$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cryptographic method for key agreement and user authentication 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/30
  • H04L-009/08
출원번호 US-0789700 (1991-11-08)
발명자 / 주소
  • Beller Michael J. (Red Bank NJ) Chang Li Fung (Holmdel NJ) Yacobi Yacov (Berkeley Heights NJ)
출원인 / 주소
  • Bell Communications Research, Inc. (Livingston NJ 02)
인용정보 피인용 횟수 : 53  인용 특허 : 0

초록

Protocols for session key agreement and authentication in a communication system such as a portable communication system make use of public key cryptographic techniques. The protocols of the present invention are especially suited for use in a portable communication system because portable telephone

대표청구항

A method for enabling a user terminal and a network access unit in a communication system to choose a session key for a communication session comprising the steps of at the start of a communication session, transmitting via a communication channel from a network access unit to a user terminal a modu

이 특허를 인용한 특허 (53)

  1. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  2. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  3. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  4. Hoogerwerf David N. ; Stanhope David M. ; Barrere William Gerrit ; Green Evan R. ; McKernan Randolph W., Automated forced call disruption for use with wireless telephone systems.
  5. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  6. Davis Terry L. (Scottsdale AZ) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Common cryptographic key verification in a transaction network.
  7. Brown Daniel Peter ; Finkelstein Louis David ; Pennypacker Frank C., Communication method and device.
  8. Brown Daniel Peter ; Finkelstein Louis David ; Pennypacker Frank C., Communication method and device.
  9. Mickelson, Rodney L.; Patel, Dipak P., Cryptographic engine abstraction layer for a software defined radio.
  10. Bauer Jonathan A. ; Bodge Andrew ; Huberman Steven, Database synchronizer.
  11. Koivukangas,Tapio; Salow,Seppo; Tervo,Timo P.; Hayrynen,Antti; Luiro,Vesa, Delivery of mobile station operational and self-performance test results to network in response to encrypted request message.
  12. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  13. Olivier Doutheau FR; Jean-Pierre Aucoeur FR; Jean-Francois Criqui FR; Jean-Noel Martin FR; Jean Charpentier FR, Device for connecting a telephone switch to a fixed telephone network via a radio telephone network.
  14. Wright Andrew S.,CAX, Encryption of data packets using a sequence of private keys generated from a public key exchange.
  15. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  16. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  17. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  18. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  19. Ohashi Masayoshi,JPX ; Sakai Seiichiro,JPX ; Suzuki Toshinori,JPX, Identity confidentiality method in radio communication system.
  20. Rune Johan,SEX, Method and apparatus for encrypting radio traffic in a telecommunications network.
  21. Guski Richard Henry ; Dayka John Carr ; McGee Harvey Tildon ; Wells Bruce Robert, Method and apparatus for entity authentication and session key generation.
  22. Jain Vipin Kumar ; Nessett Danny M. ; Sherer William Paul, Method and apparatus for providing security in a star network connection using public key cryptography.
  23. Grimmer Francine Gail, Method and apparatus for retrieving X.509 certificates from an X.500 directory.
  24. Duane, William M., Method and apparatus for secure validation of tokens.
  25. Horn, Guenther; Kessler, Volker; Mueller, Klaus, Method and arrangement for the computer-aided exchange of cryptographic keys between a first computer unit and a second computer unit.
  26. Tietz, Benno, Method and arrangement for using certain information acquired upon registration at a base station especially for traffic forecasting.
  27. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  28. Janson Philippe,CHX ; Tsudik Gene,CHX, Method and system for providing secure key distribution in a communication system.
  29. Horn, Gunther; Muller, Klaus; Kessler, Volker, Method for interchange of cryptographic codes between a first computer unit and a second computer unit.
  30. Herlin Harry ; Luo Tie, Method for secure communication in a telecommunications system.
  31. Herlin Harry ; Luo Tie, Method for secure communications in a telecommunications system.
  32. Field Robert G. ; Layne Michael W., Method for secure key distribution over a nonsecure communications network.
  33. Field Robert G. ; Layne Michael W., Method for secure key distribution over a nonsecure communications network.
  34. Merzenich,Klaus, Method for the computer-assisted production of public keys for encoding information and device for carrying out said method.
  35. Lee,Michael G., Network communication authentication.
  36. Friedman Aharon ; Bozoki Eva, Network security device.
  37. Matsumoto Norihisa,JPX ; Hayashi Masato,JPX ; Matsui Susumu,JPX ; Tanaka Kazuhisa,JPX, Personal station authentication system and authentication method.
  38. Mire,Philip Jason, Public key infrastructure utilizing master key encryption.
  39. Hooper,Christopher D., Remote console for monitor and control of system firmware.
  40. Duane, William M.; Silva, Eric A.; Ciaffi, Marco, Secure seed provisioning.
  41. Kaliski,Burton S., Server-assisted regeneration of a strong secret from a weak secret.
  42. Hoogerwerf David N. ; Stanhope David M., System and method for collection of transmission characteristics.
  43. Kaplan Dmitry ; Sharma Chetan, System and method for detection of fraud in a wireless telephone system.
  44. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  45. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  46. Kaliski, Jr., Burton S., System and method for increasing the security of encrypted secrets and authentication.
  47. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  48. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  49. Duane, William M., Techniques for carrying out seed or key derivation.
  50. Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Imperia Vincent A. (Tempe AZ) Love Michael (Wilmington DE) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Pe, Transaction system for integrated circuit cards.
  51. Cuellar, Jorge; Marhöfer, Michael, Use of a public key key pair in the terminal for authentication and authorization of the telecommunication user with the network operator and business partners.
  52. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
  53. Quick ; Jr. Roy Franklin, Wireless subscription portability.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로