$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Personal date/time notary device

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0056547 (1993-05-05)
발명자 / 주소
  • Fischer Addison M. (60 14th Ave. South Naples FL 33942)
인용정보 피인용 횟수 : 159  인용 특허 : 0

초록

A personal data/time notary device is embodied in a token device such as a “smart card”. The portable notary device includes an input/output (I/O) port, which is coupled to a single integrated circuit chip. The I/O port may be coupled to a conventional smart card reading device which in turn is coup

대표청구항

A portable token device fabricated on a portable medium and sized so as to be readily carried or worn by a user comprising: a token device medium substantially credit card-sized so as to be readily carried or worn by a user and having fabricated therein: a secure storage device for storing a user\s

이 특허를 인용한 특허 (159)

  1. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  2. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  3. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  4. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  5. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  6. Wheeler,Henry Lynn; Wheeler,Anne M., Account authority digital signature (AADS) system using transactional account information.
  7. Candelore Brant, Anti-tamper bond wire shield for an integrated circuit.
  8. Davis Derek L., Anti-theft mechanism for mobile computers.
  9. Davis Derek L., Apparatus and method for a vetted field upgrade.
  10. Feldbau Ofra,ILX ; Feldbau Michael,ILX, Apparatus and method for authenticating the dispatch and contents of documents.
  11. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  12. Davis Derek L., Apparatus and method for providing secured communications.
  13. Rosen Sholom S., Apparatus and method for secure transacting.
  14. Davis Derek L., Apparatus and method for securely processing biometric information to control access to a node.
  15. Hasebe,Takayuki; Kotani,Seigo; Akiyama,Ryota; Sasaki,Takaoki, Apparatus to create and/or verify digital signatures having a secure time element and an identifier of the apparatus.
  16. Asim, Muhammad; Petkovic, Milan, Attribute-based digital signatures.
  17. Weiant ; Jr. Monroe A. ; Ryan ; Jr. Frederick W., Certificate meter with selectable indemnification provisions.
  18. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database.
  19. Steenstra, Jack; Gantman, Alexander; Noerenberg, II, John W.; Jalali, Ahmad; Rose, Gregory, Digital authentication over acoustic channel.
  20. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  21. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  22. Bennett Charles Henry ; DiVincenzo David Peter ; Linsker Ralph, Digital recording system with time-bracketed authentication by on-line challenges and method of authenticating recordin.
  23. Brennan Sherry, Electronic card valet.
  24. Susaki Seiichi,JPX ; Mizuno Yasuhiko,JPX ; Takahashi Miwa,JPX ; Mitsunaga Satoshi,JPX ; Moriyama Shoji,JPX, Electronic certification authentication method and system.
  25. Rosen,Sholom S., Electronic transaction apparatus for electronic commerce.
  26. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  27. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  28. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  29. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  30. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  31. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  32. Takura, Akira; Ono, Satoshi, Folder type time stamping system and distributed time stamping system.
  33. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  34. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  35. Hopkins,Dale W.; Collins,Thomas W.; Wierenga,Steven W., Group signature generation system using multiple primes.
  36. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  37. Suzuki, Masato; Kotani, Seigo; Tanaka, Keishiro, Information processing apparatus and information management method.
  38. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  39. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  40. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  41. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  42. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  43. Sitnik, Eran, Method and apparatus for authenticating time-sensitive interactive communications.
  44. Rose,Gregory G.; Quick, Jr.,Roy Franklin; Gantman,Alexander, Method and apparatus for simplified audio authentication.
  45. Kleinsteiber,James; Hammons,Richard L.; Balasubramanian,Shankar, Method and apparatus for starting up a network or fabric.
  46. Labaton, Isaac J, Method and apparatus for the secure authentication of a web site.
  47. Labaton, Isaac J., Method and apparatus for the secure authentication of a web-site.
  48. Labaton, Isaac J, Method and apparatus for the secure identification of the owner of a portable device.
  49. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  50. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  51. Uhr, Joon Sun; Hong, Jay Wu; Song, Joo Han, Method and server for providing notary service for file and verifying file recorded by notary service.
  52. Krislov, Clinton A., Method and system for automated document registration.
  53. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  54. Cromer,Daryl Carvis; Freeman,Joseph Wayne; Goodman,Steven Dale; Kern,Eric Richard; Springfield,Randall Scott, Method and system for detecting a tamper event in a trusted computing environment.
  55. Teppler, Steven W., Method and system for determining and maintaining trust in digital data files with certifiable time.
  56. Teppler, Steven W., Method and system for determining and maintaining trust in digital image files with certifiable time.
  57. Jakobsson, Markus Bjorn, Method and system for providing translation certificates.
  58. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  59. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  60. Maeda, Atsushi; Watanabe, Ken, Method for managing public key.
  61. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  62. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  63. Douglas C. Barlow, Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment.
  64. Labaton, Isaac J., Methods and device for digitally signing data.
  65. Labaton,Isaac J., Methods and device for digitally signing data.
  66. Labaton, Isaac J, Methods and portable device for digitally signing data.
  67. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  68. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  69. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  70. Blaze, Matthew A.; Ioannidis, John; Keromytis, Angelos, Microbilling using a trust management system.
  71. Sudia Frank W. ; Freund Peter C. ; Huang Stuart T. F., Multi-step digital signature method and system.
  72. Kleinsteiber, James; Hammons, Richard L.; Gunawardena, Dilip; Nguyen, Hung; Balasubramanian, Shankar; Renganararayanan, Vidya, Network security and applications to the fabric environment.
  73. Hammons, Richard L.; Kleinsteiber, James; Nguyen, Hung; Balasubramanian, Shankar; Renganarayanan, Vidya, Network security through configuration servers in the fabric environment.
  74. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,IEX, Networked personal customized information and facility services.
  75. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  76. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  77. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  78. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  79. Mullor, Miki; Sledz, Dan, Secure PIN transmission.
  80. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  81. Schlarb, John M.; Bacon, Kinney C., Secure escrow and recovery of media device content keys.
  82. Smeets, Bernard; Selander, Goran; Nerbrant, Per-Olof, Secure implementation and utilization of device-specific security data.
  83. Pinder, Howard G.; Maholski, Andrew D., Securing media content using interchangeable encryption key.
  84. Näslund, Mats; Norrman, Karl; Goldbeck-Löwe, Tomas, Security and privacy enhancements for security devices.
  85. Ryan, Jr., Frederick W., Selective security level certificate meter.
  86. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  87. Nassiri, Nicholas N., Signature verification using a third party authenticator via a paperless electronic document platform.
  88. Teppler, Steven W., Smart card system and methods for proving dates in digital files.
  89. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  90. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  91. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  92. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  93. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  94. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  95. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  96. Teppler,Steven W., System and method for distributing trusted time.
  97. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  98. Davis Derek L., System and method for ensuring integrity of audio.
  99. Doyle,Michael D.; Hamilton,Robert G.; Perrone,Marc C.; Doyle,Paul F.; Bernsohn,Glenn W., System and method for graphical indicia for the certification of records.
  100. Doyle,Michael D.; Hamilton,Robert G.; Perrone,Marc V.; Doyle,Paul F.; Bernsohn,Glenn W., System and method for graphical indicia for the certification of records.
  101. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  102. Gantman, Alexander; Rose, Gregory G., System and method for managing sonic token verifiers.
  103. Blaze, Matthew A.; Ioannidis, John; Keromytis, Angelos, System and method for microbilling using a trust management system.
  104. Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for providing assurance to a host that a piece of software possesses a particular property.
  105. Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
  106. Weissinger, Keyton, System and method for signature capture.
  107. Doyle,Michael D.; Doyle,Paul F.; Bernsohn,Glenn W.; Roberts,Jeffrey D.; Wolf,Kirk James; Goetze,Stephen P., System and method for widely witnessed proof of time.
  108. Teppler, Steven W., System and methods for distributing trusted time.
  109. Erik H. van der Kaay ; David Tyo ; David Robinson ; Gregory L. Dowd, System and methods for generating trusted and authenticatable time stamps for electronic documents.
  110. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  111. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  112. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  113. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  114. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  115. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  116. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  117. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  118. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  119. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  120. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  121. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  122. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  123. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  124. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  125. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  126. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  127. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  128. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  129. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  130. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  131. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  132. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  133. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  134. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  135. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  136. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  137. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  138. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  139. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  140. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  141. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  142. Peyravian, Mohammad; Roginsky, Allen; Zunic, Nevenko; Matyas, Jr., Stephen M., Time stamping method using time delta in key certificate.
  143. Matsumoto,Tsutomu; Sato,Tadahiro; Ichikawa,Keisuke, Time stamping system for electronic documents and program medium for the same.
  144. Davis Derek L., Time-bracketing infrastructure implementation.
  145. Kotani Seigo,JPX, Timer apparatus and computer.
  146. Kotani, Seigo, Timer apparatus and computer.
  147. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  148. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  149. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  150. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  151. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  152. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  153. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  154. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  155. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  156. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  157. Yagawa, Yuichi, Trusted time stamping storage system.
  158. Yagawa,Yuichi, Trusted time stamping storage system.
  159. Khatri Bharat (Boca Raton FL) Marx Fred (Coconut Creek FL) Mayer Dan E. (Austin TX) Merkin Cynthia M. (Lake Worth FL) Vila Ileana (Boca Raton FL), Unauthorized access monitor.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트