$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure cryptographic methods for electronic transfer of information 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/30
출원번호 US-0792817 (1997-01-30)
발명자 / 주소
  • Brands Stefanus Alfonsus (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 )
인용정보 피인용 횟수 : 104  인용 특허 : 0

초록

Cryptographic methods and apparatus are disclosed relating to practical cryptographic systems for electronic transfer of information. Specifically, inventive techniques are described to allow the use of tamper-resistant computing devices without powerful processors; to guarantee security against cri

대표청구항

A method for a tamper-resistant first computing device to perform a cryptographic action with respect to a public key, the first computing device being held by a party that also holds a user-controlled second computing device, the method comprising the steps of: computing by the second computing dev

이 특허를 인용한 특허 (104)

  1. Chase, Melissa E.; Mohassel, Payman; Ganesh, Chaya, Adding privacy to standard credentials.
  2. Blair, Paul; Hansen, Kurt L.; Seifert, Dean, Airline ticket payment and reservation system and methods.
  3. Frenkel, Marvin A., Anonymous on-line cash management system.
  4. Candelore Brant, Anti-tamper bond wire shield for an integrated circuit.
  5. Kamada,Jun; Kotani,Seigo; Ono,Etsuo; Hatanaka,Massayuki; Yoshida,Masatoshi; Nakai,Takahiro, Apparatus, a system and method for controlling access to contents.
  6. Barcelou, David M., Automated transaction machine.
  7. Barcelou, David M., Automated transaction machine.
  8. Barcelou, David M., Automated transaction machine.
  9. Barcelou, David M., Automated transaction machine.
  10. Barcelou, David M., Automated transaction machine.
  11. Barcelou, David M., Automated transaction machine.
  12. Barcelou, David M., Automated transaction machine.
  13. Barcelou, David M., Automated transaction machine.
  14. Barcelou, David M., Automated transaction machine.
  15. Barcelou, David M., Automated transaction machine.
  16. Barcelou, David M., Automated transaction machine.
  17. Barcelou, David M., Automated transaction machine.
  18. Barcelou, David M., Automated transaction machine.
  19. Barcelou, David M., Automated transaction machine.
  20. Barcelou, David M., Automated transaction machine.
  21. Barcelou, David M., Automated transaction machine.
  22. Barcelou, David M., Automated transaction machine.
  23. Barcelou, David M., Automated transaction machine.
  24. Barcelou, David M., Automated transaction machine.
  25. Barcelou, David M., Automated transaction machine.
  26. Barcelou, David M., Automated transaction machine.
  27. Barcelou, David M., Automated transaction machine.
  28. Barcelou, David M., Automated transaction machine.
  29. Barcelou, David M., Automated transaction machine.
  30. Heinonen,Tomi; Kallio,Janne J., Automatic determination of access point content and services for short-range wireless terminals.
  31. Oishi, Kazuomi, Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method.
  32. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  33. Wittenberg, Craig Henry; Paquin, Christian; Malaviarachchi, Rushmi U., Cryptographic device that binds an additional authentication factor to multiple identities.
  34. Wittenberg, Craig Henry; Paquin, Christian; Malaviarachchi, Rushmi U., Cryptographic device that binds an additional authentication factor to multiple identities.
  35. Wack,C. Jay; Scheidt,Edward M.; Morris,Jeffrey K., Cryptographic information and flow control.
  36. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  37. Heinonen, Tomi; Laitinen, Timo M., Customized messaging between wireless access point and services.
  38. Ludtke,Harold A., Data entry user interface.
  39. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  40. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  41. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  42. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  43. Nappi, Bruce, Effecting financial transactions.
  44. Moribatake, Hidemi; Okamoto, Tatsuaki, Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method.
  45. Moribatake,Hidemi; Okamoto,Tatsuaki, Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method.
  46. Diveley, Keith W.; Hansen, Kurt, Electronic indentifier payment systems and methods.
  47. Nakajima, Keiichi, Electronic payment system, payment apparatus and terminal thereof.
  48. Nakajima,Keiichi, Electronic payment system, payment apparatus and terminal thereof.
  49. Nakajima,Keiichi, Electronic payment system, payment apparatus, and terminal thereof.
  50. Ross, Jr.,Robert C., Encrypted e-mail reader and responder system, method, and computer program product.
  51. Olarig Sompong P. ; Angelo Michael F. ; Jansen Kenneth A., Hardware theft-protection architecture.
  52. Felsher, David Paul, Information record infrastructure, system and method.
  53. Ferguson, Niels T.; Nystrom, Magnus Bo Gustaf; McPherson, Dave M.; England, Paul; Novak, Mark Fishel, Keying infrastructure.
  54. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  55. Fraser Alexander Gibson ; Keshav Srinivasan ; Odlyzko A. M., Method and apparatus for crytographically protecting data.
  56. Salmenkaita, Jukka-Pekka; Sorvari, Antti, Method and business process to maintain privacy in distributed recommendation systems.
  57. Salmenkaita,Jukka Pekka; Sorvari,Antti, Method and business process to maintain privacy in distributed recommendation systems.
  58. Hamberg, Max, Method and system for multimedia tags.
  59. Hamberg, Max, Method and system for multimedia tags.
  60. Leovac, Dino, Method and system for providing build-to-order software applications.
  61. Siegel, Brian; Abram, Philip Michael; Beckwitt, Marc; Gudorf, Gregory D.; Iso, Kazuaki; Raymond, Brian; Tobin, Christopher M., Method and system for restricted biometric access to content of packaged media.
  62. Arisawa,Shigeru, Method and system for transmitting electronic value information.
  63. Leslie D. Owens ; Mark S. Plecity ; Alvah B. Davis ; David T. Kiswani ; I-Hsiang Yu, Method and system for validating subscriber identities in a communications network.
  64. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  65. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  66. Raff, Christopher; Comstock, Ken, Method for reducing purchase time.
  67. Vannel Pierre,FRX, Method for secure transfer of data by a communication network.
  68. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  69. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  70. Ludtke,Harold Aaron; Maritzen,L. Michael, Method or system for executing deferred transactions.
  71. Newman, Mark W.; Edwards, W. Keith; Sedivy, Jana Z., Methods, apparatus, and program products for utilizing contextual property metadata in networked computing environments.
  72. Robertson Sheldon I. ; O'Shea Cynthia A. ; Fortenberry Keith N., Moderated forums with anonymous but traceable contributions.
  73. Hoffberg, Steven M., Multifactorial optimization system and method.
  74. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  75. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  76. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Ring-based public key cryptosystem method.
  77. Kara-Ivanov, Michael; Kipnis, Aviad; Reinman, Tzachy; Mangell, Efraim; Waisbard, Erez; Belenky, Yaacov, Secrets renewability.
  78. Benhammou, Jean P.; Colnot, Vincent C.; Moore, David J., Secure memory device for smart cards.
  79. Benhammou,Jean P.; Colnot,Vincent C.; Moore,David J., Secure memory device for smart cards.
  80. Heinonen,Tomi; Laitinen,Timo M., Service notification on a low bluetooth layer.
  81. Aholainen, Markus; Palin, Arto, Service/device indication with graphical interface.
  82. Aholainen,Markus; Palin,Arto, Service/device indication with graphical interface.
  83. Kramer Glenn A. ; Weber Jay C., Settlement of aggregated electronic transactions over a network.
  84. Hamberg,Max, Short-range wireless system and method for multimedia tags.
  85. Newman, Mark W.; Edwards, W. Keith; Sedivy, Jana Z., System and method for accumulating a historical context of interactions between components.
  86. Ludtke, Harold Aaron; Maritzen, L. Michael, System and method for conducting secure transactions over a network.
  87. Hoffberg, Steven M., System and method for determining contingent relevance.
  88. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  89. Silverman, Robert Michael, System and method for issuing, circulating and trading financial instruments with smart features.
  90. Webb, Russ; Blight, David, System and method for monitoring a security state of an electronic device.
  91. Newman, Mark Webster; Edwards, Warren Keith; Sedivy, Jana Zdislava, System and method for prioritizing components.
  92. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  93. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  94. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  95. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  96. Stoutenburg,Earney; Mollett,Cassandra J.; Price,James; Fillinger,Charles A.; Nelson,Eric M.; Seifert,Dean A.; Singleton,Jeffrey, Systems and methods for configuring a point-of-sale system.
  97. Blair, Paul; Hansen, Kurt; Moore, Gary, Systems and methods for staging transactions, payments and collections.
  98. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  99. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  100. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  101. Hill Jake,GBX, Transaction system.
  102. Safa,John Aram, Transaction verification.
  103. Barakat, Youssef; Kinshumann, Kinshuman; Perkins, Brian; Moon, Jinsub, Trusted execution environment extensible computing device interface.
  104. Chess,David M.; Dyer,Joan; Itoi,Naomaru; Kravitz,Jeff; Palmer,Elaine Rivette; Perez,Ronald; Smith,Sean William, Used trusted co-servers to enhance security of web interaction.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로