$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • G07F-007/08
  • H03B-029/00
  • G06F-001/02
출원번호 US-0571051 (1990-08-22)
우선권정보 FR-0011113 (1989-08-22)
발명자 / 주소
  • Hoppe Joseph (Les Molieres FRX)
출원인 / 주소
  • U.S. Philips Corp. (New York NY 02)
인용정보 피인용 횟수 : 199  인용 특허 : 0

초록

A smart card (1) which includes a random access memory RAM (10) and a read-only memory PROM (7) incorporating a production key (PK), a distributor key (MK), a bearer code (CP) and a serial number (NS) generates a unique number (NU) which is stored in the memory RAM (10) in the card after execution o

대표청구항

A system for validating access to a smart card via a reader, comprising within said card: storage means for storing a production key PK, a distributor key MK, a serial number NS, and a bearer code CP, for comparison with a bearer code CP presented by a bearer; a counter for containing a count CTRAM;

이 특허를 인용한 특허 (199)

  1. Drexler Jerome, Anti-counterfeit validation method for electronic cash cards employing an optical memory stripe.
  2. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  3. Davis Derek L., Apparatus and method for providing secured communications.
  4. Davis Derek L., Apparatus and method for providing secured communications.
  5. Raymund Eisele DE; Axel Burkart DE; Paul Barrett GB; Andrew Ryan GB; Peter Holy GB; Shaun Tantony GB, Apparatus and method for transferring information between a removable memory and a computer.
  6. Hussmann,Holger, Apparatus, method and system for authentication.
  7. Fischer,Addison M.; Protheroe,Robert L., Audio cassette emulator with cryptographic media distribution control.
  8. Bishop, Fred; Saunders, Peter D, Authenticating an RF transaction using a transaction counter.
  9. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Authorized sample receiver.
  10. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Authorizing payment subsequent to RF transactions.
  11. Mark Andrew R., Auto-dialer housing.
  12. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric authorization of an RF transaction.
  13. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric registration for facilitating an RF transaction.
  14. Toombs,Thomas N.; Holtzman,Micky, Card system with erase tagging hierarchy and group based write protection.
  15. Davis Derek L., Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package.
  16. Peacham, Anthony David, Codelets.
  17. Le Roux Jean-Yves,FRX, Computer PC-card able to perform internal programs.
  18. Peachman, Anthony David; Simmons, Ian Stephen, Configuration of IC card.
  19. Nakabe,Futoshi, Contactless IC card.
  20. Nakabe,Futoshi; Kawano,Shinji; Masaki,Tadakatsu, Contactless IC card, responding method, and program therefor.
  21. Zuk Edward Andrew,AUX, Cryptographic communications method and system.
  22. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  23. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  24. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, DNA sample data in a transponder transaction.
  25. Klein, Dean A, Data security for digital data storage.
  26. Klein, Dean A., Data security for digital data storage.
  27. Klein, Dean A., Data security for digital data storage.
  28. Klein, Dean A., Data security for digital data storage.
  29. Klein, Dean A., Data security for digital data storage.
  30. Klein,Dean A., Data security for digital data storage.
  31. Klein,Dean A., Data security for digital data storage.
  32. Rollins, Doug L., Data security for digital data storage.
  33. Rollins, Doug L., Data security for digital data storage.
  34. Rollins, Doug L., Data security for digital data storage.
  35. Rollins, Doug L., Data security for digital data storage.
  36. Rollins, Doug L., Data security for digital data storage.
  37. Crume, Jeffery L., Detecting and defending against man-in-the-middle attacks.
  38. Crume, Jeffrey L., Detecting and defending against man-in-the-middle attacks.
  39. Bravo, Jose F.; Crume, Jeffery L., Detecting man-in-the-middle attacks in electronic transactions using prompts.
  40. Kato, Hiromitsu; Ando, Eriko; Fukuzawa, Yasuko, Device and program for ciphering data.
  41. Daniel A. Henderson ; Darren Townsley, Dialer programming and device with integrated printing process.
  42. Henderson Daniel A. ; Townsley Darren, Dialer programming system and device with integrated printing process.
  43. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  44. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  45. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  46. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  47. Ficco, Michael H., Distributed media-aggregation systems and methods to operate the same.
  48. Ficco, Michael H., Distributed media-protection systems and methods to operate the same.
  49. Tuttle, Mark E., Electronic communication devices, methods of forming electrical communication devices, and communications methods.
  50. Baranowski, James A., Enhanced RFID instrument security.
  51. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Facial scan biometrics on a payment device.
  52. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Flexibly loading a tamper resistant module.
  53. Chiu,Chui Kuei, Generating a serial number from random numbers.
  54. Eubanks, Donald A.; Barnett, Robert Matthew; Peckover, Douglas L.; Carspecken, III, Harold Hutson, Generation of suffixes for pseudo e-mail addresses.
  55. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Hand geometry biometrics on a payment device.
  56. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry biometrics on a payment device.
  57. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry recognition biometrics on a fob.
  58. Richards Timothy Philip,GBX, IC card with shell feature.
  59. Mark Andrew R., Information storage device for storing personal identification information.
  60. Mason Colin,JPX ; Shinohara Takayuki,JPX, Information storage medium and security method thereof.
  61. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Integrated circuit card with application history list.
  62. Hass Steven N. ; Bolan Michael L., Integrated circuit for identifying an item via a serial port.
  63. Eisele Raymund,DEX, Intelligent cassette emulator device.
  64. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Iris scan biometrics on a payment device.
  65. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  66. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  67. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  68. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  69. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  70. Timothy Philip Richards GB, Key transformation unit for an IC card.
  71. Reed Irving S. (Santa Monica CA) Yin Xiaowei (Alhambra CA) Chen Xuemin (Los Angeles CA), Keyless entry system using a rolling code.
  72. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  73. Wuidart, Luc; Marinet, Fabrice, Locking of an integrated circuit.
  74. Seiichi Harada JP, Memory card insertion type electronic equipment and apparatus for writing to the memory card.
  75. Peckover, Douglas L.; Wright, Benjamin L., Method and apparatus for effecting payment.
  76. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; Cocchi, Ronald P.; James, Thomas H., Method and apparatus for encrypting media programs for later purchase and viewing.
  77. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; Cocchi,Ronald P.; James,Thomas H., Method and apparatus for encrypting media programs for later purchase and viewing.
  78. Schweitzer Peter ; Curry Stephen M. ; Little Wendell L. ; Armstrong Bryan M. ; Fox Christopher W. ; Loomis Donald W., Method and apparatus for encryption key creation.
  79. Dolan Donald T. ; French Dale A. ; Lawton Kathryn V., Method and apparatus for ensuring debiting in a postage meter prior to its printing a postal indicia.
  80. Diffie Whitfield ; Aziz Ashar,PKX, Method and apparatus for privacy and authentication in wireless networks.
  81. Lee Sherman ; MacDonald James R. ; Wisor Michael T., Method and apparatus for serializing microprocessor identification numbers.
  82. Lee Sherman ; MacDonald James R. ; Wisor Michael T., Method and apparatus for software access to a microprocessor serial number.
  83. Mark Andrew R. (205 W. End Ave. New York NY 10023), Method and apparatus for the secure communication of data.
  84. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Method and system for auditory recognition biometrics on a FOB.
  85. Mark Andrew R., Method and system for compensating for signal deviations in tone signals over a transmission channel.
  86. Mark Andrew R., Method and system for generation of tone signals over a transmission channel.
  87. Fielder, Guy, Method and system for securing communication.
  88. Fielder, Guy, Method and system for securing communication.
  89. Fielder, Guy, Method and system for securing communication.
  90. Fielder, Guy, Method and system for securing communication.
  91. Fielder, Guy, Method and system for securing communication.
  92. Fielder, Guy, Method and system for securing communication.
  93. Fielder, Guy, Method and system for securing communication.
  94. Fielder, Guy, Method and system for securing communication.
  95. Mark Andrew R., Method and system for the secure communication of data.
  96. Bruce Lee Peterson ; Christina Ellen Clayton ; Michael Stephan Farmer, Method and system for tracking computer system usage through a remote access security device.
  97. Peterson,Bruce Lee; Clayton,Christina Ellen; Farmer,Michael Stephan, Method and system for tracking computer system usage through a remote access security device.
  98. Peterson,Bruce Lee; Clayton,Christina Ellen; Farmer,Michael Stephan, Method and system for tracking computer system usage through a remote access security device.
  99. Pieterse Rob,NLX ; Rombaut Willem,NLX, Method of debiting an electronic payment means.
  100. Tuttle Mark E. ; Tuttle John R. ; Lake Rickie C., Method of manufacturing an enclosed transceiver.
  101. Tuttle Mark E. ; Tuttle John R. ; Lake Rickie C., Method of manufacturing an enclosed transceiver.
  102. Tuttle Mark E. ; Tuttle John R. ; Lake Rickie C., Method of manufacturing an enclosed transceiver.
  103. Tuttle, Mark E.; Tuttle, John R.; Lake, Rickie C., Method of manufacturing an enclosed transceiver.
  104. Bravo, Jose F.; Covalla, Thomas A., Methods and apparatus for restricting access of a user using a cellular telephone.
  105. Bravo,Jose F.; Covalla,Thomas A., Methods and apparatus for restricting access of a user using a cellular telephone.
  106. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems.
  107. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems.
  108. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems.
  109. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P., Methods and apparatus to provide content on demand in content broadcast systems.
  110. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P., Methods and apparatus to provide content on demand in content broadcast systems.
  111. Johnson, Alan E., Methods and systems for IC card application loading.
  112. Handelman Doron (Givataim ILX), Methods and systems for non-program applications for subscriber television.
  113. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  114. Bravo, Jose F.; Crume, Jeffery L., Mobile phone and IP address correlation service.
  115. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  116. Eisele Raymund,DEX ; Eisele Judith,DEX, Multi-module adapter having a plurality of recesses for receiving a plurality of insertable memory modules.
  117. Toombs,Thomas N.; Holtzman,Micky, Multiple mode communication system.
  118. Toombs, Thomas N.; Holtzman, Micky, Multiple mode communications system.
  119. Kwok, Thomas Y.; Mok, Lawrence S., Personal website for electronic commerce on a smart Java card with multiple security check points.
  120. Kwok, Thomas Y.; Mok, Lawrence S., Personal website for electronic commerce on a smart java card with multiple security check points.
  121. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  122. M\Raihi David (Paris FRX) Naccache David (Maisons-Alfort FRX), Process for generating DSA signatures with low-cost portable apparatuses.
  123. Chiu, Chui-Kuei, Process for generating a serial number from random numbers.
  124. Chiu, Chui-Kuei, Process for generating a serial number from random numbers.
  125. Bishop, Fred; Saunders, Peter D., Processing an RF transaction using a routing number.
  126. Aiello William Anthony ; Venkatesan Ramarathnam, Pseudo-random generator.
  127. Bonalle, David S.; Freud, Aliza; Nanton, Jason; Fitzmaurice Reilly, Mary Ann; Sharp, Ray, Public/private dual card system and method.
  128. Bishop, Fred; Saunders, Peter D., RF payment via a mobile device.
  129. Bishop, Fred; Saunders, Peter D., RF transaction authentication using a random number.
  130. Bonalle, David S.; Fehlhaber, Jeff; Saunders, Peter D., RF transaction device.
  131. Saunders, Peter D, RF transaction system and method for storing user personal data.
  132. Bishop, Fred, RF transactions using a wireless reader grid.
  133. Bishop, Fred, RF transactions using a wireless reader grid.
  134. Tuttle, John R., Radio frequency identification device and method.
  135. Tuttle, John R., Radio frequency identification device and method.
  136. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Registering a biometric for radio frequency transactions.
  137. Berardi, Michael J.; Bliman, Michal; Bonalle, David; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Reload protocol at a transaction processing entity.
  138. Watson, David; Zhu, Francis Hong Fang, Remote programming of serialized semiconductor devices using web or internet protocols.
  139. Koistinen,Martin J.; Bazzali,Johann O., Remote unblocking with a security agent.
  140. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P.; Schlacht, David N.; Basse, Hanno; James, Thomas H., Secure content transfer systems and methods to operate the same.
  141. Kahn, Raynold M.; Siegel, Philip I., Secure delivery of program content via a removable storage medium.
  142. Fielder, Guy, Secure island computing system and method.
  143. Fielder, Guy, Secure island computing system and method.
  144. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  145. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephens; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  146. Everett,David Barrington; Miller,Stuart James; Peacham,Anthony David; Simmons,Ian Stephen; Richards,Timothy Philip; Viner,John Charles, Secure multiple application card system and process.
  147. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; Williamson, John R., Securing a transaction between a transponder and a reader.
  148. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; Williamson, John R.; Mayers, Alexandra, Securing a transaction between a transponder and a reader.
  149. Montgomery, Michael A., Smart card application-selection.
  150. Eisele Raymund,DEX, Smart data storage device.
  151. Eisele Raymund,DEX ; Burkart Axel,DEX ; Barrett Paul,GBX, Smart diskette device adaptable to receive electronic medium.
  152. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
  153. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
  154. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
  155. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
  156. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  157. Fielder, Guy, System and method for authenticating users.
  158. Fielder, Guy, System and method for authenticating users.
  159. Fielder, Guy, System and method for authenticating users.
  160. Fielder, Guy, System and method for authenticating users.
  161. Markakis, Dimitrios; Hochfield, Barry; Beric, John; Roberts, David Anthony, System and method for controlling access to computer code in an IC card.
  162. Fielder, Guy, System and method for creating and protecting secrets for a plurality of groups.
  163. Baranowski, James A., System and method for enhanced RFID instrument security.
  164. Baranowski, James A., System and method for enhanced RFID instrument security.
  165. Baranowski, James A., System and method for enhanced RFID instrument security.
  166. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, System and method for flexibly loading an IC card.
  167. David Barrington Everett GB; Stuart James Miller GB; Anthony David Peacham GB; Ian Stephen Simmons GB; Timothy Philip Richards GB; John Charles Viner GB, System and method for flexibly loading in IC card.
  168. Fung, Eric; Neill, Brian; Tse, Chi Chiu, System and method for performing serialization of devices.
  169. Fung, Eric; Neill, Brian; Tse, Chi Chiu, System and method for performing serialization of devices.
  170. Fielder, Guy, System and method for protecting secrets file.
  171. Fielder, Guy, System and method for protecting secrets file.
  172. Lee Sherman ; MacDonald James R. ; Wisor Michael T., System and method for providing microprocessor serialization using programmable fuses.
  173. Bishop, Fred; Neemann, Trey; Armes, David, System and method for reassociating an account number to another transaction account.
  174. Mark Andrew R., System and method for selecting and generating telephone access numbers for limiting access to a telephone service.
  175. Tuttle, John R., System and method to track articles at a point of origin and at a point of destination using RFID.
  176. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  177. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  178. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  179. Cok, Ronald S., System for secure distribution and playback of digital data.
  180. Bishop, Fred; Morgan, Robert E.; Seth, Hitesh, Systems and methods for transaction processing using a smartcard.
  181. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  182. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  183. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  184. McCabe Arthur Barney ; Tuttle John R. ; Wood ; Jr. Clifton W., Tamper resistant smart card and method of protecting data in a smart card.
  185. Tuttle John R. ; Wood ; Jr. Clifton W. ; McCabe Arthur Barney, Tamper resistant smart card and method of protecting data in a smart card.
  186. Tuttle John R. ; Wood ; Jr. Clifton W. ; McCabe Arthur Barney, Tamper resistant smart card and method of protecting data in a smart card.
  187. Watson Gary E., Telephone tone security device.
  188. Fielder, Guy, Token for securing communication.
  189. Rahman Sam (4809 Laurette St. Torrance CA 90503) Magner James (5092 Tripoli Ave. Los Alamitos CA 90720) Brown John (12831 Longden St. Garden Grove CA 92645) Pun Adarsh (5404 White Fox Dr. Rancho Palo, Transaction device, equipment and method for protecting account numbers and their associated personal identification num.
  190. Sipman, Wilhelmus H. M.; Ward, Scott MacDonald, Transaction method and system for data networks, like internet.
  191. Barrett Paul,GBX ; Eisele Raymund,DEX, Transfer device for transferring data between an electronic data processing device and a card.
  192. Barrett Paul,GBX ; Eisele Raymund,DEX, Transfer device for transferring data between an electronic data processing device and an electronic card.
  193. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
  194. Drexler Jerome, Validation method for electronic cash cards and digital identity cards utilizing optical data storage.
  195. Bravo, Jose F.; Crume, Jeffery L., Verification of transactional integrity.
  196. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Voiceprint biometrics on a payment device.
  197. Toombs Thomas N. ; Holtzman Micky,ILX, Voltage negotiation in a single host multiple cards system.
  198. Bravo, Jose; Crume, Jeffrey L., Website authentication.
  199. Toombs,Thomas N.; Holtzman,Michael, Write protection and use of erase tags in a single host multiple cards system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로