$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital certificates containing multimedia data extensions

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/30
출원번호 US-0536271 (1995-09-29)
발명자 / 주소
  • Aucsmith David W.
  • Cox George
  • Onnen Paul E.
출원인 / 주소
  • Intel Corporation
대리인 / 주소
    Blakely, Sokoloff, Taylor & Zafman
인용정보 피인용 횟수 : 117  인용 특허 : 8

초록

A method and apparatus of communicating information comprising providing a datum which includes a digital certificate containing data. The digital certificate including an extension which includes: a first identifier which specifies a major classification of the data; a second identifier which speci

대표청구항

[ What is claimed is:] [1.] A method of communicating information comprising providing a datum which includes a digital certificate containing data, said digital certificate including an extension which includes:a. a first identifier which specifies a first classification of said data, the first cla

이 특허에 인용된 특허 (8)

  1. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Fingerprint controlled public key cryptographic system.
  2. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA) Martin William C. (Concord NC) Rohland William S., Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors.
  3. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  4. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Method to establish and enforce a network cryptographic security policy in a public key cryptosystem.
  5. Nakamura Kenji (Hadano JPX), Multimedia network system.
  6. Brands Stefanus A. (Ina Boudier-Bakkerlaan 143 III 3582 XW Utrecht NLX), Privacy-protected transfer of electronic information.
  7. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  8. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.

이 특허를 인용한 특허 (117)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  3. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  4. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  5. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  6. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  7. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  8. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  9. Rao, Ravi; Flannery, Eliot John; Weisberg, Tomer; Parks, III, Upshur Warren; Gupta, Rohit; Tao, Kevin R.; Anirudh, Anirudh; Thaler, David G.; Classen, Andre R.; Manion, Todd R., Application programming interface for inviting participants in a serverless peer to peer network.
  10. Schumacher Thomas ; Kohler Timothy L., Authenticating images from digital cameras.
  11. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  12. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  13. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Communicating between an application process and a server process to manage peer-to-peer identities.
  14. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  15. Averbuch, Aaron H.; Davis, David; James, Edward W.; Hobbs, Craig A., Configuring a secure network.
  16. Classen, Andre R.; Anirudh, Anirudh; Thaler, David G.; Tao, Kevin R.; Rao, Ravi T.; Gupta, Rohit; Weisberg, Tomer; Parks, III, Upshur Warren, Contact management in a serverless peer-to-peer system.
  17. Traw, Chandler Brendan Stanton; Aucsmith, David Wayne, Content protection for digital transmission systems.
  18. Brickell,Ernie F.; Deklotz,Wesley; Glover,Jeff U.; Premi,Michael R.; Wood,Matthew D.; Shimoda,Marion H., Delegating digital credentials.
  19. Kramer Glenn A., Determining point of interaction device security properties and ensuring secure transactions in an open networking environment.
  20. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  21. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  22. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  23. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  24. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  25. McSheffrey Brendan ; Gulley Kevin, E-mail games.
  26. Kawamura,Shunji; Tomita,Taminori, Electronic certificate system.
  27. Daniel E. Geer, Jr. ; Henry R. Tumblin, Enabling business transactions in computer networks.
  28. Geer ; Jr. Daniel E. ; Tumblin Henry R. ; Solomon Eliot M., Enabling business transactions in computer networks.
  29. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  30. Zimmer, Vincent J.; Cox, George, High integrity firmware.
  31. Kelley, Steve; Wilson, Jeremy; Erwin, Jeff, Home network optimizing system.
  32. Felsher, David Paul, Information record infrastructure, system and method.
  33. O'Donnell, Lawrence; O'Donnell, Michael, Internet system for facilitating human user advisement and licensing of copyrighted works of authorship.
  34. Brickell,Erine F.; Deklotz,Wesley, Managed authentication service.
  35. Manion,Todd R.; Donner,Robert D.; Simionescu,Radu, Managed peer name resolution protocol (PNRP) interfaces for peer to peer networking.
  36. Movalli, Michael; Movalli, Brian, Method and apparatus for generating secure endorsed transactions.
  37. Kent, Stephen Thomas, Method and apparatus for supporting authorities in a public key infrastructure.
  38. Wineinger, Gerald William; Wineinger, Travis Jay; Coleman, Joseph Eric; Hegg, Terry James, Method and apparatus to perform online credential reporting.
  39. Rump,Niels; Koller,Juergen; Brandenburg,Karlheinz, Method and device for generating a data stream and method and device for playing back a data stream.
  40. Rump,Niels, Method and device for producing an encrypted payload data stream and method and device for decrypting an encrypted payload data stream.
  41. Benantar, Messaoud; Gindin, Thomas L.; Milman, Ivan, Method and system for coupling an X.509 digital certificate with a host identity.
  42. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  43. Manion, Todd R.; Rao, Ravi T.; Shappell, Michael, Method for efficient content distribution using a peer-to-peer networking infrastructure.
  44. Jespersen, Torben; Bruus, Kirsten, Method for performing a transaction over a network.
  45. Jespersen,Torben; Bruus,Kirsten, Method for performing a transaction over a network.
  46. Movalli,Michael; Movalli,Brian, Methods and apparatus for generating secure endorsed transactions.
  47. Johnson, Richard C., Methods and systems for authentication and authorization.
  48. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  49. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  50. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  51. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  52. Hoffberg, Steven M., Multifactorial optimization system and method.
  53. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  54. Ahlers, Tim; Mooney, Steve; Owens, John-Anthony; Vandenberg, Greg; O'Leary, Myk; Averbuch, Aaron; Wilson, Jeremy; Younger, Lauren, Network metric reporting system.
  55. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  56. Sehr, Richard P., Passport system and methods utilizing multi-application passport cards.
  57. Sweeny,James W.; Benantar,Messaoud; Petreshock,John J.; Gindin,Thomas L.; Dayka,John C., Password exposure elimination for digital signature coupling with a host identity.
  58. Huitema,Christian; Gavrilescu,Alexandru; Anderson,Noel W.; Zhang,Xiaohai, Peer-to-peer group management and method for maintaining peer-to-peer graphs.
  59. Manion, Todd R.; Dewey, Jeremy L.; Donner, Robert D.; Senkeresty, Scott A.; Parks, III, Upshur, Peer-to-peer grouping interfaces and methods.
  60. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  61. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  62. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  63. Huitema,Christian; Gavrilescu,Alexandru; Zhang,Xiaohai, Peer-to-peer name resolution protocol (PNRP) group security infrastructure and method.
  64. Huded, Ashok V., Platform and method for creating and using a digital container.
  65. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  66. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  67. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  68. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  69. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  70. Parrott,William M., Secure transaction modem storing unique indicia.
  71. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  72. White, Daniel F., Selective omission of transaction data in a digital receipt.
  73. Andrews, Richard F., Streamlined process for enrollment of multiple digital certificates.
  74. Mann Stewart ; Mann L. Maribel, System and method for aircraft passenger check-in and boarding using iris recognition.
  75. French Jennifer ; Wilder Jone, System and method for authentication of network users.
  76. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  77. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  78. Jennifer French ; Jone Wilder, System and method for authentication of network users.
  79. French Jennifer ; Wilder Jone, System and method for authentication of network users and issuing a digital certificate.
  80. French Jennifer ; Wilder Jone, System and method for authentication of network users with preprocessing.
  81. Hoffberg, Steven M., System and method for determining contingent relevance.
  82. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  83. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  84. Freed,Michael; Amara,Satish; Joseph,Boby, System and method for providing distributed and dynamic network services for remote access server users.
  85. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  86. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  87. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  88. Ahlers, Timothy F.; Averbuch, Aaron H.; Marl, Coyle B.; Owens, John-Anthony; Furlan, John L. W.; Kaplan, Jonathan; Braunstein, Ariel, System and method for simplifying secure network setup.
  89. Sehr, Richard P., System and methods utilizing passport documents.
  90. Hatter, Jesse Andrew; Hatter, Brenda Fate; Jackson, Audrella Marie, System for executing remote electronic notarization and signatory verification and authentication.
  91. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  92. Williams Humphrey, System, method and article of manufacture for initiation of software distribution from a point of certificate creation utilizing an extensible, flexible architecture.
  93. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  94. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  95. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  96. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  97. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  98. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  99. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  100. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  101. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  102. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  103. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  104. Tempel, Mark; Ivanoff, Alex, Systems and methods for providing a self-maintaining PKI infrastructure among loosely connected entities.
  105. Bhalerao, Kokil, Systems and methods for secure communications between devices.
  106. Peters, Mark E.; Salmon, Parley Avery, Technique for compressing digital certificates for use in smart cards.
  107. Gillin, Matthew J.; Korfmann, Roger; Raden, Paul L., Transfer instrument.
  108. Gillin, Matthew J.; Korfmann, Roger; Raden, Paul L., Transfer instrument.
  109. Gillin, Matthew J.; Korfmann, Roger; Raden, Paul L., Transfer instrument.
  110. Gillin,Matthew J.; Korfmann,Roger; Raden,Paul L., Transfer instrument.
  111. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  112. Chetty,Vijay Raghavan, Universal portable unit.
  113. Honarvar,Laurence Toraj; Witte,Brandon Raymond; Fatigante,Steve Chance; Harless,Gary Lynn, User authentication system and methods thereof.
  114. Crall,Christopher J.; Medvinsky,Gennady; Ball,Joshua; Jaganathan,Karthik; Leach,Paul J.; Zhu,Liqiang; Cross,David B., User mapping information extension for protocols.
  115. Colson, Christen J., Verification and authentication systems and methods.
  116. Colson, Christen J., Verification and authentication systems and methods.
  117. Kenji Kawano JP; Masahiro Taguchi JP; Kazuo Saito JP, Verification data generating apparatus, data verification apparatus and storage medium for storing verification data generating program.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트