$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Data communication systems and methods 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0052257 (1987-05-20)
우선권정보 GB-0012519 (1986-05-22)
발명자 / 주소
  • Beker Henry J. (Wokingham GB2) Halliden Paul W. (Salisbury GB2) Friend John M. K. (Purlieu GB2)
출원인 / 주소
  • Racal-Guardata Limited (Middlesex GB2 03)
인용정보 피인용 횟수 : 52  인용 특허 : 14

초록

In order to improve the security of message transmission from a terminal apparatus in an electronic banking or other data communications system a check-sum or MAC is computed from the data within the message in dependence upon a cryptographic key. This MAC is issued as a “challenge”to the user who i

대표청구항

A method of secure message transmission from a terminal apparatus to a remote receiving station in a communications system, which involves appending to a message to be transmitted an authentication code comprising substantially fewer data bits than in the message and the value of which depends upon

이 특허에 인용된 특허 (14)

  1. Munck Robert G. (Lexington MA) Chapin Steven E. (Chelmsford MA), Authentication system.
  2. Elander Robert C. (Saugerties NY) Lennon Richard E. (Saugerties NY) Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY) Shuck Robert E. (West Hurley NY) Tuchman Walter L. (Boulder CO), Cryptographic application for interbank verification.
  3. Pemmaraju Ramarao V. (Yonkers NY), Method and apparatus for protecting stored and transmitted data from compromise or interception.
  4. Bouricius Willard G. (Katonah NY) Stuckert Paul E. (Katonah NY), Method and apparatus for secure message transmission for use in electronic funds transfer systems.
  5. Atalla Martin M. (Atherton CA), Method and apparatus for securing data transmissions.
  6. Hale William J. (Dayton OH) Horst William R. (Dayton OH), Method and system for providing system security in a remote terminal environment.
  7. Saada, Charles; Mollier, Jean, Method for certifying the origin of at least one item of information stored in the memory of a first electronic device and transmitted to a second electronic device, and system for carrying out the m.
  8. Henderson ; Jr. Paul B. (Box 4589 ; 525 Spencer Way Incline Village NV 89450), Paired-secure message identification controller for computers and the like.
  9. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  10. , Process and apparatus for authenticating the signature of a signed message.
  11. Weinstein Stephen B. (Summit NJ), Protection system for intelligent cards.
  12. Morris C. Carson (Broad Run VA) Bielsker Barry H. (Vienna VA) Cole Donald A. (Rockville MD), Two-tiered communication security employing asymmetric session keys.
  13. Grynberg Avigdor (23 Hagderoth Street Savyon ILX), User authorization verification apparatus for computer systems including a central device and a plurality of pocket size.
  14. Dieleman Adrianus H. (Eindhoven NLX), Validation check for remote digital station.

이 특허를 인용한 특허 (52)

  1. Struik, Marinus, Accelerated verification of digital signatures and public keys.
  2. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  3. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  4. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  5. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  6. Uchida, Kaoru, Authentication executing device, portable authentication device, and authentication method using biometrics identification.
  7. Patil, Abhishek; Jing, Xiangpeng; Liu, Aixin; Nguyen, Djung N., Authentication for a multi-tier wireless home mesh network.
  8. Ross, David Justin, Authentication query strategizer and results compiler.
  9. Taylor Michael,GBX, Automated teller machine.
  10. Musgrave,Clyde, Biometric certifying authorities.
  11. Nomura, Ryosuke, Client distribution system, content distribution method, and client terminal.
  12. Vanstone Scott A,CAX, Data card verification system.
  13. Vanstone, Scott A., Data card verification system.
  14. Vanstone, Scott A., Data card verification system.
  15. Vanstone, Scott A., Data card verification system.
  16. Vanstone, Scott Alexander, Data card verification system.
  17. Vanstone,Scott A, Data card verification system.
  18. Duane, William; Hamel, Jeffrey, Derivative seeds.
  19. Vanstone Scott A.,CAX ; Mullin Ronald C.,CAX ; Agnew Gordon B.,CAX, Elliptic curve encryption systems.
  20. Felsher, David Paul, Information record infrastructure, system and method.
  21. Clark Paul C., Intelligent token protected system with network authentication.
  22. Jing, Xiangpeng; Patil, Abhishek; Bhatnagar, Anuj; Liu, Aixin; Nguyen, Djung N., Method and apparatus for a wireless home mesh network with network topology visualizer.
  23. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  24. Brainard,John G.; Kaliski, Jr.,Burton S.; Rivest,Ronald L., Method and apparatus for performing enhanced time-based authentication.
  25. Jakubowski Mariusz H. ; Venkatesan Ramarathnam, Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key.
  26. Hogan, Edward J.; Campbell, Carl M., Method and system for secure payments over a computer network.
  27. Angelo Michael F., Method for controlling access to a computer system by utilizing an external device containing a hash value representati.
  28. Angelo, Michael F.; Michels, Peter J., Method for securely creating, storing and using encryption keys in a computer system.
  29. Jing, Xiangpeng; Patil, Abhishek P.; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  30. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  31. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  32. Hoffberg, Steven M., Multifactorial optimization system and method.
  33. Ozolins, Helmars E., Portable access device.
  34. Ozolins, Helmars E., Portable access device.
  35. Epstein,Michael A., Registering copy protected material in a check-out, check-in system.
  36. Angelo Michael F., Secure method for enabling/disabling power to a computer system following two-piece user verification.
  37. Angelo Michael F. ; Olarig Sompong P., Secure two-piece user authentication in a computer network.
  38. Ross, David Justin; Cornell, Bill G., Secure, confidential authentication with private data.
  39. Michael F. Angelo, Securely generating a computer system password by utilizing an external encryption algorithm.
  40. Chung, Kevin Kwong-Tai, Smart tag data encoding method.
  41. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr철m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  42. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr��m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  43. Hoffberg, Steven M., System and method for determining contingent relevance.
  44. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  45. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  46. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  47. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  48. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  49. Ross, David Justin, Verification engine for user authentication.
  50. Ross, David Justin, Verification engine for user authentication.
  51. Zaverucha, Gregory Marc, Verifying implicit certificates and digital signatures.
  52. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Wireless home mesh network bridging adaptor.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로