$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Personal access management system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/22
출원번호 US-0388276 (1995-02-13)
발명자 / 주소
  • Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO)
출원인 / 주소
  • ETA Technologies Corporation (Los Angeles CA 02)
인용정보 피인용 횟수 : 35  인용 특허 : 78

초록

A multi-component system for linking a user to a product or service provider includes a user processing device, a storage device, and a provider device. The storage device stores provider-specific application software, user-specific data, and a file management program. The storage device and the pro

대표청구항

In a system having a processing device and a storage device, the storage device having a set of instructions and a file stored thereon, said set of instructions having an unencrypted portion and an encrypted portion, a method for coordinating access to said file, comprising the steps of: accessing b

이 특허에 인용된 특허 (78)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Myatt Larry H. (Libertyville IL) Rhoads Bruce C. (Wheaton IL), Account transaction system.
  3. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  4. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  5. Mihm ; Jr. Thomas J. (Mesa AZ), Authentication system.
  6. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Card-computer moderated systems.
  7. Iijima Yasuo (Yokohama JPX), Cipher communication system for transaction data.
  8. Beutelspacher Albrecht (Ottobrunn DEX) Kersten Annette-Gabriele (Wiesbaden DEX) Kruse Dietrich (Ottobrunn DEX), Circuit arrangement for protecting access to a data processing system with the assistance of a chip card.
  9. Takagi Nobuya (Neyagawa MD JPX) Itoh Mamoru (Baltimore MD), Communication apparatus.
  10. Thompson E. Earle (Dallas TX) Birdwell Gerald G. (Richardson TX), Communication system and methods for enhanced information transfer.
  11. Kamitake Takashi (Tokyo JPX) Mizutani Hiroyuki (Yokohama JPX) Kawamura Shin-ichi (Yokohama JPX), Communications network using IC cards.
  12. Danielson Arvin D. (Solon IA) Durbin Dennis A. (Cedar Rapids IA), Core computer processor module, and peripheral shell module assembled to form a pocket size data capture unit.
  13. Teicher Mordechai (9 Gordon St. Kfar Saba 44260 ILX), Credit card system including a central unit and a plurality of local units for conducting low-cost transactions.
  14. Konheim Alan G. (Yorktown Heights NY) Tuckerman ; III Louis B. (Briarcliff Manor NY), Cryptographic architecture for use with a high security personal identification system.
  15. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Cryptographic facility environment backup/restore and replication in a public key cryptosystem.
  16. Scwartz Hermann (Pfffikon CHX), Data carrier-controlled terminal in a data exchange system.
  17. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  18. Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
  19. Kitta Kenichi (Toride JPX) Okada Kunihiro (Yokohama JPX) Mimura Mitsuo (Toride JPX) Ochiai Makoto (Oyama JPX) Nakamura Naotake (Kashiwa JPX), Data processing system using IC card.
  20. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  21. Claus David M. (Indianapolis IN) Coutinho Roy S. (Carmel IN) Murphy Kevin D. (Indianapolis IN) Snavley James D. (Greenwood IN) Zempol Kenneth R. (Randolph NJ), Databaseless security system.
  22. Ieki Toshiharu (Yokosuka) Kobayashi Takafumi (Yokohama) Shimamura Norio (Yokosuka) Kobayashi Niichi (Yokosuka) Watanabe Takeshi (Yokohama JPX), Device for controlling communication between electronic information cards and host computer to be kept in secret.
  23. Hampson Bradford E. (Framingham MA), Digital computer system for executing encrypted programs.
  24. Gutman Jose (Boynton Beach FL) Wright Jim (Coral Springs FL) Finkelstein Louis D. (Wheeling IL) Puhl Larry (Sleepy Hollow IL), Electronic wallet.
  25. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  26. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  27. Mansvelt Andre P. (171 ANderson Avenue Northcliff ; Johannesburg ; Transvaal ZAX) Belamant Serge C. P. (55 - 13th Street Parkmore ; Johannesburg ; Transvaal ZAX), Funds transfer system.
  28. Kitchener Robert A. (Armonk NY), IC card and an identification system thereof.
  29. Yoshida Shinya (Kyoto JPX), IC card and financial transaction processing system using IC card.
  30. Nakano Harumi (Tokyo JPX) Shigenaga Yoshimi (Tokyo JPX), IC card system.
  31. Shigenaga Yoshimi (Tokyo JPX), IC card system.
  32. Esserman James N. (San Diego CA) Moroney Paul (Cardiff CA), Information processing apparatus with replaceable security element.
  33. Mu Xiao-Chun (19070 Dagmar Dr. Saratoga CA 95070) Chin Kai J. (41069 Bairo Ct. Fremont CA 94539) Chen Feiying (771 Woodhams Rd. Santa Clara CA 95051), Intelligent security device.
  34. Campbell ; Jr. Carl M. (Newtown Square PA), Key management system for on-line communication.
  35. Walters Kenn D. (Vaterstetten DEX), Memory card.
  36. Stuckert Paul E. (Katonah NY), Method and apparatus for achieving secure password verification.
  37. Bouricius Willard G. (Katonah NY) Stuckert Paul E. (Katonah NY), Method and apparatus for secure message transmission for use in electronic funds transfer systems.
  38. Vizcaino Gerardo (Nashua NH), Method and apparatus for securing credit card transactions.
  39. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  40. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  41. Ishiguro Ginya (Yokosuka JPX) Muta Toshiyasu (Yokosuka JPX) Sakita Kazutaka (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Okamoto Tatsuaki (Yokosuka JPX) Fujioka Atsushi (Yokohama JPX), Method and apparatus for settlement of accounts by IC cards.
  42. Le Roux Jean-Yves (Bouc Bel Air FRX), Method and device for the management of transactions using microchip cards.
  43. Atalla Martin M. (Menlo Park CA), Method and means for securing the distribution of encoding keys.
  44. Hale William J. (Dayton OH) Horst William R. (Dayton OH), Method and system for providing system security in a remote terminal environment.
  45. Lawlor Matthew P. (Washington DC) Carmody Timothy E. (McLean VA), Method and system for remote delivery of retail banking services.
  46. Barakat Simon (Andresy FRX), Method and system for suthenticating electronic memory cards.
  47. Aaro Tore I. (Åkersberg SEX) Rustan Torgny O. (Stockholm SEX) man Pr (Kungsngen SEX) Blom Rolf J. (Linkoping SEX) Forchheimer Robert (Linkoping SEX) Fak Viiveke A. (Linkoping SEX) Ingemarsson Bror I, Method and system for the mutual encyphered indentification between data communicating stations and stations for use wit.
  48. LaBounty Jack (Bellevue WA), Method and system for transmission of financial data.
  49. Karlisch Thierry (Aubagne FRX) Le Roux Jean-Yves (Bouc Bel Air FRX), Method of loading applications programs into a memory card reader having a microprocessor, and a system for implementing.
  50. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  51. Dethloff Juergen (Hamburg DEX) Hinneberg Christian (Hamburg DEX), Multi-user card system.
  52. Atalla Martin M. (18 Monte Vista Ave. Atherton CA 94025) Hopkins Webster D. (2425 Rick Dr. Morgan Hill CA 95020), Multilevel security apparatus and method with personal key.
  53. Iijima Yasuo (Yokohama JPX), Mutual authentication system.
  54. Iijima Yasuo (Yokohama JPX), Mutual authentication system and method which checks the authenticity of a device before transmitting authentication dat.
  55. White Peter (Berkeley CA), On-line and off-line transaction security system using a code generated from a transaction parameter and a random number.
  56. Miyano Toshihiro (Yokohama JPX), Portable electronic device with means for determining whether an externally supplied instruction is executable.
  57. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  58. Keyser ; Jr. George T. (Potomac MD) Fosler Carl R. (Gaithersburg MD) Johnson Jeffrey D. (Rockville MD), Portable personal-banking system.
  59. Mooney David M. (Eden Prairie MN) GLazier James B. (Hopkins MN) Wood David E. (Shorewood MN) Kimlinger Joseph A. (Willernie MN) Goshgarian Paul (Mound MN), Preboot protection of unauthorized use of programs and data with a card reader interface.
  60. , Process and apparatus for authenticating the signature of a signed message.
  61. Schbi Paul J. (Zurich CHX), Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management.
  62. Weinstein Stephen B. (Summit NJ), Protection system for intelligent cards.
  63. Flynn Lorraine (Somerset NJ) Oldakowski ; Jr. Chester J. (Annandale NJ), Recording and billing system.
  64. Stambler Leon (7803 Boulder La. Parkland FL 33067), Secure transaction system and method utilized therein.
  65. Lipner Steven B. (Wellesley MA) Gasser Morrie (Saugus MA) Lampson Butler W. (Cambridge MA), Secure user authentication from personal computer.
  66. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  67. Sendrow Marvin (4609 Logsdon Dr. Annandale VA 22003), System for authenticating users and devices in on-line transaction networks.
  68. Barakai Simon (Andresy FRX) Guion Christian (Verrieres Le Buisson FRX), System for controlling the use of portable data media.
  69. Parienti Raoul (107 ; avenue Leon-Beranger Saint-Laurent-du-Var FRX F06700), System for inputting, processing and transmitting information and data.
  70. Hughes Thomas S. (31310 Eagle Haven Cir. ; Ste. 100 Rancho Palos Verdes CA 90274) Molina Gustavo (24292 Rhona Dr. Laguna Niguel CA 92656), System for remote purchase payment transactions and remote bill payments.
  71. Hartman ; Jr. Robert C. (Woodside CA), System for seamless processing of encrypted and non-encrypted data and instructions.
  72. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.
  73. Anderson Robert W. (Morgan Hill CA) Brock Steven F. (San Jose CA) Gee May L. (San Jose CA), Transaction execution system with secure encryption key storage and communications.
  74. Yoshida Yasuhisa (Owariasahi JPX), Transaction inquiring method and apparatus.
  75. Sipman Wilhelmus H. M. (The Hague NLX) Snel Lambertus (The Hague NLX), Transaction system comprising one or more host exchanges and a number of distributed terminal stations.
  76. Bachhuber Anton (Langquaid DEX), Transmitter-receiver system with (re-)initialization.
  77. Elliott, John C.; O'Connell, James A.; Ladouceur, Lawrence; Altman, William; Jarett, Keith, Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device.
  78. McCarthy R. Steven (Wickford RI), Wagering system using smartcards for transfer of agent terminal data.

이 특허를 인용한 특허 (35)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Katoh, Taku, Access control for an information processing device.
  3. Scheidt,Edward M.; Domanque,Ersin; Butler,Roger; Tsang,Wai, Access system utilizing multiple factor identification and authentication.
  4. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  5. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  6. Newby Charles F. ; Harding Michael V., Conditional access system, display of authorization status.
  7. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  8. Wack, C. Jay; Scheidt, Edward M.; Morris, Jeffrey K., Cryptographic information and flow control.
  9. Wack,C. Jay; Scheidt,Edward M.; Morris,Jeffrey K., Cryptographic information and flow control.
  10. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  11. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  12. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split binding process and apparatus.
  13. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  14. Zizzi,Stephen, Encrypting file system.
  15. Scheidt,Edward M., Encryption process including a biometric unit.
  16. Rose, Anthony, Filter for a distributed network.
  17. Rose, Anthony, Filter for a distributed network.
  18. Rose, Anthony, Filter for a distributed network.
  19. Livni, Felix; Chen, Hao, HTTP signing.
  20. Diamant Erez,ILX ; Prescher Amir,ILX, Information security method and apparatus.
  21. Kotler, Hilik; Suchowski, Ron Shay, Method and device for questioning a plurality of computerized devices.
  22. Suchowski, Ron Shay; Kotler, Hilik, Method and device for questioning a plurality of computerized devices.
  23. Suchowski, Ron Shay; Kotler, Hilik, Method and device for scanning a plurality of computerized devices connected to a network.
  24. Dellow, Andrew, Method and system for protecting data.
  25. Dellow, Andrew, Method and system for protecting data.
  26. Millwee, Steven C., Method and system of verifying and authenticating consumer reporting history.
  27. Weiss, Roger E., Method for accurate and secure voting.
  28. Greene, John C., Methods and systems for securely communicating personal identification number information between a security module and a plurality of secure keypad devices.
  29. Scheidt, Edward M.; Domangue, Ersin, Multiple level access system.
  30. Scheidt,Edward M.; Domangue,Ersin, Multiple level access system.
  31. Hazard, Michel, Process for storage and use of sensitive information in a security module and the associated security module.
  32. Urata, Susumu, Remote device authentication system.
  33. Mona Singh, Systems and methods for identifying a service provider from a wireless communicator based on categories of service providers that are called.
  34. Scheidt,Edward M., Voice and data encryption method using a cryptographic key split combiner.
  35. Kolouch, James L., XML encryption scheme.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로