$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cryptographic communications method and system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/08
  • H04L-009/30
  • H04L-009/00
출원번호 US-0313214 (1994-11-14)
우선권정보 AU-0001602 (1992-03-30)
국제출원번호 PCT/AU93/001 (1993-03-30)
§371/§102 date 19941114 (19941114)
국제공개번호 WO-9320538 (1993-10-14)
발명자 / 주소
  • Zuk Edward Andrew,AUX
출원인 / 주소
  • Telstra Corporation Limited, AUX
대리인 / 주소
    Blakely Sokoloff Taylor & Zafman
인용정보 피인용 횟수 : 95  인용 특허 : 8

초록

A method for loading secret data, such as an application key, on a smart card (6), which involves storing a random key on the card (6), encrypting the random key on the basis of a public key, and providing the encrypted random key to a central processing station (4). The encrypted random key is decr

대표청구항

[ I claim:] [15.] A communications system comprising smart card means and a central processing station, said smart card means including:means for storing a random key on a smart card,means for encrypting said random key using a public key; andmeans for decrypting data encrypted using said random key

이 특허에 인용된 특허 (8)

  1. Iijima Yasuo (Yokohama JPX), Data communication system.
  2. Matsumoto Hiroshi (Sagamihara JPX) Takaragi Kazuo (Ebina JPX) Fukuzawa Yasuko (Sagamihara JPX), Encipher method and decipher method.
  3. Hirokawa Katsuhisa (Yokosuka JPX), Memory card.
  4. Hoppe Joseph (Les Molieres FRX), Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system.
  5. Angebaud Didier (Chantepie FRX) Giachetti Jean-Luc (Rennes FRX) Guillou Louis (Rennes FRX) Quisquater Jean-Jacques (Brussel BEX), Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciproc.
  6. Bjerrum J rgen (Oure DKX) Ottosen Steen (Odense DKX) Kj r Nielsen Sven (Albertslund DKX), Method of transferring data, between computer systems using electronic cards.
  7. Ugon Michel (Saint-Ouen FRX), Portable data carrier including a microprocessor.
  8. Okumura Katsuya (Yokohama JPX), Semiconductor device with a diffusion barrier contact of a refractory metal nitride and either carbon or boron.

이 특허를 인용한 특허 (95)

  1. Bishop, Fred; Saunders, Peter D, Authenticating an RF transaction using a transaction counter.
  2. Buck, Peter; Newport, Peter, Authentication token.
  3. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Authorized sample receiver.
  4. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Authorizing payment subsequent to RF transactions.
  5. Epstein, William C.; Miller, Lawrence R., Binding a digital certificate to multiple trust domains.
  6. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric authorization of an RF transaction.
  7. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric registration for facilitating an RF transaction.
  8. Wilt,Andrew N.; Kelly,Michael J., Cipher method and system for verifying a decryption of an encrypted user data key.
  9. Dellow, Andrew, Circuit personalization.
  10. Dellow, Andrew, Circuit personalization.
  11. Barlow,Doug; Dillaway,Blair; Fox,Barbara; Lipscomb,Terry; Spies,Terrence, Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  12. Moreau Thierry,CAXITX H1M 2A1, Cryptographic data integrity with serial bit processing and pseudo-random generators.
  13. Garay,Juan A.; Jakobsson,Bjorn M.; Kristol,David M.; Mizikovsky,Semyon B., Cryptographic key processing and storage.
  14. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, DNA sample data in a transponder transaction.
  15. Clayton, Ray; Mendoza, Eliel J.; Cochran, Ronn Warren, Data encryption system and method.
  16. Sedlak, Holger, Device for reliability creating electronic signatures.
  17. Quesselaire, Dominique, Electronic payment terminal.
  18. Quesselaire, Dominique, Electronic payment terminal, smart card adapted to such a terminal and method for loading a secret key in such a terminal.
  19. Matsuzaki Natsume,JPX ; Harada Syunji,JPX ; Tatebayashi Makoto,JPX, Encryption apparatus for ensuring security in communication between devices.
  20. Hansen,Mads Dore; Sernbrant,Joakim; Romedahl,Lars; Thuvesholmen,Mikael, Encryption protocol.
  21. Baranowski, James A., Enhanced RFID instrument security.
  22. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Facial scan biometrics on a payment device.
  23. Ferguson, Niels, Fast RSA signature verification.
  24. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Hand geometry biometrics on a payment device.
  25. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry biometrics on a payment device.
  26. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry recognition biometrics on a fob.
  27. Takami,Yutaka; Fukushima,Shinichiro; Hashimoto,Kazunori; Aikawa,Makoto; Inamitsu,Tetsuharu, IC card with a cipher key conversion function.
  28. Blancas,Irma; Krimmel,Karl F., Identification of an individual using a multiple purpose card.
  29. Sueyoshi, Masahiro; Hiura, Yuji; Hirano, Yoshiaki, Information processing apparatus and method, setting apparatus and method, and program.
  30. Kusakabe,Susumu; Takada,Masayuki; Sasaki,Masachika, Information processing system, portable electronic device, access apparatus for the portable electronic device, and method of using memory space.
  31. Moreau Thierry,CAX, Initial secret key establishment including facilities for verification of identity.
  32. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Iris scan biometrics on a payment device.
  33. Sotoodeh,Mehdi, Key generation performance improvement.
  34. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  35. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  36. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  37. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  38. Page,Kevin J.; Plum,Don P.; Kelly,Guy M.; Ravenis, II,Joseph V J; Carta,David R., Method and apparatus for establishing a secure smart card communication link through a communication network.
  39. Moos, Rainer; Schmidt, Klaus Dieter; Breuer, Jörg, Method and security system for the secure and unequivocal encoding of a security module.
  40. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Method and system for auditory recognition biometrics on a FOB.
  41. Hughes, James P.; Stewart, Alexander S.; Edling, Dwayne A., Method and system for protecting keys.
  42. Deindl Michael,DEX ; Witzel Martin,DEX, Method and system for the secure transmission and storage of protectable information.
  43. Pesonen, Lauri, Method for issuer and chip specific diversification.
  44. Otte, Günter; Gerhardt, Nils, Method for personalizing a portable data carrier, in particular a chip card.
  45. Buck, Peter; Newport, Peter, Method for personalizing an authentication token.
  46. Buck, Peter; Newport, Peter, Method for personalizing an authentication token.
  47. Buck, Peter; Newport, Peter, Method for personalizing an authentication token.
  48. Buck, Peter; Newport, Peter, Method for personalizing an authentication token.
  49. Wolfgang Buhr DE; Helmut Horner DE, Method of and system for writing-in key information.
  50. Steer, David G.; McCann, Stephen; Yu, Dongsheng, Method of registering devices.
  51. Shibata, Osamu; Yugawa, Taihei; Sekibe, Tsutomu; Hirota, Teruto; Saito, Yoshiyuki; Otake, Toshihiko, Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information.
  52. Kefford, Mark Gregory; Vanderstraeten, Alain Marie Eric; Houthooft, Mario Raymond Louis, Methods and systems for secure transmission of information using a mobile device.
  53. Lyne, Malcolm; deKozan, David L.; Paetzold, Kay, Personal point of sale.
  54. Lyne, Malcolm; deKozan, David; Paetzold, Kay, Personal point of sale.
  55. Lyne, Malcolm; deKozan, David; Paetzold, Kay, Personal point of sale.
  56. Baldischweiler, Michael, Portable data carrier featuring secure data processing.
  57. Bishop, Fred; Saunders, Peter D., Processing an RF transaction using a routing number.
  58. Tallent, Jr., Guy S.; Donfried, Paul A.; Hicks, George M. (Mack); Lee, Elizabeth, Provision of authorization and other services.
  59. Mire,Philip Jason, Public key infrastructure utilizing master key encryption.
  60. Bonalle, David S.; Freud, Aliza; Nanton, Jason; Fitzmaurice Reilly, Mary Ann; Sharp, Ray, Public/private dual card system and method.
  61. Bishop, Fred; Saunders, Peter D., RF payment via a mobile device.
  62. Bishop, Fred; Saunders, Peter D., RF transaction authentication using a random number.
  63. Bonalle, David S.; Fehlhaber, Jeff; Saunders, Peter D., RF transaction device.
  64. Saunders, Peter D, RF transaction system and method for storing user personal data.
  65. Bishop, Fred, RF transactions using a wireless reader grid.
  66. Bishop, Fred, RF transactions using a wireless reader grid.
  67. Wilber, Scott A., Random number generator and generation method.
  68. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Registering a biometric for radio frequency transactions.
  69. Berardi, Michael J.; Bliman, Michal; Bonalle, David; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Reload protocol at a transaction processing entity.
  70. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; Williamson, John R., Securing a transaction between a transponder and a reader.
  71. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; Williamson, John R.; Mayers, Alexandra, Securing a transaction between a transponder and a reader.
  72. Camp, Jr., William O.; Homiller, Daniel P., Shared key encryption using long keypads.
  73. Girard, Pierre; Choukri, Hamid, Simplified smartcard personalization method, and corresponding device.
  74. Kocher, Paul C.; Jun, Benjamin C.; Jaffe, Joshua M., Specialized circuitry for cryptographic authentication and other purposes.
  75. Barlow Doug ; Dillaway Blair ; Fox Barbara ; Lipscomb Terry ; Spies Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  76. Barlow, Doug; Dillaway, Blair; Fox, Barbara; Lipscomb, Terry; Spies, Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  77. Baranowski, James A., System and method for enhanced RFID instrument security.
  78. Baranowski, James A., System and method for enhanced RFID instrument security.
  79. Baranowski, James A., System and method for enhanced RFID instrument security.
  80. Hicks, Mack; Seiler, Regina; Tallent, Guy; Kupres, Kristin; Freudenstein, Allen, System and method for providing certification-related and other services.
  81. McKenney, Mary Keenan; Walch, Markus; Baker, III, Walter; Storch, Oliver; Landsmann, Peter Josef Eduard; Jetter, William John; Wong, Margaret Miu-Ling; Cameron, William Isaac, System and method for providing payment services in electronic commerce.
  82. Bishop, Fred; Neemann, Trey; Armes, David, System and method for reassociating an account number to another transaction account.
  83. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  84. Miller, Lawrence R.; Tallent, Jr., Guy S.; Ahmed, Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  85. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  86. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
  87. Park, Young Chual; Yang, Tae Joon; Lee, Ki Jeong, System for supporting over-the-air service and method thereof.
  88. Park, Young Chual; Yang, Tae Joon; Lee, Ki Jeong, System for supporting over-the-air service and method thereof.
  89. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  90. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  91. Matsumoto Masaharu,JPX ; Gokita Eriko,JPX, Terminal ID automatic assigning system.
  92. Hughes, James P.; Stewart, Alexander; Edling, Dwayne A., Token-based encryption key secure conveyance.
  93. Dulin, Charles; Solo, David; Hicks, Mack; Nepomuceno, Larry; Stirland, Mark, Transaction coordinator for digital certificate validation and other services.
  94. Lyne, Malcolm; deKozan, David; Mistry, Pradip; Karsch, Boris, Virtual transportation point of sale.
  95. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Voiceprint biometrics on a payment device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로