$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for securely using digital signatures in a commercial cryptographic system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0682071 (1996-07-16)
발명자 / 주소
  • Sudia Frank Wells (New York NY)
출원인 / 주소
  • Certco, LLC (New York NY 02)
인용정보 피인용 횟수 : 383  인용 특허 : 8

초록

A system for securely using digital signatures in a commercial cryptographic system that allows industry-wide security policy and authorization information to be encoded into the signatures and certificates by employing attribute certificates to enforce policy and authorization requirements. In addi

대표청구항

A method of enforcing a policy in a cryptographic communication system comprising the steps of: receiving a digital user transaction including a digital message and attribute data, and a digital user signature based on said digital message and on a private key of a user; receiving a digital identify

이 특허에 인용된 특허 (8)

  1. Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302) Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651), Document authentication apparatus.
  2. Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302) Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651), Document authentication apparatus.
  3. Merkle Ralph C. (Sunnyvale CA) Bloomberg Dan S. (Palo Alto CA) Brown John S. (San Francisco CA), Document copy authentication.
  4. Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication.
  5. Graziano James M. (4662 Weld County Road 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication (apparatus).
  6. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  7. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  8. Okamoto Tatsuaki (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Shiraishi Akira (Yokosuka JPX) Kawaoka Tsukasa (Yokosuka JPX), Signed document transmission system.

이 특허를 인용한 특허 (383)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Ishidera, Nobutaka, Access authentication method, information processing unit, and computer product.
  6. Libin, Phil; Micali, Silvio, Access control.
  7. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  11. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  12. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  13. Libin,Phil, Actuating a security system using a wireless device.
  14. Minogue, David; Tucker, Paul A., Agent rank.
  15. Minogue, David; Tucker, Paul A., Agent rank.
  16. Minogue, David; Tucker, Paul A., Agent rank.
  17. Minogue, David; Tucker, Paul A., Agent rank.
  18. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  19. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  20. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  21. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  22. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  23. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  24. Yasutsugu Kuroda JP; Masahiro Komura JP; Satoru Torii JP; Shoko Iwase JP; Etsuo Ono JP, Apparatus and method for proving transaction between users in network environment.
  25. Asim, Muhammad; Petkovic, Milan, Attribute-based digital signatures.
  26. Ogg, Craig L.; Chow, William W., Auditing method and system for an on-line value-bearing item printing system.
  27. Chao, Li-Lung; Goodman, Brian D.; Kebinger, James K., Authenticating and communicating verifiable authorization between disparate network domains.
  28. Atkinson,Robert George; Levy,Marc; Utzschneider,James, Authorization token accompanying request and including constraint tied to request.
  29. Barcelou, David M., Automated transaction machine.
  30. Barcelou, David M., Automated transaction machine.
  31. Barcelou, David M., Automated transaction machine.
  32. Barcelou, David M., Automated transaction machine.
  33. Barcelou, David M., Automated transaction machine.
  34. Barcelou, David M., Automated transaction machine.
  35. Barcelou, David M., Automated transaction machine.
  36. Barcelou, David M., Automated transaction machine.
  37. Barcelou, David M., Automated transaction machine.
  38. Barcelou, David M., Automated transaction machine.
  39. Barcelou, David M., Automated transaction machine.
  40. Barcelou, David M., Automated transaction machine.
  41. Barcelou, David M., Automated transaction machine.
  42. Barcelou, David M., Automated transaction machine.
  43. Barcelou, David M., Automated transaction machine.
  44. Barcelou, David M., Automated transaction machine.
  45. Barcelou, David M., Automated transaction machine.
  46. Barcelou, David M., Automated transaction machine.
  47. Barcelou, David M., Automated transaction machine.
  48. Barcelou, David M., Automated transaction machine.
  49. Barcelou, David M., Automated transaction machine.
  50. Barcelou, David M., Automated transaction machine.
  51. Barcelou, David M., Automated transaction machine.
  52. Barcelou, David M., Automated transaction machine.
  53. Epstein, William C.; Miller, Lawrence R., Binding a digital certificate to multiple trust domains.
  54. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  55. Tung Loo,Elise Y.; Lee,Chi Cheng; Agarwal,Sachin, Blocking cache flush requests until completing current pending requests in a local server and remote server.
  56. Grawrock, David; Jones, Kevin, Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption.
  57. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  58. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  59. Ramasubramani Seetharaman ; King Peter F., Centralized certificate management system for two-way interactive communication devices in data networks.
  60. Ramasubramani, Seetharaman; King, Peter F., Centralized certificate management system for two-way interactive communication devices in data networks.
  61. Micali Silvio, Certificate revocation system.
  62. Micali, Silvio, Certificate revocation system.
  63. Micali, Silvio, Certificate revocation system.
  64. Deindl Michael,DEX ; Hanel Walter,DEX ; Schaal Albert,DEX, Certification of cryptographic keys for chipcards.
  65. Hamann, Ernst-Michael; Kreyss, Jutta; Vasudevan, Narayanan, Certification of multiple keys with new base and supplementary certificate types.
  66. Hsu Yung-Kao ; Seymour Stephen, Certification process.
  67. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  68. Aull, Kenneth W., Chain of trust processing.
  69. Aull,Kenneth W., Chain of trust processing.
  70. Griffin, Phillip H., Checking revocation status of a biometric reference template.
  71. Arnold, Todd W.; Griffin, Phillip H., Compact attribute for cryptographically protected messages.
  72. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  73. Simon, Daniel R., Controlled-content recoverable blinded certificates.
  74. Simon,Daniel R., Controlled-content recoverable blinded certificates.
  75. Simon,Daniel R., Controlled-content recoverable blinded certificates.
  76. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  77. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  78. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  79. Chandwani, Santosh, Controlling network access.
  80. Trench, Terence V., Creating and storing one or more digital certificates assigned to subscriber for efficient access using a chip card.
  81. Trench, Terence V., Creation of user digital certificate for portable consumer payment device.
  82. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  83. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  84. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  85. Ogg, Craig L.; Chow, William W., Cryptographic module for secure processing of value-bearing items.
  86. Ogg,Craig L.; Chow,William W., Cryptographic module for secure processing of value-bearing items.
  87. Ogg,Craig L.; Chow,William W.; Venkat,Girish; Lingle,Piers C., Cryptographic module for secure processing of value-bearing items.
  88. Brickell,Ernie F.; Deklotz,Wesley; Glover,Jeff U.; Premi,Michael R.; Wood,Matthew D.; Shimoda,Marion H., Delegating digital credentials.
  89. Carter, Stephen R; Nevarez, Carlos A, Deputization in a distributed computing system.
  90. Delany, Shawn P.; Ahmed, Sajeed, Determining a user's groups.
  91. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Determining group membership.
  92. Brown,Richard; Mont,Marco Casassa, Digital certificates.
  93. Mont,Marco Casassa; Brown,Richard; Monahan,Brian Quentin, Digital certificates.
  94. Brickell, Ernie F.; Deklotz, Wesley, Digital credential usage reporting.
  95. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  96. Fry, Eugene L.; Szymanski, Aleksander Roman; Nasto, Dennis J.; Vineyard, David D., Digital signature system and method.
  97. Brickell,Ernie F., Digital signature validation.
  98. Miyazaki, Kunihiko; Sasaki, Ryoichi; Takaragi, Kazuo; Susaki, Seiichi; Moritsu, Toshiyuki; Sakai, Mizuhiro; Iwamura, Mitsuru; Matsumoto, Tsutomu, Digital signing method.
  99. Miyazaki,Kunihiko; Sasaki,Ryoichi; Takaragi,Kazuo; Susaki,Seiichi; Moritsu,Toshiyuki; Sakai,Mizuhiro; Iwamura,Mitsuru; Matsumoto,Tsutomu, Digital signing method.
  100. Lloyd, Alan C.; Oliver, Susan M., Directory system.
  101. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  102. Engberg, David, Distributed delegated path discovery and validation.
  103. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  104. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  105. Choe, Calvin Choon-Hwan; Pickford, Misty Louise, Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy.
  106. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  107. Micali,Silvio, Efficient certificate revocation.
  108. Silvio Micali, Efficient certificate revocation.
  109. Messing, John H., Electronic certificate signature program.
  110. Susaki Seiichi,JPX ; Mizuno Yasuhiko,JPX ; Takahashi Miwa,JPX ; Mitsunaga Satoshi,JPX ; Moriyama Shoji,JPX, Electronic certification authentication method and system.
  111. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  112. Dunn, John P.; Ledford, Stephen; Jackson, Steve H.; Wood, Albert G., Electronic payment clearing and check image exchange systems and methods.
  113. Dunn, John P.; Ledford, Stephen; Jackson, Steve H.; Wood, Albert G., Electronic payment clearing and check image exchange systems and methods.
  114. Scheidt, Edward M., Electronically signing a document.
  115. Scheidt,Edward M.; Kolouch,James L.; Domangue,Ersin L.; Odell,Mark A.; Tsang,Wai Lin, Electronically signing a document.
  116. Scheidt,Edward; Kolouch,James; Domangue,Ersin L.; Odell,Mark A.; Tsang,Wai Lin, Electronically signing a document.
  117. Sinn, Richard P.; Teng, Joan C.; Remahl, Thomas B., Employing electronic certificate workflows.
  118. Sinn, Richard P., Employing job code attributes in provisioning.
  119. Daniel E. Geer, Jr. ; Henry R. Tumblin, Enabling business transactions in computer networks.
  120. Geer ; Jr. Daniel E. ; Tumblin Henry R. ; Solomon Eliot M., Enabling business transactions in computer networks.
  121. Kazuomi Oishi JP, Encrypting method, deciphering method and certifying method.
  122. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  123. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  124. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  125. Choe, Calvin Choon Hwan; Parupudi, Gopal; Murthy, Mukunda S., Fragility handling.
  126. Sekar Chandersekaran ; Sarbari Gupta, Framework-based cryptographic key recovery system.
  127. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  128. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  129. Faris, Sadeg M.; Hamlin, Gregory; Flannery, James P., Global synchronization unit (GSU) for time and space (TS) stamping of input data elements.
  130. Valente, Luis, Hierarchical open security information delegation and acquisition.
  131. Blancas,Irma; Krimmel,Karl F., Identification of an individual using a multiple purpose card.
  132. Proudler, Graeme John, Identifying a trusted computing entity.
  133. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  134. Berg, Ray; Shanton, M. Greg, Identity insurance transaction method.
  135. Cameron, Kim; Nanda, Arun K., Identity providers in digital identity system.
  136. Villavicencio, Francisco J., Impersonation in an access system.
  137. Villavicencio,Francisco J., Impersonation in an access system.
  138. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  139. Felsher, David Paul, Information record infrastructure, system and method.
  140. Morgan,Stephen Paul; Irish,John; Pittelli,Frank Michael; Varga,Michael David, Internet authentication with multiple independent certificate authorities.
  141. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  142. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  143. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  144. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  145. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  146. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  147. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  148. Camenisch, Jan, Maintaining privacy for transactions performable by a user device having a security module.
  149. Brickell,Erine F.; Deklotz,Wesley, Managed authentication service.
  150. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  151. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  152. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  153. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  154. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  155. Arent Michael A., Method and apparatus for authenticating on-line transaction data.
  156. Bussell,Keith David, Method and apparatus for digitally signing an advertisement area next to a value-bearing item.
  157. Jay S. Walker ; Bruce Schneier, Method and apparatus for executing cryptographically-enabled letters of credit.
  158. Walker, Jay S.; Schneier, Bruce, Method and apparatus for executing cryptographically-enabled letters of credit.
  159. Walker, Jay S.; Schneier, Bruce, Method and apparatus for executing cryptographically-enabled letters of credit.
  160. Walker, Jay S.; Schneier, Bruce, Method and apparatus for executing cryptographically-enabled letters of credit.
  161. Solokl Daniel David ; Knight Kirk Hoyt ; Corsini Frank Anton, Method and apparatus for executing electronic commercial transactions with minors.
  162. Engelberg, Ari; Venkat, Girish; Ananda, Mohan; McDermott, James, Method and apparatus for on-line value-bearing item system.
  163. Ronald M. Smith, Sr. ; Edward J. D'Avignon ; Robert S. DeBellis ; Randall J. Easter ; Lucina L. Green ; Michael J. Kelly ; William A. Merz ; Vincent A. Spano ; Phil Chi-Chung Yeh, Method and apparatus for providing public key security control for a cryptographic processor.
  164. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  165. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  166. Grimmer Francine Gail, Method and apparatus for retrieving X.509 certificates from an X.500 directory.
  167. Kent, Stephen Thomas, Method and apparatus for supporting authorities in a public key infrastructure.
  168. Maher, David P., Method and apparatus using digital credentials and other electronic certificates for electronic transactions.
  169. Maher,David P., Method and apparatus using digital credentials and other electronic certificates for electronic transactions.
  170. Moore, Charles R. J.; O'Connor, Peter V., Method and system for a policy enforcing module.
  171. Peterson, James C., Method and system for asymmetrically encrypting .ZIP files.
  172. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  173. Boreham, David; Rowley, Peter; Smith, Mark C., Method and system for creating and utilizing managed roles in a directory system.
  174. Boreham, David; Rowley, Peter; Smith, Mark C., Method and system for creating and utilizing managed roles in a directory system.
  175. Lind, Jacob; Jensen, Jan Lysgaard, Method and system for enabling an electronic signature approval process.
  176. Peterson, James C., Method and system for encryption of file characteristics of .ZIP files.
  177. Bialick, William P.; Housley, Russell D.; Moore, Charles R. J.; Linsenbardt, Duane J., Method and system for enforcing access to a computing resource using a licensing attribute certificate.
  178. Bialick,William P.; Housley,Russell D.; Moore,Charles R. J.; Linsenbardt,Duane J., Method and system for enforcing access to a computing resource using a licensing attribute certificate.
  179. Dare,Peter Roy; Owlett,John, Method and system for key certification.
  180. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  181. Peterson, James C., Method and system for mixed symmetric and asymmetric encryption of .ZIP files.
  182. Moses Timothy,CAX ; Mancini Adrian O.,CAX, Method and system for notarizing digital signature data in a system employing cryptography based security.
  183. Spitz, Charles F., Method and system for obtaining digital signatures.
  184. Spitz,Charles F., Method and system for obtaining digital signatures.
  185. Brett Howard CA; Paul Kierstead CA; Gabor Solymar CA; Andrew Robison CA; Roy Pereira CA; Lucien Marcotte CA, Method and system for secure network policy implementation.
  186. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  187. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  188. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  189. Fulton, Nicholas; Butler, James Matthew; Curtis, Mark Anthony; Parrott, David; Whitehead, Miles Jonathan; Wu, Hui, Method for certifying and verifying digital web content using public cryptography.
  190. Ludwig,Heiko H.; O'Connor,Luke J., Method for inter-enterprise role-based authorization.
  191. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  192. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  193. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  194. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  195. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  196. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  197. Park Chang Soon,KRX ; Kim Tae Geun,KRX ; Tak Sung Woo,KRX, Method for preparing safe electronic notarized documents in electronic commerce.
  198. Doo,So Young; Un,Sung Kyong; Ko,Jong Gook; Kim,Jeong Nyeo; Chung,Kyo Il, Method for providing a trusted path between a client and a system.
  199. Crosson Smith,Steven A., Method for remotely authorizing a payment transaction file over an open network.
  200. Peterson, James C., Method for strongly encrypting .ZIP files.
  201. Peterson, James C., Method for strongly encrypting .zip files.
  202. Musa,Mehmet, Method for upgrading a host/agent security system that includes digital certificate management and an upgradable backward compatible host/agent security system digital certificate infrastructure.
  203. Kyle P. Stein, Method of authentication and storage of private keys in a public key cryptography system (PKCS).
  204. Royer, Coby, Methods and apparatus for credential validation.
  205. Royer, Coby, Methods and apparatus for credential validation.
  206. Douglas C. Barlow, Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment.
  207. Moses, Joel; Stewart, Kevin; Church, William, Methods for client certificate delegation and devices thereof.
  208. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  209. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  210. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  211. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  212. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  213. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  214. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  215. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  216. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  217. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  218. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  219. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  220. Huang, Mian; Xu, Yan, Methods, apparatus, and systems for identity authentication.
  221. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  222. Hoffberg, Steven M., Multifactorial optimization system and method.
  223. Hurst, Ryan M.; Manaktala, Ekta H.; Mayfield, Paul G.; Kamath, Vivek P., Network access protection.
  224. Day Michael David, Network discovery system and method.
  225. Sinn,Richard P., Obtaining and maintaining real time certificate status.
  226. Weisberg,Seth; Ogg,Craig Leonard, On-line value-bearing indicium printing using DSA.
  227. Lingle,Piers Christian; Ogg,Craig Leonard; Venkat,Girish; Winslow,Richard; Kiyohara,Keith Shoji, Online value bearing item printing.
  228. Elliott, Ian A., Package compatibility.
  229. Ghatare,Sanjay P., Partitioning data access requests.
  230. Sweeny,James W.; Benantar,Messaoud; Petreshock,John J.; Gindin,Thomas L.; Dayka,John C., Password exposure elimination for digital signature coupling with a host identity.
  231. Thomas, George F.; Wood, Albert G.; Pawelczyk, Joseph S.; Friedman, Kenneth H.; Palmese, Paul, Payment identification code and payment system using the same.
  232. Blair, Steven Cameron; Hassinger, Sebastian; Smith, William Meyer; Turek, John Joseph Edward, Permission-based scanning of a web site.
  233. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  234. Cameron, Kim; Nanda, Arun K., Personal identification information schemas.
  235. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  236. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Policies for modifying group membership.
  237. Nanda, Arun K.; Bhargava, Ruchita; Melton, Lucas R., Portable personal identity information.
  238. Lingle,Piers Christian; Kiyohara,Keith Shoji; Hwang,Kenneth Kay Yih; Venkat,Girish, Postal system intranet and commerce processing for on-line value bearing system.
  239. Onno, Stéphane; Durand, Alain; Diehl, Eric, Presence-based access control.
  240. Sakuma, Jun; Uramoto, Naohiko, Program, classification method and system.
  241. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  242. Tallent, Jr., Guy S.; Donfried, Paul A.; Hicks, George M. (Mack); Lee, Elizabeth, Provision of authorization and other services.
  243. Gajjala, Vijay K.; Brace, Colin H.; Del Conte, Derek T.; Nanda, Arun K.; Kwan, Stuart L. S.; Raj, Rashmi; Nori, Vijayavani, Provisioning of digital identity representations.
  244. Teng,Joan C.; Lee,Chi Cheng, Proxy system.
  245. Oka, Makoto; Ishibashi, Yoshihito; Matsuyama, Shinako; Watanabe, Hideaki, Public key certificate issuing system, public key certificate issuing method, digital certification apparatus, and program storage medium.
  246. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi; Oka,Makoto, Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium.
  247. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  248. Shewchuk, John; Cameron, Kim; Nanda, Arun; Xie, Xiao, Remote access of digital identities.
  249. Shewchuk, John; Cameron, Kim; Nanda, Arun; Xie, Xiao, Remote access of digital identities.
  250. Ballard, Claudio R., Remote image capture with centralized processing and storage.
  251. Ballard, Claudio R., Remote image capture with centralized processing and storage.
  252. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  253. Dillaway, Blair Brewster; Lafornara, Philip; LaMacchia, Brian A.; Malaviarachchi, Rushmi U.; Manferdelli, John L.; Rose, III, Charles F., Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority.
  254. Camenisch, Jan; Lysyanskaya, Anna, Revocation of anonymous certificates, credentials, and access rights.
  255. Ogg,Craig L.; Chow,William W., Role assignments in a cryptographic module for secure processing of value-bearing items.
  256. Delany,Shawn P.; Ahmed,Sajeed, Runtime modification of entries in an identity system.
  257. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  258. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  259. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  260. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  261. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  262. Guha, Ramanathan V., Search result ranking based on trust.
  263. Guha, Ramanathan V., Search result ranking based on trust.
  264. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  265. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  266. Ogg, Craig L., Secure and recoverable database for on-line value-bearing item system.
  267. Li, Junxu, Secure data deduplication.
  268. Holmes Lyndon S. ; King ; III James, Secure electronic publishing system.
  269. Goodwin,Jonathan David, Secure on-line ticketing.
  270. Michael A. Epstein, Secure proxy signing device and method of use.
  271. Whitfield, Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  272. Whitfield,Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  273. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  274. Ogg,Craig L.; Chow,William W., Secured centralized public key infrastructure.
  275. Saito Yoko,JPX ; Shimizu Michihiro,JPX ; Ikeuchi Manabu,JPX, Security management method for network system.
  276. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  277. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  278. Roskind,James, Simple secure login with multiple-authentication providers.
  279. Roskind, James, Simple, secure login with multiple authentication providers.
  280. Roskind, James, Simple, secure login with multiple authentication providers.
  281. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  282. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  283. Lee, Chi-Cheng; Tsang, Andy M.; Remahl, Thomas B., Support for multiple data stores.
  284. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  285. Merman, Michael; Smushkovich, Yosif, System and method for alternative encryption techniques.
  286. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  287. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  288. Davida, George I.; Frankel, Yair, System and method for authenticated and privacy preserving biometric identification systems.
  289. French Jennifer ; Wilder Jone, System and method for authentication of network users.
  290. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  291. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  292. Jennifer French ; Jone Wilder, System and method for authentication of network users.
  293. French Jennifer ; Wilder Jone, System and method for authentication of network users and issuing a digital certificate.
  294. French Jennifer ; Wilder Jone, System and method for authentication of network users with preprocessing.
  295. Schneck David H. ; Cherry Steve ; Goodman David,GBX, System and method for creating a search form for accessing directory information.
  296. Brown, Michael K.; Brown, Michael S.; Kirkup, Michael G., System and method for determining a security encoding to be applied to outgoing messages.
  297. Brown, Michael K.; Brown, Michael S.; Kirkup, Michael G., System and method for determining a security encoding to be applied to outgoing messages.
  298. Brown, Michael Kenneth; Brown, Michael Stephen; Kirkup, Michael Grant, System and method for determining a security encoding to be applied to outgoing messages.
  299. Brown, Michael Kenneth; Kirkup, Michael Grant; Brown, Michael Stephen, System and method for determining a security encoding to be applied to outgoing messages.
  300. Hoffberg, Steven M., System and method for determining contingent relevance.
  301. London Thomas Bennet, System and method for determining if a message identifier could be equivalent to one of a set of predetermined indentifiers.
  302. Brown, Bruce E.; Israelsen, D. Brent, System and method for document-driven processing of digitally-signed electronic documents.
  303. Gougeon,Dominique; Le Crom,Serge; Sheets,John F., System and method for downloading of files to a secure terminal.
  304. Brandenburg,Jackson; Krishnamacharii,Narasimhan; Dulin,Charles, System and method for facilitating access by sellers to certificate-related and other services.
  305. Gien,Peter H; Hetschold,Thomas; Vance,Joachim, System and method for facilitating signing by buyers in electronic commerce.
  306. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  307. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  308. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  309. Adams, Carlisle, System and method for granting security privilege in a communication system.
  310. Barkan Yuval,ILX ; Barkan Moromay,ILX, System and method for handling permits.
  311. Thobhani, Akbar A.; Huebner, Kyle; Spring, Steve, System and method for identifying and preventing on-line fraud.
  312. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  313. Agrawal, Sunil C., System and method for long-term digital signature verification utilizing light weight digital signatures.
  314. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  315. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  316. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  317. Arguello, Michael; Zettner, Steven Dale; DiGiacomo, Ron, System and method for modular electronic signature block.
  318. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  319. Pinnell, Nigel, System and method for performing an on-line transaction using a single-use payment instrument.
  320. Pinnell,Nigel, System and method for performing an on-line transaction using a single-use payment instrument.
  321. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  322. Tallent, Jr.,Guy S.; Donfried,Paul A.; Hicks,George M. (Mack); Lee,Elizabeth, System and method for providing authorization and other services.
  323. Hicks, Mack; Seiler, Regina; Tallent, Guy; Kupres, Kristin; Freudenstein, Allen, System and method for providing certification-related and other services.
  324. Gendler,Joseph, System and method for providing funding approval associated with a project based on a document collection.
  325. McKenney, Mary Keenan; Walch, Markus; Baker, III, Walter; Storch, Oliver; Landsmann, Peter Josef Eduard; Jetter, William John; Wong, Margaret Miu-Ling; Cameron, William Isaac, System and method for providing payment services in electronic commerce.
  326. Ahmed,Khaja, System and method for providing trusted browser verification.
  327. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  328. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  329. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  330. Buros, Karen Lynn; Dobbs, Bryan Douglas; Robinson, Ann Mizell; Knaus, Robert James, System and method for suspending and resuming digital certificates in a certificate-based user authentication application system.
  331. Miller, Lawrence R.; Tallent, Jr., Guy S.; Ahmed, Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  332. Tallent, Jr.,Guy S.; Miller,Lawrence R.; Ahmed,Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  333. Aull,Kenneth W.; McCullough,Vincent J.; Northrup,James I., System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature.
  334. Musgrave, Clyde; Cambier, James L., System and method of fast biometric database searching using digital certificates.
  335. Lewis, Elliot D.; Berk, Hakan; Gidwani, Narendra C.; Johansson, Jesper M.; Moore, Timothy M.; Palekar, Ashwin; Choe, Calvin C., System and methods for providing network quarantine.
  336. Shiraishi,Yoko; Tazawa,Naoko; Ikeda,Hisashi; Sako,Hiroshi, System for filling in documents using an electronic pen.
  337. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  338. Hawkins,Charles F.; Plaster,Donald J.; Ainsworth,Scott G., System for obtaining signatures on a single authoritative copy of an electronic record.
  339. Proudler,Graeme John; Balacheff,Boris; Chen,Liqun; Chan,David, System for providing a trustworthy user interface.
  340. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  341. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  342. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  343. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  344. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  345. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  346. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  347. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  348. Kanai, Yoichi; Yachida, Masuyoshi; Mizuno, Tomio; Furukawa, Tatsuya; Ishikawa, Yoichi, System, method and computer readable medium for certifying release of electronic information on an internet.
  349. Kanai,Yoichi; Yachida,Masuyoshi; Mizuno,Tomio; Furukawa,Tatsuya; Ishikawa,Yoichi, System, method and computer readable medium for certifying release of electronic information on an internet.
  350. Griffin, Phillip H., System, method and program product for recording creation of a cancelable biometric reference template in a biometric event journal record.
  351. Farahat,Ayman O.; Chen,Francine R.; Mathis,Charles R.; Nunberg,Geoffrey D., Systems and methods for authoritativeness grading, estimation and sorting of documents in large heterogeneous document collections.
  352. Basin, Yuri; Beirne, Michael J.; Peterson, James C.; Peterson, Karen L., Systems and methods for manipulating and managing computer archive files.
  353. Basin, Yuri; Beirne, Michael J.; Peterson, James C.; Peterson, Karen L., Systems and methods for manipulating and managing computer archive files.
  354. Basin, Yuri; Beirne, Michael J; Peterson, James C; Peterson, Karen L, Systems and methods for manipulating and managing computer archive files.
  355. Ainsworth,Scott G.; Hawkins,Charles F.; Plaster,Donald J., Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record.
  356. Boggs,Brian D.; Natale,Peter J.; Ainsworth,Scott G.; Hawkins,Charles F.; Plaster,Donald J., Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record.
  357. Peirson, Jr., William Howard; Peirson, Chris Alexander, Systems and processes for obtaining and managing electronic signatures for real estate transaction documents.
  358. Chapman Richard Alan ; Peters Mark E. ; Salmon Parley Avery, Systems, methods and computer program products for selection of date limited information.
  359. King, Julie H.; Kirkman, Susan D.; Labrecque, Daniel J.; Overby, Jr., Linwood H.; Pogue, Steven Wayne, Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session.
  360. King, Julie H.; Kirkman, Susan D.; Labrecque, Daniel J.; Overby, Jr., Linwood H.; Pogue, Steven Wayne, Technique for handling subsequent user identification and password requests within a certificate-based host session.
  361. Teng, Joan C., Template based workflow definition.
  362. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  363. Dulin, Charles; Solo, David; Hicks, Mack; Nepomuceno, Larry; Stirland, Mark, Transaction coordinator for digital certificate validation and other services.
  364. Pasieka, Michael S., Transmitting reviews with digital signatures.
  365. Chakraborty, Anirban, Transmitting security data in multipart communications over a network.
  366. Micali Silvio, Tree-based certificate revocation system.
  367. Micali Silvio, Tree-based certificate revocation system.
  368. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  369. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  370. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  371. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  372. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  373. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  374. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  375. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  376. Kadashevich, A. Julie, Updating digitally signed active content elements without losing attributes associated with an original signing user.
  377. Honarvar,Laurence Toraj; Witte,Brandon Raymond; Fatigante,Steve Chance; Harless,Gary Lynn, User authentication system and methods thereof.
  378. Brown,Bruce E; Brown,Aaron M; Brown, II,Bruce Eric, Variable trust levels for authentication.
  379. Colson, Christen J., Verification and authentication systems and methods.
  380. Colson, Christen J., Verification and authentication systems and methods.
  381. Schneck David H. ; Cherry Steve ; Goodman David,GBX, Web interface and method for accessing and displaying directory information.
  382. Schneck David H. ; Cherry Steve ; Goodman David,GBX, Web interface and method for accessing directory information.
  383. Schneck David H. ; Cherry Steve ; Goodman David,GBX, Web interface and method for displaying directory information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로