic money apparatus, method, card and computer readable record medium having electronic money processing program recorded thereon.
  24. Mark Andrew R., Information storage device for storing personal identification information.
  25. Fu, Yan; Asokan, Nadarajah; Aarni, Ville, Method and apparatus for accelerated authentication.
  26. Fu, Yan; Asokan, Nadarajah; Aarni, Ville, Method and apparatus for accelerated authentication.
  27. Brainard,John G.; Kaliski, Jr.,Burton S.; Rivest,Ronald L., Method and apparatus for performing enhanced time-based authentication.
  28. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  29. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  30. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  31. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  32. Weiss, Kenneth P., Method and apparatus for secure access, payment and identification.
  33. Duane, William M., Method and apparatus for secure validation of tokens.
  34. Mark Andrew R. (205 W. End Ave. New York NY 10023), Method and apparatus for the secure communication of data.
  35. Mark Andrew R., Method and system for compensating for signal deviations in tone signals over a transmission channel.
  36. Lin,Paul; Hon,Henry, Method and system for controlling access to data stored on a data storage device.
  37. Mark Andrew R., Method and system for generation of tone signals over a transmission channel.
  38. Mark Andrew R., Method and system for the secure communication of data.
  39. Moussa Ali Mohammed (1302 Nelson Way Sunnyvale CA 94087) Chan Chih (13301 Glen Brae Dr. San Jose CA 95070), Method of automated signature verification.
  40. Weiss, Kenneth P., Method, system and apparatus for secure access, payment and identification.
  41. Tan, Cheng, Protecting a manufactured item from counterfeiting.
  42. Chan Chih S. ; Moussa Mohamed A., Secure application of seals.
  43. Suzuki,Shigeo, Secure media on demand system whereby charge is determined in part from the periodicity of an encryption key.
  44. Duane, William M.; Silva, Eric A.; Ciaffi, Marco, Secure seed provisioning.
  45. Vancini, Adam Evans; Clausen, Christopher Phillip; Suen, Darrell L., Setting an authorization level at enrollment.
  46. Preta, Joseph Frank; Simmons, William Monty; Preta, Dominic Joseph; Simmons, Isaiah Monty, Smart apparatus for making secure transactions.
  47. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr철m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  48. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr��m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  49. D'Agostino, John, System and method for performing secure credit card transactions.
  50. Mark Andrew R., System and method for selecting and generating telephone access numbers for limiting access to a telephone service.
  51. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  52. Issa Darrell E. ; Birchfield Jerry W. ; Chen Charles,TWX, System having advanced embedded code hopping encryption and learn mode therefor.
  53. Doughty, Ralph O.; Antaki, Patrick R.; Palmer, Glennard D.; Gilliom, Robert M., System, method and apparatus for electronic ticketing.
  54. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  55. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  56. Doughty, Ralph O.; Antaki, Patrick R.; Weiss, Kenneth P., System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe.
  57. Maj, Artur; Sztenke, Maciej, Systems and methods of user authentication.
  58. Duane, William M., Techniques for carrying out seed or key derivation.
  59. Epstein, Michael, Temporal proximity to verify physical proximity.
  60. Epstein, Michael, Temporal proximity to verify physical proximity.
  61. Epstein, Michael, Temporal proximity to verify physical proximity.
  62. Weiss, Kenneth P., Universal secure registry.
  63. Weiss, Kenneth P., Universal secure registry.
  64. Weiss, Kenneth P., Universal secure registry.
  65. Weiss, Kenneth P., Universal secure registry.
  66. Weiss, Kenneth P., Universal secure registry.
  67. Weiss, Kenneth P., Universal secure registry.
  68. Weiss, Kenneth P., Universal secure registry.
  69. Weiss, Kenneth P., Universal secure registry.
  70. Weiss, Kenneth P., Universal secure registry.
  71. Yeager, Daniel James; Otis, Brian; Pletcher, Nathan, Zero-power wireless device programming.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로