$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Databaseless security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/30
  • G06K-019/073
출원번호 US-0433821 (1989-11-09)
발명자 / 주소
  • Claus David M. (Indianapolis IN) Coutinho Roy S. (Carmel IN) Murphy Kevin D. (Indianapolis IN) Snavley James D. (Greenwood IN) Zempol Kenneth R. (Randolph NJ)
출원인 / 주소
  • AT&T Bell Laboratories (Murray Hill NJ 02)
인용정보 피인용 횟수 : 107  인용 특허 : 0

초록

An improved security system, including a protable smart card and a host computer, eliminates the need for the computer to store individual personal identification (ID) numbers for each user seeking access to the computer. Instead, the computer stores a first encryption algorithm E1 used in convertin

대표청구항

A system for enabling entry into a secure facility, the system including a portable object and means for transferring data between the portable object and the facility, the facility comprising: memory means for storing encryption algorithms E1 and E2; means for generating a challenge number; means r

이 특허를 인용한 특허 (107)

  1. Liu, Huitao, Apparatus and method of securing private content stored in a memory.
  2. Liu, Huitao, Apparatus and method of securing private content stored in a memory.
  3. Mark Andrew R., Auto-dialer housing.
  4. Habraken, G. Wouter, Card credential method and system.
  5. Frisco Anthony (Las Vegas NV) Sullivant Ferrell (Cave Junction OR), Card shuffling device and method.
  6. Graham, Jean, Central work-product management system for coordinated collaboration with remote users.
  7. Peacham, Anthony David, Codelets.
  8. Mi, James Q.; Parikh, Vishesh; Teng, Albert Y., Computer system identification.
  9. Peachman, Anthony David; Simmons, Ian Stephen, Configuration of IC card.
  10. Gokcebay, Asil T.; Keskin, Yucel K., Conventional mechanical lock cylinders and keys with electronic access control feature.
  11. Gokcebay,Asil T.; Keskin,Yucel K., Conventional mechanical lock cylinders and keys with electronic access control feature.
  12. Kim Yong-Duk,KRX, Data encryption system for encrypting plaintext data.
  13. Weiss Michael Joseph, Data message storage and transmission using a videophone and smart card.
  14. Bantz,David F.; Chefalas,Thomas E.; Karve,Alexei A.; Mastrianni,Steven J.; Mohindra,Ajay, Decryption system for encrypted audio.
  15. Walker, Jay S.; Schneier, Bruce; Fincham, Magdalena M., Device and method for promoting the selection and use of a transaction card.
  16. Daniel A. Henderson ; Darren Townsley, Dialer programming and device with integrated printing process.
  17. Henderson Daniel A. ; Townsley Darren, Dialer programming system and device with integrated printing process.
  18. Davis, Thomas G.; Rabinowitz, Irving L., Direct vote recording system.
  19. Habraken, G. Wouter, Dual-interface key management.
  20. Rinaldo Di Giorgio ; Theodore Goldstein ; Diana Neiman ; Michael Bender, Electronic vault for use in processing smart product transactions.
  21. Ijichi Makoto,JPX ; Itoh Shigeyuki,JPX ; Hiroya Masaaki,JPX ; Asao Hiroshi,JPX ; Sato Naomi,JPX ; Yonezawa Kei,JPX, Electronic-money rewarding system for lost and found IC card.
  22. Ijichi Makoto,JPX ; Itoh Shigeyuki,JPX ; Hiroya Masaaki,JPX ; Asao Hiroshi,JPX ; Sato Naomi,JPX ; Yonezawa Kei,JPX, Electronic-money rewarding system for lost and found IC card.
  23. Ijichi, Makoto; Itoh, Shigeyuki; Hiroya, Masaaki; Asao, Hiroshi; Sato, Naomi; Yonezawa, Kei, Electronic-money rewarding system for lost and found IC card.
  24. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Flexibly loading a tamper resistant module.
  25. Olarig Sompong P. ; Angelo Michael F. ; Jansen Kenneth A., Hardware theft-protection architecture.
  26. Chaney, John William; Deiss, Michael S.; Beyers, Billy W., High speed signal processing smart card.
  27. Bertina Johannes Marinus George,AUX ; Oliver Quentin Rees,AUX, Host and user transaction system.
  28. Bertina Johannes Marinus George,AUX ; Oliver Quentin Rees,AUX, Host and user transaction system.
  29. Tanaka, Katsuyuki, IC card and IC card data communication method.
  30. Hiroshi Tanaka JP, IC card reading/writing apparatus and an IC card system.
  31. Tanaka Hiroshi,JPX, IC card reading/writing apparatus and an IC card system.
  32. Richards Timothy Philip,GBX, IC card with shell feature.
  33. Mark Andrew R., Information storage device for storing personal identification information.
  34. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Integrated circuit card with application history list.
  35. Shona Yoshihiro,JPX, Integrated circuit for embedding in smart cards, and method of issuing smart cards.
  36. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  37. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  38. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  39. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  40. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  41. Timothy Philip Richards GB, Key transformation unit for an IC card.
  42. Diffie Whitfield ; Aziz Ashar,PKX, Method and apparatus for privacy and authentication in wireless networks.
  43. Walker, Jay S.; Schneier, Bruce; Fincham, Magdalena M.; Jorasch, James A.; Downs, Michael D.; Tedesco, Robert C., Method and apparatus for promoting the selection and use of a transaction card.
  44. Walker, Jay S.; Schneier, Bruce; Fincham, Magdalena M.; Jorasch, James A.; Downs, Michael D.; Tedesco, Robert C., Method and apparatus for promoting the selection and use of a transaction card.
  45. Walker, Jay S.; Schneier, Bruce; Fincham, Magdalena M.; Jorasch, James A.; Downs, Michael D.; Tedesco, Robert C., Method and apparatus for promoting the selection and use of a transaction card.
  46. Walker,Jay S.; Schneier,Bruce; Fincham,Magdalena M.; Jorasch,James A.; Downs,Michael D.; Tedesco,Robert C., Method and apparatus for promoting the selection and use of a transaction card.
  47. Johnson William C. (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Method and apparatus for re-initializing a processing device and a storage device.
  48. Van De Pavert Hendricus J. W. M.,NLX, Method and apparatus for recording usage data of card operated devices.
  49. Mark Andrew R. (205 W. End Ave. New York NY 10023), Method and apparatus for the secure communication of data.
  50. Mark Andrew R., Method and system for compensating for signal deviations in tone signals over a transmission channel.
  51. Mark Andrew R., Method and system for generation of tone signals over a transmission channel.
  52. Mark Andrew R., Method and system for the secure communication of data.
  53. Bruce Lee Peterson ; Christina Ellen Clayton ; Michael Stephan Farmer, Method and system for tracking computer system usage through a remote access security device.
  54. Peterson,Bruce Lee; Clayton,Christina Ellen; Farmer,Michael Stephan, Method and system for tracking computer system usage through a remote access security device.
  55. Peterson,Bruce Lee; Clayton,Christina Ellen; Farmer,Michael Stephan, Method and system for tracking computer system usage through a remote access security device.
  56. Pockrandt, Wolfgang, Method for authorization checking and configuration for carrying out the method.
  57. Ippolito Giovanni,ITX ; Fortina Marco Giovanni Emilio,ITX ; Colombo Gianluca,ITX, Method for obtaining authenticity identification devices for using services in general, and device obtained thereby.
  58. Pathmasuntharan,Jaya Shankar; Tan,Cheng Lin, Method for recovering information stored in a smart card.
  59. Drupsteen Michel Marco Paul,NLX, Method of securely loading commands in a smart card.
  60. Zucker, Daniel F.; Atalla, Martin M.; Adams, Donald S., Method of securing a document in a system and controlling access to the document and a seal for use in the method.
  61. Zucker,Daniel F., Method of securing a document in a system and controlling access to the document and a seal for use in the method.
  62. Johnson, Alan E., Methods and systems for IC card application loading.
  63. Adkins, Christopher A.; Strunk, Timothy L., Methods for authenticating an identity of an article in electrical communication with a verifier system.
  64. Jakobsson, Bjorn Markus; Juels, Ari, Mixing in small batches.
  65. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  66. Daggar Robert N., Multimedia electronic wallet with generic card.
  67. Zucker, Daniel F., Network security architecture system utilizing seals.
  68. Johnson William C. (Los Angeles CA) Marx Donald L. (Redondo Beach CA), Personal access management system.
  69. Johnson William Cedric (Los Angeles CA) Marx Donald L. (Redondo Beach CA), Personal access management system.
  70. Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Personal access management system.
  71. Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Personal access management system.
  72. Johnson William Cedric ; Marx Donald L., Personal access management system.
  73. Cronce, Paul Allen; Fontana, Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  74. Morisawa Toshikazu,JPX ; Yamaki Masayo,JPX ; Tsukada Hiroyuki,JPX ; Mamata Tohru,JPX ; Kawawa Tatsuya,JPX, Portable computer system having password control means for holding one or more passwords such that the passwords are un.
  75. Walter Paul Alan ; McGrogan ; Jr. Ellwood Patrick ; Kleidermacher Mike, Programmable telecommunications security module for key encryption adaptable for tokenless use.
  76. Holtzman, Michael; Pinto, Yosi, Removable computer with mass storage.
  77. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  78. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephens; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  79. Everett,David Barrington; Miller,Stuart James; Peacham,Anthony David; Simmons,Ian Stephen; Richards,Timothy Philip; Viner,John Charles, Secure multiple application card system and process.
  80. Rasmussen, Brian; Harmsen, Matthew, Secure user authentication to computing resource via smart card.
  81. Michael F. Angelo, Securely generating a computer system password by utilizing an external encryption algorithm.
  82. Rouille, David W.; Rouille, Catherine J., Security system.
  83. Rouille,David W.; Rouille,Catherine J., Security system.
  84. Teicher Mordechai,ILX ; Townend Robin,GBX, Smart card pin system, card, and reader.
  85. Chaney John William, Smart-card based access control system with improved security.
  86. Ezawa, Kazuo J.; Roberts, Dave; Foster, Michael; Kelly, John, System and method for communication between smart cards.
  87. Markakis, Dimitrios; Hochfield, Barry; Beric, John; Roberts, David Anthony, System and method for controlling access to computer code in an IC card.
  88. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, System and method for flexibly loading an IC card.
  89. David Barrington Everett GB; Stuart James Miller GB; Anthony David Peacham GB; Ian Stephen Simmons GB; Timothy Philip Richards GB; John Charles Viner GB, System and method for flexibly loading in IC card.
  90. Bertina Johannes Marinus George,AUX ; Oliver Quentin Rees,AUX, System and method for performing transactions and an intelligent device therefor.
  91. Alexander Dorfman ; Jeffrey Wayne Pence, System and method for providing temporary remote access to a computer.
  92. Todorov, Danton I., System and method for registering user identifiers.
  93. Mark Andrew R., System and method for selecting and generating telephone access numbers for limiting access to a telephone service.
  94. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  95. Chaney John William, System for processing a video signal via series-connected high speed signal processing smart cards.
  96. Doughty, Ralph O.; Antaki, Patrick R.; Palmer, Glennard D.; Gilliom, Robert M., System, method and apparatus for electronic ticketing.
  97. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  98. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  99. Doughty, Ralph O.; Antaki, Patrick R.; Weiss, Kenneth P., System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe.
  100. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  101. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  102. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  103. Woodson,Alan Dennis, Unauthorized access embedded software protection system.
  104. Pirouzkhah, Alireza; Melendez, Susan Louise, Variable point generation craps game.
  105. Pirouzkhah, Alireza; Melendez, Susan Louise, Variable point generation craps game.
  106. Kowalski Jacek,FRX, Wired logic microcircuit and authentication method having protection against fraudulent detection of a user secret code during authentication.
  107. Joseph C. Kawan, Wireless transaction and information system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로