$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Two-way public key authentication and key agreement for low-cost terminals

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/30
  • H04L-009/08
출원번호 US-0026673 (1993-03-04)
발명자 / 주소
  • Beller Michael J. (Red Bank NJ) Yacobi Yacov (Berkeley Heights NJ)
출원인 / 주소
  • Bell Communications Research, Inc. (Livingston NJ 02)
인용정보 피인용 횟수 : 157  인용 특허 : 0

초록

A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution a

대표청구항

A method for achieving mutual identification and session key agreement between a terminal and a server at the start of communication session comprising the steps of (a) transmitting from the server to the terminal an identity j of the server, public key Nj of the server and a certificate Cj of the s

이 특허를 인용한 특허 (157)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Libin,Phil, Actuating a security system using a wireless device.
  3. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  4. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A.; Jueneman, Robert R., Apparatus for control of cryptography implementations in third party applications.
  5. Lyubashevsky, Vadim; Neven, Gregory, Authentication via group signatures.
  6. Hoogerwerf David N. ; Stanhope David M. ; Barrere William Gerrit ; Green Evan R. ; McKernan Randolph W., Automated forced call disruption for use with wireless telephone systems.
  7. Rieth Paul Francis ; Stevens Jeffrey Scott, CRC hash compressed server object identifier.
  8. Daniels David Leighton, Cellular fraud prevention using selective roaming.
  9. Daniels David Leighton, Cellular fraud prevention using selective roaming.
  10. Micali, Silvio, Certificate revocation system.
  11. Kilian-Kehr, Roger; Haller, Jochen; Gomez, Laurent; Hebert, Cedric, Client authentication using a challenge provider.
  12. Davis Terry L. (Scottsdale AZ) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Common cryptographic key verification in a transaction network.
  13. Yoneyama, Seijiro; Kanda, Mitsuru, Communication apparatus and communication method.
  14. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Compact certification with threshold signatures.
  15. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Compact digital signatures.
  16. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  17. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  18. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  19. Stefik,Mark J., Content rendering device with usage rights.
  20. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  21. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  22. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  23. Vanstone Scott A,CAX, Data card verification system.
  24. Vanstone, Scott A., Data card verification system.
  25. Vanstone, Scott A., Data card verification system.
  26. Vanstone, Scott A., Data card verification system.
  27. Vanstone, Scott Alexander, Data card verification system.
  28. Vanstone,Scott A, Data card verification system.
  29. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  30. Rueppel Rainer A. (Wetzikon CHX) Nyberg Kaisa (Vienna ATX), Digital signature method and key agreement method.
  31. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  32. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  33. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  34. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  35. Engberg, David, Distributed delegated path discovery and validation.
  36. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  37. Micali,Silvio, Efficient certificate revocation.
  38. Frosik, Barbara; Buskey, Ronald; Kuhlman, Douglas, Encryption and verification using partial public key.
  39. Wright Andrew S.,CAX, Encryption of data packets using a sequence of private keys generated from a public key exchange.
  40. Tarkkala, Lauri; Asokan, Nadarajah, Establishment of a trusted relationship between unknown communication parties.
  41. Cotta, Bryan, Fast multicast messaging encryption and authentication.
  42. Cotta, Bryan, Fast multicast messaging encryption and authentication.
  43. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  44. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  45. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  46. Struik, Marinus, Key agreement and transport protocol.
  47. Struik, Marinus, Key agreement and transport protocol.
  48. Struik, Marinus, Key agreement and transport protocol.
  49. Vanstone Scott A.,CAX ; Menezes Alfred John ; Qu Mingua,CAX, Key agreement and transport protocol with implicit signatures.
  50. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Key agreement and transport protocol with implicit signatures.
  51. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Key agreement and transport protocol with implicit signatures.
  52. Vanstone, Scott Alexander; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  53. Vanstone, Scott; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  54. Johnson, Donald B., Key validation scheme.
  55. Johnson, Donald B., Key validation scheme.
  56. Johnson,Donald B., Key validation scheme.
  57. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  58. White Lester Lynn ; Singh Harminder ; Fortman Peter A., Long distance service bureau.
  59. Carter, Stephen R, Maintaining a soft-token private key store in a distributed environment.
  60. Carter, Stephen R., Maintaining a soft-token private key store in a distributed environment.
  61. Gueron, Shay; Gopal, Vinodh, Method and a system for a quick verification rabin signature scheme.
  62. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  63. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for efficiently initializing secure communications among wireless devices.
  64. Rune Johan,SEX, Method and apparatus for encrypting radio traffic in a telecommunications network.
  65. Guski Richard Henry ; Dayka John Carr ; McGee Harvey Tildon ; Wells Bruce Robert, Method and apparatus for entity authentication and session key generation.
  66. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A.; Jueneman, Robert R., Method and apparatus for escrowing properties used for accessing executable modules.
  67. Matyas ; Jr. Stephen Michael ; Johnson Donald Byron, Method and apparatus for establishing an authenticated shared secret value between a pair of users.
  68. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  69. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  70. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  71. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  72. Rudokas Ronald S. (Alamo CA) Storch John A. (Laguna Niguel CA) Daniels David L. (Placentia CA), Method and apparatus for fraud control in cellular telephone systems.
  73. Rudokas Ronald Steven ; Storch John Adam ; Daniels David Leighton, Method and apparatus for fraud control in cellular telephone systems.
  74. Shamir, Adi, Method and apparatus for implementing a novel one-way hash function on highly constrained devices such as RFID tags.
  75. Vandergeest, Ron J.; Simzer, Kevin T.; Skinner, Eric R., Method and apparatus for providing user authentication using a back channel.
  76. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  77. Aziz Ashar,PKX, Method and apparatus for sending secure datagram multicasts.
  78. Alain Maillet FR; Nicole Klein FR, Method and equipment for intercepting telephone calls.
  79. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  80. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  81. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  82. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  83. Micali Silvio, Method for certifying public keys in a digital signature scheme.
  84. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  85. Adi, Wael, Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network.
  86. Hameau, Patrice; Fougeroux, Nicolas; Bole, Benoît, Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor.
  87. Herlin Harry ; Luo Tie, Method for secure communication in a telecommunications system.
  88. Herlin Harry ; Luo Tie, Method for secure communications in a telecommunications system.
  89. Martin Seysen DE, Method for secure distribution of data.
  90. Hahn, Gene Beck; Lee, Eun Jong; Kim, Yong Ho; Ryu, Ki Seon, Method for selectively encrypting control signal.
  91. David E. Pitchenik ; Frederick W. Ryan, Jr., Method for verifying the expected postage security device and an authorized host system.
  92. Pitchenik David E. ; Cordery Robert A. ; Ryan ; Jr. Frederick W., Method for verifying the expected postal security device in a postage metering system.
  93. Hyoung Sun Park KR, Method of managing mobile station operational parameters.
  94. Park, Hyoung Sun, Method of managing mobile station operational parameters.
  95. Daly Brian Kevin ; Owens Leslie Dale, Method of mutual authentication for secure wireless service provision.
  96. Hahn, Gene Beck; Ryu, Ki Seon, Method of supporting location privacy.
  97. Hahn, Gene Beck; Ryu, Ki Seon, Method of supporting location privacy.
  98. Scheerhorn,Alfred; Huber,Klaus, Method of transmitting signals.
  99. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  100. Schell, Roger R.; Jueneman, Robert R.; Gayman, Mark G., Module authentication and binding library extensions.
  101. Lewis, Daniel E., Multi-level encryption access point for wireless network.
  102. Daniel E. Lewis, Multi-level encryption system for wireless network.
  103. David Chaum ; Niels Ferguson NL; Jelte Van Der Hoek NL, Multi-purpose transaction card system.
  104. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A., Nested strong loader apparatus and method.
  105. Schell,Roger R.; Kingdon,Kevin W.; Berson,Thomas A., Nested strong loader apparatus and method.
  106. Friedman Aharon ; Bozoki Eva, Network security device.
  107. Matsumoto Norihisa,JPX ; Hayashi Masato,JPX ; Matsui Susumu,JPX ; Tanaka Kazuhisa,JPX, Personal station authentication system and authentication method.
  108. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  109. Choi, Won Seok; Choi, Chul Hwan; Park, Jong Ho, Power system.
  110. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  111. Lyubashevsky, Vadim; Neven, Gregory, Proofs of plaintext knowledge and group signatures incorporating same.
  112. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  113. Durand, Alain; Andreaux, Jean Pierre; Sirvent, Thomas, Secure authenticated channel.
  114. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  115. Schlarb, John M.; Bacon, Kinney C., Secure escrow and recovery of media device content keys.
  116. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  117. Pinder, Howard G.; Maholski, Andrew D., Securing media content using interchangeable encryption key.
  118. Vanstone Scott A.,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Strengthened public key protocol.
  119. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua, Strengthened public key protocol.
  120. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  121. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  122. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  123. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  124. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  125. Baysinger, Mark Wayne, System and method for authenticating remote server access.
  126. Baysinger, Mark Wayne, System and method for authenticating remote server access.
  127. Hoogerwerf David N. ; Stanhope David M., System and method for collection of transmission characteristics.
  128. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  129. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  130. Barton, Edward M.; Mizrah, Len L., System and method for cryptographic key exchange using matrices.
  131. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  132. Kaplan Dmitry ; Sharma Chetan, System and method for detection of fraud in a wireless telephone system.
  133. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  134. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  135. Ganesan Ravi (Arlington VA) Yacobi Yacov (Berkeley Heights NJ), System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptos.
  136. Charas,Philippe, System and method for local policy enforcement for internet service providers.
  137. Wilkie, Robert Benjamin; Bremner, Michelle; Hurley, Shawn Oliver, System and method for managing digital certificates on a remote device.
  138. Barton, Edward M.; Mizrah, Len L., System and method for mutually authenticated cryptographic key exchange using matrices.
  139. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  140. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  141. Brown, Michael K.; Brown, Michael S.; Little, Herbert A., System and method for updating message trust status.
  142. Brown, Michael K.; Brown, Michael S.; Little, Herbert A., System and method for updating message trust status.
  143. Brown,Michael K.; Brown,Michael S.; Little,Herbert A., System and method for updating message trust status.
  144. Samar Vipin, System and method to transparently integrate private key operations from a smart card with host-based encryption service.
  145. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  146. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  147. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  148. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  149. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  150. Sulpizio, Jr., Ronald Francis, Temporal key generation and PKI gateway.
  151. Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Imperia Vincent A. (Tempe AZ) Love Michael (Wilmington DE) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Pe, Transaction system for integrated circuit cards.
  152. Kent Eldon Seamons ; William Hale Winsborough, Trust negotiation in a client/server data processing network using automatic incremental credential disclosure.
  153. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  154. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  155. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
  156. Quick ; Jr. Roy Franklin, Wireless subscription portability.
  157. Joseph C. Kawan, Wireless transaction and information system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트