$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus for key distribution in an encryption system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/08
출원번호 US-0615322 (1996-03-13)
우선권정보 GB-0005766 (1994-03-23)
국제출원번호 PCT/GB94/020 (1994-09-14)
§371/§102 date 19960313 (19960313)
국제공개번호 WO-9508232 (1995-03-23)
발명자 / 주소
  • Hawthorne William McMullan,GB2
출원인 / 주소
  • Chantilley Corporation Limited, GB2
대리인 / 주소
    Gordon
인용정보 피인용 횟수 : 71  인용 특허 : 0

초록

An encryption/description apparatus enables encrypted communication between two stations each incorporating such an apparatus. The apparatus is arranged when acting as sender to create (at 71) a mutual primitive from stored items of data, to generate a random session key and encrypt the random sessi

대표청구항

[ I claim:] [1.] An encryption/decryption apparatus to enable encrypted communication between two stations, each operable as a sender and a recipient and each incorporating such an apparatus, said apparatus being operable in both registration mode and in encrypted communication mode, said apparatus

이 특허를 인용한 특허 (71)

  1. Ji, Lusheng; Feldman, Brian; Agre, Jonathan Russell, Apparatus, method, and medium for self-organizing multi-hop wireless access networks.
  2. Yamanaka,Yasuhiro; Yoshitomi,Kazunori; Hisamatsu,Fumiaki; Yoshino,Kenji; Ueno,Shinichi, Authoring system, authoring key generator, authoring device, authoring method, and data supply device, information terminal and information distribution method.
  3. Flitcroft, Daniel Ian; O'Donnell, Graham; Langford, Conor; Carroll, James, Business-to-business commerce using financial transaction numbers.
  4. Helferich, Richard J., Content provision to subscribers via wireless transmission.
  5. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  6. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  7. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  8. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  9. Flitcroft, Daniel I.; O'Donnell, Graham, Credit card system and method.
  10. Flitcroft, Daniel I; O'Donnell, Graham, Credit card system and method.
  11. Flitcroft, Daniel Ian; O'Donnell, Graham, Credit card system and method.
  12. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  13. Flitcroft, Daniel Ian; Lyons, Garry, Credit cards system and method having additional features.
  14. Flitcroft,Daniel I.; O'Donnell,Graham, Data structure, method and system for generating person-to-person, person-to-business, business-to-person, and business-to-business financial transactions.
  15. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  16. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  17. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  18. Raike, William Michael, Encryption processing for streaming media.
  19. Sugahara, Takayuki; Kuroiwa, Toshio; Inoha, Wataru; Ueda, Kenjiro; Higurashi, Seiji, Method and apparatus for contents information.
  20. Jakobsson, Bjorn Markus; Wetzel, Susanne Gudrun, Method and apparatus for ensuring security of users of short range wireless enable devices.
  21. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  22. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  23. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  24. Dobranski,Lawrence Gerard; Lee,Michael, Method and system for encryption of streamed data.
  25. Sims, John B.; Calog, Jeffrey W., Method and system for generating digital fingerprint.
  26. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  27. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  28. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  29. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  30. Helferich, Richard J., Method for integrating audio and visual messaging.
  31. Montemayor, Oscar; Wei, Joe T.; Siegel, Ellen H., Method for secure communication from chip card and system for performing the same.
  32. Ji, Lusheng; Agre, Jonathan; Mishra, Arunesh; Thakkar, Sohil, Methods and apparatus for secure, portable, wireless and multi-hop data networking.
  33. Ji, Lusheng; Agre, Jonathan; Mishra, Arunesh; Thakkar, Sohil, Methods and apparatus for secure, portable, wireless and multi-hop data networking.
  34. Ji, Lusheng; Agre, Jonathan; Mishra, Arunesh; Thakkar, Sohil, Methods and apparatus for secure, portable, wireless and multi-hop data networking.
  35. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  36. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  37. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  38. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  39. Helferich, Richard J., Methods of performing actions in a cell phone based on message parameters.
  40. Helferich, Richard J., Paging transceivers and methods for selectively retrieving messages.
  41. Helferich, Richard J., Paging transceivers and methods for selectively retrieving messages.
  42. Helferich,Richard J., Paging transceivers and methods for selectively retrieving messages.
  43. Helferich,Richard J., Paging transceivers and methods for selectively retrieving messages.
  44. Helferich,Richard J., Paging transceivers and methods for selectively retrieving messages.
  45. Horstmeyer, Roarke; Judkewitz, Benjamin; Yang, Changhuei; Vellekoop, Ivo M., Physical key-protected one time pad.
  46. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  47. Bennett, Richard T., System and method for automatic setup of a network device with secure network transmission of setup parameters.
  48. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  49. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  50. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  51. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  52. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  53. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  54. Helferich,Richard J., System and method for delivering information to a transmitting and receiving device.
  55. Garrison, Greg B., System and method for encrypting data messages.
  56. D'Agostino, John, System and method for performing secure credit card purchases.
  57. D'Agostino, John, System and method for performing secure credit card transactions.
  58. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  59. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  60. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  61. Greg B. Garrison, System and method for restricting access to a data table within a database.
  62. Greg B. Garrison, System and method for restricting unauthorized access to a database.
  63. Garrison Greg B., System and method for securely accessing a database from a remote location.
  64. Helferich, Richard J., Systems and methods for adding information to a directory stored in a mobile device.
  65. Helferich,Richard J., Systems and methods for delivering information to a communication device.
  66. Helferich, Richard J., Systems and methods for downloading information to a mobile device.
  67. Helferich, Richard J., Systems and methods providing advertisements to a cell phone based on location and external temperature.
  68. Helferich, Richard J., Wireless messaging and content provision systems and methods.
  69. Helferich, Richard J., Wireless messaging system.
  70. Helferich, Richard J., Wireless messaging system.
  71. Helferich, Richard J., Wireless messaging systems and methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로