$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0508978 (1995-07-28)
발명자 / 주소
  • Tomko George J.,CAX
  • Stoianov Alexei,CAX
출원인 / 주소
  • Mytec Technologies Inc., CAX
대리인 / 주소
    Marshall, O'Toole, Gerstein, Murray & Borun
인용정보 피인용 횟수 : 137  인용 특허 : 23

초록

A method and apparatus using biometric information (such as a fingerprint, an iris structure, etc.) as a cipher for encrypting and decrypting a personal identification number (PIN) which is used as an input to a PIN requiring device. The method of encryption of a PIN includes generating a sequence o

대표청구항

[ We claim:] [1.] A method for securely storing at least a personal identification number (PIN), comprising the following steps:obtaining a biometric information signal bearing information from a body part;generating a sequence of random characters to obtain a PIN;obtaining a generating function suc

이 특허에 인용된 특허 (23)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  3. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  4. Saito Tutomu (Yokohama JPX) Matsui Toshikazu (Kobe JPX), Computer-assisted holographic image formation technique which determines interference pattern data used to form the holo.
  5. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Fingerprint controlled public key cryptographic system.
  6. Barbanell Joseph (1945 Contra Costa Blvd. Pleasant Hill CA 94523), Holographic credit card with automatical authentication and verification.
  7. Owechko Yuri (Newbury Park CA), Hybrid optical and electronic associative memory.
  8. Barbanell Joseph (Concord CA), Keyless holographic lock.
  9. Itoh Masami (Takarazuka JPX) Nishii Kanji (Osaka JPX) Kawamura Hiroyuki (Katano JPX) Fukui Atsushi (Hirakata JPX), Logarithmic polar coordinate transforming method, vision recognizing method, and optical information processing apparatu.
  10. Tomko George J. (Toronto CAX), Method and apparatus for fingerprint verification.
  11. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO) Engel George L. (St. Louis MO) Hege Alan L. (St. Louis MO), Method and apparatus for fingerprinting and authenticating magnetic media.
  12. Lynn Kerry E. (Redwood City CA) Zweig Jonathan M. (Cupertino CA) Mincher Richard W. (San Jose CA), Method and apparatus for variable-overhead cached encryption.
  13. Takesue Toshiharu (Tokyo JPX) Mitsuoka Yasuyuki (Tokyo JPX), Optical correlator.
  14. Simon Darren M. (Denver CO) Serati Steven A. (Golden CO), Optical correlator using ferroelectric liquid crystal spatial light modulators and Fourier transform lenses.
  15. Marsh Ronald A. (Ridgecrest CA) Petty George S. (Jamestown NC), Optical fingerprint correlator.
  16. Itoh Masami (Takarazuka JPX) Nishii Kanji (Osaka JPX) Kawamura Hiroyuki (Kadoma JPX) Fukui Atsushi (Hirakata JPX), Optical information processing apparatus and method using computer generated hologram.
  17. Ruell Hartwig (Fuerstenfeldbruck DEX), Personal authentication system.
  18. Sampsell Jeffrey B. (Plano TX) Bienstock Rachelle J. (Dallas TX), Real time optical correlation system.
  19. Horner Joseph L. (Cambridge MA), Single SLM joint transform correaltors.
  20. Florence James M. (Richardson TX), Spatial light modulator with full complex light modulation capability.
  21. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for encoding personalized identification for storage on memory storage devices.
  22. Franke Marc A. (Fairfield IA) Hekker Roeland M. T. (Fairfield IA) Livny Izhak M. (Fairfield IA) Mercurio Gregory S. (Fairfield IA) Casasent David P. (Pittsburgh PA), Transform optical processing system.
  23. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.

이 특허를 인용한 특허 (137)

  1. Corder,Rodney Joe, Apparatus and method for secure data storage.
  2. Fields,Daniel M., Apparatus and method for storing and distributing encrypted digital content.
  3. Fields,Daniel M., Apparatus and method for storing and distributing encrypted digital content and functionality suite associated therewith.
  4. Chen, Lee; Oshiba, Dennis; Chiong, John, Applying security policy to an application session.
  5. Kostrzewski, Andrew A.; Savant, Gajendra D.; Jannson, Tomasz P.; Jannson, Joanna L., Authentication system and method.
  6. Kostrzewski,Andrew A.; Savant,Gajendra D.; Jannson,Tomasz P.; Jannson,Joanna L., Authentication system and method.
  7. Ortiz, Luis M.; Lopez, Kermit D., Biometric authentication utilizing unique biometric signatures and portable electronic devices.
  8. Govindaraju, Venu; Chavan, Viraj; Chikkerur, Sharat, Biometric convolution using multiple biometrics.
  9. Borza Michael Andrew,CAX, Biometric input with encryption.
  10. Chang, Yao-Jen; Chen, Tsu-Han; Zhang, Wen-De, Biometrics-based cryptographic key generation system and method.
  11. Nechytaylo, Maksym; Theimer, Wolfgang Michael; Balon, Thomas, Blacklisting of frequently used gesture passwords.
  12. Theimer, Wolfgang Michael; Balon, Thomas; Wissmann, Pascal, Blacklisting of frequently used gesture passwords.
  13. Dickson, Timothy E., Card reader module with pin decryption.
  14. Bergenek,Jerker; Nordin,Bj철rn, Check for fingerprints.
  15. Moon,John; Putnam,Martin A., Chemical synthesis using diffraction grating-based encoded optical elements.
  16. Teng, Harry H.; Jo, Sung-Chan, Compact optical fingerprint capturing and recognition system.
  17. Moon, John A.; Putnam, Martin A.; Kersey, Alan D.; Fournier, David; Pinto, Joseph, Composition including an item and an encoded optical substrate and a method for identifying an item.
  18. Willins,Bruce; Sharony,Jacob; Wang,Huayan, Cryptographic architecture for secure, private biometric identification.
  19. Bjorn Vance, Cryptographic key generation using biometric data.
  20. Yu, Alex Anping; Grayson, James; Childers, Robert W., Dialysis system including wireless patient data.
  21. Moon,John A.; Putnam,Martin A., Diffraction grating-based encoded micro-particles for multiplexed experiments.
  22. Moon,John A.; Putnam,Martin A., Diffraction grating-based encoded particle.
  23. Spies Terence R. ; Misra Pradyumna K., Distributed authentication system and method.
  24. Rhoads, Geoffrey B.; Rodriguez, Tony F., Document processing methods.
  25. Rhoads, Geoffrey B.; Rodriguez, Tony F., Document processing methods.
  26. Tamori, Teruhiko, Electronic transaction system including a fingerprint identification encoding.
  27. Kersey, Alan D.; Moon, John A.; Putnam, Martin A., Elongated microparticles having an optically detectable code configured to at least one of reflect or filter light.
  28. Kersey, Alan D.; Moon, John A.; Putnam, Martin A., Encoded microparticles and a method for fabricating.
  29. Moon, John A.; Putnam, Martin A., Encoded particle having a grating with variations in the refractive index.
  30. Schantz,Howard J.; Stevens,Rick C.; Ernst,Steven H., Encryption for optical communications using dynamic subcarrier multiplexing.
  31. Takata, Melvin M.; Khan, Mohammed A.; Merman, Michael, Fast matching systems and methods for personal identification.
  32. Bjorn, Vance C.; Belongie, Serge J., Fingerprint recognition system.
  33. Bohannon, Philip L.; Jakobsson, Bjorn Markus; Monrose, Fabian; Reiter, Michael Kendrick; Wetzel, Susanne Gudrun, Generation of repeatable cryptographic key based on varying parameters.
  34. Teng, Harry H.; Jo, Sung-Chan, High contrast, low distortion optical acquisition system for image capturing.
  35. Kersey, Alan; Moon, John A.; Putnam, Martin A., Holographically encoded elements for microarray and other tagging labeling applications, and method and apparatus for making and reading the same.
  36. Miller, Joshua James; Wiebenson, Derek; Wilkerson, Douglas L.; Tiwari, Neil; Robinson, Timothy G.; Minkus, Marc Steven; Muller, Matthew R.; Wellings, Anders J.; Hansbro, Kathryn Louise; Cizman, Borut; Kunzeman, Brian S.; Cooper, Robin D.; Kudelka, Timothy L.; Sarto, Angelo A.; Lindo, Steve Joseph; Baustad, Jostein; Mounts, Duston; Hill, Shafali, Home medical device systems and methods for therapy prescription and tracking, servicing and inventory.
  37. Miller, Joshua James; Wiebenson, Derek; Wilkerson, Douglas L.; Tiwari, Neil; Robinson, Timothy G.; Minkus, Marc Steven; Muller, Matthew R.; Wellings, Anders J.; Hansbro, Kathryn Louise; Cizman, Borut; Kunzeman, Brian S.; Cooper, Robin D.; Kudelka, Timothy L.; Sarto, Angelo A.; Lindo, Steve Joseph; Baustad, Jostein; Mounts, Duston; Hill, Shafali, Home therapy entry, modification, and reporting system.
  38. Miller, Joshua James; Wiebenson, Derek; Wilkerson, Douglas L.; Tiwari, Neil; Robinson, Timothy G.; Minkus, Marc Steven; Muller, Matthew R.; Wellings, Anders J.; Hansbro, Kathryn Louise; Cizman, Borut; Kunzeman, Brian S.; Cooper, Robin D.; Kudelka, Timothy L.; Sarto, Angelo A.; Lindo, Steve Joseph; Baustad, Jostein; Mounts, Duston; Hill, Shafali, Home therapy machine.
  39. Miller, Joshua James; Wiebenson, Derek; Wilkerson, Douglas L.; Tiwari, Neil; Robinson, Timothy G.; Minkus, Marc Steven; Muller, Matthew R.; Wellings, Anders J.; Hansbro, Kathryn Louise; Cizman, Borut; Kunzeman, Brian S.; Cooper, Robin D.; Kudelka, Timothy L.; Sarto, Angelo A.; Lindo, Steve Joseph; Baustad, Jostein; Mounts, Duston; Hill, Shafali, Home therapy machine allowing patient device program selection.
  40. Moon, John A.; Kersey, Alan D.; Putnam, Martin A.; Li, Tuo, Hybrid random bead/chip based microarray.
  41. Moon,John; Kersey,Alan D.; Putnam,Martin A.; Li,Tuo, Hybrid random bead/chip based microarray.
  42. Felsher, David Paul, Information record infrastructure, system and method.
  43. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  44. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  45. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  46. Kersey,Alan D.; Moon,John A.; Putnam,Martin A., Lithographically fabricated holographic optical identification element.
  47. Thompson, Micheal, Location determination for user authentication.
  48. Thompson, Micheal, Location determination for user authentication.
  49. Thompson, Micheal, Location determination for user authentication.
  50. Moon,John; Putnam,Martin A.; Li,Tuo; Traynor,Joseph, Method and apparatus for aligning microbeads in order to interrogate the same.
  51. Moon, John A.; Putnam, Martin A.; Kersey, Alan; Fournier, David; Pinto, Joseph, Method and apparatus for drug product tracking using encoded optical identification elements.
  52. Javidi, Bahram, Method and apparatus for encryption using partial information.
  53. Javidi,Bahram, Method and apparatus for encryption using partial information.
  54. Brownlee Kenneth, Method and apparatus for illuminating a fingerprint through side illumination of a platen.
  55. Moon,John A.; Putnam,Martin A.; Kersey,Alan D.; Li,Tuo; Dunphy,James; Didden,F. Kevin, Method and apparatus for labeling using diffraction grating-based encoded optical identification elements.
  56. Moon, John A.; Putnam, Martin A.; Kersey, Alan D.; Szczepanek, Paul, Method and apparatus for labeling using optical identification elements characterized by X-ray diffraction.
  57. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  58. Brownlee Kenneth, Method and apparatus for scanning a fingerprint using a linear sensor.
  59. Brownlee Kenneth, Method and apparatus for scanning a fingerprint using a linear sensor within a cursor control device.
  60. Beatson, Rodney; Kelty, Mark A.; Beatson, Christopher J., Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device.
  61. Beatson, Rodney; Kelty, Mark A.; Beatson, Christopher J., Method and system for providing password-free, hardware-rooted, ASIC-based, authentication of human to a stand-alone computing device using biometrics with a protected local template to release trusted credentials to relying parties.
  62. Beatson, Rodney; Kelty, Mark A.; Beatson, Christopher J., Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates.
  63. Soutar Colin,CAX ; Roberge Danny B.,CAX ; Stoianov Alexei,CAX ; Gilroy Rene M.,CAX ; Bhagavatula Vijayakumar, Method for secure key management using a biometric.
  64. Grajewski,Joseph; Jaeger,Douglas, Method of authenticating proper access to secured site and device for implementation thereof.
  65. Putnam,Martin A.; Moon,John; Szczepanek,Paul S.; Li,Tuo; Rauseo,Anthony; Traynor,Joseph, Method of manufacturing of a diffraction grating-based optical identification element.
  66. Putnam,Martin A.; Moon,John; Szczepanek,Paul S.; Li,Tuo; Rauseo,Anthony; Traynor,Joseph, Method of manufacturing of diffraction grating-based optical identification element.
  67. Hsieh, Jiang; Dong, Fang Frank; Myers, Thomas John; Seidenschnur, George; Conry, Anne Marie; Sopcak, Zachary William; Grekowicz, Brian, Methods and apparatus for image reconstruction.
  68. Ortiz, Luis M.; Lopez, Kermit D., Methods and systems for providing enhanced security over, while also facilitating access through, secured points of entry.
  69. Moon, John A.; Kersey, Alan D.; Putnam, Martin A.; Li, Tuo, Methods of identifying an analyte and nucleic acid analysis.
  70. Moon, John A.; Kersey, Alan D.; Putnam, Martin A.; Li, Tuo, Methods of identifying analytes and using encoded particles.
  71. Takacs, Kristof; Adams, Neil Patrick; Singh, Ravi; Tu, Van Quy, Multi-level data storage.
  72. Hoffberg, Steven M., Multifactorial optimization system and method.
  73. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  74. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  75. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  76. Rhoads, Geoffrey B.; Rodriguez, Tony F.; Bradley, Brett A., Object processing employing movement.
  77. Lee, Jong Ik; Shin, Sung Hyu; Lee, Dong Won, Optical fingerprint acquisition apparatus.
  78. Putnam, Martin A.; Moon, John A., Optical identification element having a non-waveguide substrate.
  79. Putnam,Martin A.; Moon,John A., Optical identification element having non-waveguide photosensitive substrate with diffraction grating therein.
  80. Moon,John A.; Fournier,David R.; Putnam,Martin A.; Kersey,Alan D.; Li,Tuo, Optical reader for diffraction grating-based encoded optical identification elements.
  81. Putnam, Martin A.; Lemoine, Richard L., Optical reader for reading encoded microparticles.
  82. Moon, John A.; Fournier, David R.; Putnam, Martin A.; Kersey, Alan D; Li, Tuo, Optical reader system for substrates having an optically readable code.
  83. Moon, John A.; Fournier, David R., Optical scanner with improved scan time.
  84. Javidi, Bahram; Esmail, Ahouzi; Zhang, Guanshen (Eric), Optical security system using fourier plane encoding.
  85. Moon, John A.; Putnam, Martin A., Optical system and method for reading encoded microbeads.
  86. Moon, John A.; Putnam, Martin A., Optical system and method for reading encoded microbeads.
  87. Tsukagoshi, Takuya; Yoshinari, Jiro; Miura, Hideaki; Mizushima, Tetsuro, Personal identification method, personal identification system, and optical information recording medium.
  88. Kawano Kenji,JPX ; Taguchi Masahiro,JPX ; Hirota Masaki,JPX ; Okada Junji,JPX ; Funada Masao,JPX ; Ozawa Takashi,JPX, Physical property based cryptographics.
  89. Kennedy Paul Roy ; Hall Timothy Gerard ; Yip William Chunhung, Radio telecommunication device and method of authenticating a user with a voice authentication token.
  90. Ortiz, Luis Melisendro, Random biometric authentication apparatus.
  91. Dickinson, Alexander G.; Berger, Brian; Cole, Andrew, Relief object sensor adaptor.
  92. Deng, Robert Huijie; Bao, Feng; Wu, Yongdong, Remote authentication based on exchanging signals representing biometrics information.
  93. Kersey, Alan; Moon, John A., Scanner having spatial light modulator.
  94. Pinchen, Stephen Paul; Rasmussen, Jens Jacob Juul, Secure barcode.
  95. Benson, Wade; Sykora, Libor; Kuzela, Vratislav; Brouwer, Michael; Whalley, Andrew R.; Hauck, Jerrold V.; Finkelstein, David; Mensch, Thomas, Secure circuit for encryption key generation.
  96. Tulyakov, Sergey; Farooq, Faisal; Chikkerur, Sharat; Govindaraju, Venu, Secure fingerprint matching by hashing localized information.
  97. Lemke, Steve, Security technique for controlling access to a network by a wireless device.
  98. Lemke, Steve, Security technique for controlling access to a network by a wireless device.
  99. Lemke,Steve, Security technique for controlling access to a network by a wireless device.
  100. Rhoads, Geoffrey B.; Rodriguez, Tony F.; Bradley, Brett A., Sensing data from physical objects.
  101. Adams, Neil Patrick; Sibley, Richard Paul; Davis, Dinah Lea Marie; Singh, Ravi, Simplified multi-factor authentication.
  102. Adams, Neil Patrick; Sibley, Richard Paul; Davis, Dinah Lea Marie; Singh, Ravi, Simplified multi-factor authentication.
  103. Adams, Neil Patrick; Sibley, Richard Paul; Davis, Dinah Lea Marie; Singh, Ravi, Simplified multi-factor authentication.
  104. Preta, Joseph Frank; Simmons, William Monty; Preta, Dominic Joseph; Simmons, Isaiah Monty, Smart apparatus for making secure transactions.
  105. Hewton, Alfred, Smart card with random temporary account number generation.
  106. Simpson, Thomas L. C.; Letellier, Laura M.; Martucci, James P.; Wilkes, Gordon J., System and method for communicating with a dialysis machine through a network.
  107. Hoffberg, Steven M., System and method for determining contingent relevance.
  108. Yang, Chinping; Du, Robert, System and method for efficiently performing a pattern matching procedure.
  109. Martucci, James P.; Richardson, William R., System and method for identifying data streams associated with medical equipment.
  110. Martucci, James P.; Richardson, William R., System and method for identifying data streams associated with medical equipment.
  111. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  112. Simpson, Thomas L. C.; Letellier, Laura M.; Martucci, James P.; Wilkes, Gordon J., System and method for notification and escalation of medical data.
  113. Miller, Joshua James; Wiebenson, Derek; Wilkerson, Douglas L.; Tiwari, Neil; Robinson, Timothy G.; Minkus, Marc Steven; Muller, Matthew R.; Wellings, Anders J.; Hansbro, Kathryn Louise; Cizman, Borut; Kunzeman, Brian S.; Cooper, Robin D.; Kudelka, Timothy L.; Sarto, Angelo A.; Lindo, Steve Joseph; Baustad, Jostein; Mounts, Duston; Hill, Shafali, System and method for performing renal therapy at a home or dwelling of a patient.
  114. Schultz,Roger L.; Fripp,Michael L., System and method for processing signals in a well.
  115. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  116. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  117. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  118. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  119. Martucci, James P.; Letellier, Laura M.; Notestine, Mark; Wilkes, Gordon J., System and method for verifying medical device operational parameters.
  120. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  121. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  122. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  123. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  124. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  125. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  126. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  127. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  128. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  129. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  130. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  131. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  132. Birkler, J?rgen; Svensson, Magnus; Ahlgren, Kristina; Novak, Lars, Technique for securely storing data within a memory.
  133. Chen, Lee; Chiong, John; Yu, Yang, User access authentication based on network access point.
  134. Harris, Scott C., Using biometrics as an encryption key.
  135. Harris, Scott C., Using biometrics as an encryption key.
  136. Harris, Scott C., Using biometrics as an encryption key.
  137. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로