$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method of using smart cards to perform security-critical operations requiring user authorization 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • H04L-009/00
출원번호 US-0600305 (1996-02-12)
발명자 / 주소
  • Dillaway Blair B.
  • Barlow Douglas C.
  • Lipscomb Terry M.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee & Hayes, PLLC
인용정보 피인용 횟수 : 178  인용 특허 : 0

초록

The specification describes a user security system for use in conjunction with an operator terminal such as a personal computer. The user security system utilizes an intelligent security token, commonly referred to as a Smart Card, for security-critical operations. A peripheral reader device provide

대표청구항

[ We claim:] [1.] A user security system for use in conjunction with an operator terminal, the user security system comprising:an intelligent security token that is used for performing security-critical operations requiring user authorization;a reader device providing communications between the inte

이 특허를 인용한 특허 (178)

  1. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  2. de Jong,Eduard, Apparatus for private personal identification number management.
  3. De Jong, Eduard Karel; Bos, Jurjen Norbert Eelco, Arrangement storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory.
  4. Naifeh, Gregory P.; Naifeh, Jerome G., Arrangement, apparatus, and associated method, for providing stored data in secured form for purposes of identification and informational storage.
  5. De Jong,Eduard Karel; Bos,Jurjen Norbert Eelco, Arrangements storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory.
  6. Bishop, Fred; Saunders, Peter D, Authenticating an RF transaction using a transaction counter.
  7. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Authenticating fingerprints for radio frequency payment transactions.
  8. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Authorizing payment subsequent to RF transactions.
  9. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Authorizing radio frequency transactions using a keystroke scan.
  10. Gardiner, Michael; Canzi, Adriano, Biometric device utilizing finger sequence for authentication.
  11. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric registration for facilitating an RF transaction.
  12. Bonalle,David S.; Salow,Glen, Biometric safeguard method for use with a smartcard.
  13. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Biometrics for radio frequency payment transactions.
  14. Norman, James Mark; Sanders, Daniel S., Chaining information card selectors.
  15. Goetz Rudy ; Afghani Bahram ; Anderson Allan D. ; Godding Patrick N. ; Punt Maarten G., Compact transparent dongle device.
  16. De Jong,Eduard Karel, Computer arrangement using non-refreshed DRAM.
  17. De Jong,Eduard Karel, Computer arrangement using non-refreshed DRAM.
  18. Vincent Francois,FRX, Computer keyboard that changes from normal mode to secure mode bypassing host to input pin code directly into smartcard.
  19. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  20. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  21. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  22. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  23. Xia, Sharon; Muñoz, Eduardo; Brombaugh, Dan, Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys.
  24. De Jong,Eduard Karel, Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium.
  25. Barlow,Doug; Dillaway,Blair; Fox,Barbara; Lipscomb,Terry; Spies,Terrence, Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  26. Saunders, Peter D, Converting account data associated with a radio frequency device.
  27. De Jong,Eduard Karel, Data exchange system comprising portable data processing units.
  28. de Jong,Eduard Karel, Data exchange system comprising portable data processing units.
  29. Baranowski, James A., Enhanced RFID instrument security.
  30. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced quality of identification in a data communications network.
  31. Montgomery,Michael A.; Sinha,Anshuman; Kumamoto,Danny, Enhancing data integrity and security in a processor-based system.
  32. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Facial scan biometrics on a payment device.
  33. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  34. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Hand geometry biometrics on a payment device.
  35. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry biometrics on a payment device.
  36. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry recognition biometrics on a fob.
  37. Bennett, III,Raymond Walden; Bossemeyer, Jr.,Robert Wesley; Liebrecht,Donald Bernard; Sullivan,Barry James, Home gateway system for automation and security.
  38. Ikefuji, Yoshihiro; Okada, Hiroharu, IC card and IC chip module.
  39. Ikefuji,Yoshihiro; Okada,Hiroharu, IC card and IC chip module.
  40. Hodgkinson, Andrew A.; Norman, James M., Information card overlay.
  41. Wakai, Masanori; Suda, Aruna Rohra; Jeyachandran, Suresh, Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor.
  42. Wakai, Masanori; Suda, Aruna Rohra; Jeyachandran, Suresh, Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor.
  43. Lerche, Nolan C.; Brooks, James E.; Farrant, Simon L.; Rogers, Edward H., Interactive and/or secure activation of a tool.
  44. Lerche,Nolan C.; Brooks,James E.; Farrant,Simon L.; Rogers,Edward H., Interactive and/or secure activation of a tool.
  45. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Iris scan biometrics on a payment device.
  46. Fletcher,Christopher John, Limited use PIN system and method.
  47. Fletcher,Christopher John, Limited use pin system and method.
  48. Fletcher,Christopher John, Limited use pin system and method.
  49. Bonalle, David S; Isenberg, Susan E; Saunders, Peter D, Limiting access to account information during a radio frequency transaction.
  50. O'Malley, Anne; Ray, Pragnesh; Reiter, Eve; Saunders, Peter; Teodosic, Stefan; Tze, Dennis, Method and apparatus for enrolling with multiple transaction environments.
  51. de Jong,Eduard K., Method and apparatus for installing an application onto a smart card.
  52. Gassen, Derek; Donahue, Thomas P., Method and apparatus for predictive and actual intrusion detection on a network.
  53. de Jong,Eduard K., Method and apparatus for processing an application identifier from a smart card.
  54. de Jong, Eduard, Method and apparatus for protecting against side channel attacks against personal identification numbers.
  55. de Jong,Eduard K., Method and apparatus for providing an application on a smart card.
  56. de Jong,Eduard K., Method and apparatus for selecting a desired application on a smart card.
  57. Bonalle, David S.; Larkin, Carl; Saunders, Peter D., Method and system for a travel-related multi-function fob.
  58. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Method and system for auditory recognition biometrics on a FOB.
  59. Bonalle,David S.; Salow,Glen, Method and system for keystroke scan recognition biometrics on a smartcard.
  60. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Method and system for proffering multiple biometrics for use with a FOB.
  61. Barnes, Brian T.; Bonalle, David S.; Saunders, Peter D., Method and system for resource management and evaluation.
  62. Fraser, Neil R., Method and system for securely displaying and confirming request to perform operation on host computer.
  63. Bonalle,David S.; Salow,Glen, Method and system for smellprint recognition biometrics on a smartcard.
  64. Barnes, Brian; Bonalle, David S.; Saunders, Peter D., Method and system for tracking user performance.
  65. Barnes,Brian; Bonalle,David S.; Saunders,Peter D., Method and system for tracking user performance.
  66. Bonalle, David S.; Salow, Glen, Method and system for vascular scan recognition with a smartcard.
  67. De Jong, Eduard Karel, Method and system of communicating devices, and devices therefor, with protected data transfer.
  68. Bonalle,David S.; Salow,Glen, Method for biometric security using a smartcard.
  69. Rankl,Wolfgang, Method for exchanging at least one secret initial value between a processing station and a chip card.
  70. de Jong,Eduard, Method for private personal identification number management.
  71. Raff, Christopher; Comstock, Ken, Method for reducing purchase time.
  72. Bonalle,David S.; Salow,Glen, Method for registering a biometric for use with a smartcard.
  73. Feiken Albertus,NLX, Method of making recoverable smart card transactions, a method of recovering such a transaction, as well as a smart card allowing recoverable transactions.
  74. Peart, Lee J.; Saunders, Peter D., Methods and apparatus for a secure proximity integrated circuit card transactions.
  75. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  76. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  77. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  78. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  79. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  80. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  81. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  82. Bishop,Fred Alan; Glazer,Elliot Harold; Gorgol,Zygmunt Steven; Hohle,William G.; Johnson,Michael G.; Johnstone,David E; Lake,Walter Donald; Royer,Coby; Simkin,Marvin; Swift,Nick; White,Dirk B; Bennett,Russell, Methods and apparatus for conducting electronic transactions.
  83. Bishop,Fred; Bonalle,David S; Salow,Glen, Methods and apparatus for conducting electronic transactions using biometrics.
  84. Parry,Travis J.; Sesek,Robert Matthew; Hoene,Keith, Methods and systems for providing an identification key to a printing device.
  85. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  86. Rajchel Suzanne Kennedy, Modular digital assistant.
  87. Sermersheim, James; Hodgkinson, Andrew A.; Sanders, Daniel S.; Doman, Thomas E.; Buss, Duane F., Multiple persona information cards.
  88. Crisan Adrian ; Jones Brant W., Networked computer security system.
  89. Kuo, Kuan-Ting, Portable electronic apparatus, card reader and operation method of card reader.
  90. Miller Steven M., Priority-based I/O task processing in computers.
  91. Bishop, Fred; Saunders, Peter D., Processing an RF transaction using a routing number.
  92. Xia, Sharon (Hong); Brombaugh, Dan, Proxy server security token authorization.
  93. Mire,Philip Jason, Public key infrastructure utilizing master key encryption.
  94. Saunders, Peter D, RF transaction system and method for storing user personal data.
  95. Bishop, Fred; Saunders, Peter D, Recurrent billing maintenance with radio frequency payment devices.
  96. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  97. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  98. Berardi, Michael J.; Bliman, Michal; Bonalle, David; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Reload protocol at a transaction processing entity.
  99. Carter, Stephen R.; Burch, Lloyd Leon, Remote authorization for operations.
  100. Carter, Stephen R; Burch, Lloyd Leon, Remote authorization for operations.
  101. Koistinen,Martin J.; Bazzali,Johann O., Remote unblocking with a security agent.
  102. Hessel, Clifford; Smith, David Mark, Removable cryptographic ignition key system and method.
  103. Chamberlain, Mark; Alvermann, John; Picone, Leonard, Robust delivery of packet based secure voice.
  104. Tolopka Stephen J. ; Light John J., Secure and convenient information storage and retrieval method and apparatus.
  105. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  106. Seki,Yuji; Kawasaki,Yusuke; Hashimoto,Shigeru; Yanagi,Ryoichi, Secure encryption processor with tamper protection.
  107. De Jong, Eduard Karel, Secure photo carrying identification device, as well as means and method for authenticating such an identification device.
  108. De Jong,Eduard Karel, Secure photo carrying identification device, as well as means and method for authenticating such an identification device.
  109. Bonalle, David S; Isenberg, Susan E; Saunders, Peter D; Williamson, John R, Securing RF transactions using a transactions counter.
  110. Yeap, Tet Hin; Dafu, Lou; O'Brien, William G., Security access device and method.
  111. Lee, Jang-won; Shin, Yong-seok, Security card check type computer security system method.
  112. Vatanen, Harri, Security module, security system and mobile station.
  113. Yeap, Tet Hin; O'Brien, William G.; Lou, Dafu; Xiaoli, Ren, Security system and method.
  114. Gardiner, Michael; Canzi, Adriano, Smart card system comprising a card and a carrier.
  115. Gardiner, Michael; Canzi, Adriano, Smart card systems and methods utilizing multiple ATR messages.
  116. Gardiner, Michael; Canzi, Adriano, Smart card systems comprising a card and a carrier.
  117. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using auditory scan recognition.
  118. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using facial scan recognition.
  119. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using fingerprint recognition.
  120. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using iris scan recognition.
  121. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using retinal scan recognition.
  122. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using signature recognition.
  123. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using smellprint recognition.
  124. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using voiceprint recognition.
  125. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  126. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  127. Matsushiba, Takuji; Takayama, Masao, Storage device.
  128. De Jong,Eduard Karel, Superposition of data over voice.
  129. De Jong,Eduard Karel, Superposition of data over voice.
  130. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  131. Matthews, Bradley Owen; Bishop, Fred, System and method for automatic reconciliation of transaction account spend.
  132. Barlow, Doug; Dillaway, Blair; Fox, Barbara; Lipscomb, Terry; Spies, Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  133. Bonalle, David S.; Larkin, Carl; Saunders, Peter D., System and method for dynamic fob synchronization and personalization.
  134. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Saunders, Peter D., System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions.
  135. Baranowski, James A., System and method for enhanced RFID instrument security.
  136. Baranowski, James A., System and method for enhanced RFID instrument security.
  137. Peart, Lee J; Saunders, Peter D, System and method for generating an unpredictable number using a seeded algorithm.
  138. Bennett, III, Raymond Walden; Griffith, Laura Marie; Lund, Arnold M., System and method for home automation and security.
  139. Bennett, III, Raymond Walden; Griffith, Laura Marie; Lund, Arnold M., System and method for home automation and security.
  140. Bennett, III, Raymond Walden; Griffith, Laura Marie; Lund, Arnold M., System and method for home automation and security.
  141. Bennett, Raymond Walden; Griffith, Laura Marie; Lund, Arnold M., System and method for home automation and security.
  142. Bennett, Raymond Walden; Griffith, Laura Marie; Lund, Arnold M., System and method for home automation and security.
  143. Saunders, Peter D, System and method for managing a transaction protocol.
  144. Webb, Russ; Blight, David, System and method for monitoring a security state of an electronic device.
  145. Bishop, Fred; Neemann, Trey; Armes, David, System and method for reassociating an account number to another transaction account.
  146. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  147. Saunders, Peter D; Barnes, Brian T, System and method for secure transactions manageable by a transaction account provider.
  148. Peart, Lee J.; Saunders, Peter D., System and method for securing sensitive information during completion of a transaction.
  149. Gardiner, Michael; Canzi, Adriano, System and method for selectively initiating biometric authentication for enhanced security of access control transactions.
  150. Beenau,Blayn W.; Bonalle,David S.; Fields,Seth W.; Gray,William J.; Larkin,Carl; Montgomery,Joshua L.; Saunders,Peter D., System for biometric security using a FOB.
  151. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  152. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  153. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  154. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  155. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  156. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  157. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  158. Breck, Lydia; Zoob, Jessica; Salow, Glen; Bishop, Fred; Schwarz, William; Glazer, Elliot; Johnstone, David; Cunningham, Katie; Nambiar, Anant; Belt, Jan Nunney; Wittwer, Martin; Armes, David; Chow, Christina, System for facilitating a transaction.
  159. Breck, Lydia; Zoob, Jessica; Salow, Glen; Bishop, Fred; Schwarz, William; Glazer, Elliot; Johnstone, David; Cunningham, Katie; Nambiar, Anant; Belt, Jan Nunney; Wittwer, Martin; Armes, David; Chow, Christina, System for facilitating a transaction.
  160. Hill,David W.; Moffatt,Susan S.; Springer,Robert E.; Swansey,John D.; Tierney,Julie E., System for organizing one or more personal computer accessory devices.
  161. Bonalle, David; Bliman, Michal; Saunders, Peter D.; Williamson, John Robert, Systems and methods for managing account information lifecycles.
  162. Bishop, Fred; Saunders, Peter D, Systems and methods for non-traditional payment using biometric data.
  163. Bonalle,David S.; Fehlhaber,Jeff; Saunders,Peter D., Systems and methods for providing a RF transaction device operable to store multiple distinct calling card accounts.
  164. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for implementing security on a small footprint device using a context barrier.
  165. Susser,Joshua; Butler,Mitchel B.; Streich,Andy, Techniques for implementing security on a small footprint device using a context barrier.
  166. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier in a small footprint device using global data structures.
  167. Susser,Joshua; Butler,Mitchel B.; Streich,Andy, Techniques for permitting access across a context barrier in a small footprint device using global data structures.
  168. Susser,Joshua; Butler,Mitchel B.; Streich,Andy, Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces.
  169. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier on a small footprint device using an entry point object.
  170. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier on a small footprint device using an entry point object.
  171. Susser, Joshua; Butler, Mitchel B.; Streich, Andy, Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges.
  172. Le Saint, Eric; Wen, Wu, Universal secure messaging for cryptographic modules.
  173. Wen, Wu; Le Saint, Eric F.; Becquart, Jerome Antoine Marie, Universal secure messaging for remote security tokens.
  174. Chess,David M.; Dyer,Joan; Itoi,Naomaru; Kravitz,Jeff; Palmer,Elaine Rivette; Perez,Ronald; Smith,Sean William, Used trusted co-servers to enhance security of web interaction.
  175. Wilkinson Timothy J.,GBX ; Guthery Scott B. ; Krishna Ksheerabdhi ; Montgomery Michael A., Using a high level programming language with a microcontroller.
  176. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
  177. Wieland, Martin, Virtual smart card to perform security-critical operations.
  178. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Voiceprint biometrics on a payment device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로