$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Multi-step digital signature method and system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0869253 (1997-06-04)
발명자 / 주소
  • Sudia Frank W.
  • Freund Peter C.
  • Huang Stuart T.F.
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 279  인용 특허 : 5

초록

A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device possesses a share of the signature key and affixes a partial signature in response to authorization from a plurality of a

대표청구항

[ What is claimed is:] [1.] A digital signing method comprising steps of:generating shares of a private signature key;storing shares in separate electronic signing devices;certifying multiple authorizing agents for signing devices; andfor each of a plurality of signing devices, affixing a partial si

이 특허에 인용된 특허 (5)

  1. Ford Warwick S. (Nepean CAX) Wiener Michael J. (Nepean CAX), Computer network cryptographic key distribution system.
  2. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  3. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  4. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Method to establish and enforce a network cryptographic security policy in a public key cryptosystem.
  5. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.

이 특허를 인용한 특허 (279)

  1. Fiske, Michael Stephen, API for a system having a passcode authenticator.
  2. Struik, Marinus, Accelerated verification of digital signatures and public keys.
  3. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  4. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  5. Struik, Marinus; Brown, Daniel R.; Vanstone, Scott A.; Gallant, Robert P.; Antipa, Adrian; Lambert, Robert J., Accelerated verification of digital signatures and public keys.
  6. Libin, Phil; Micali, Silvio, Access control.
  7. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  8. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  9. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  10. Libin,Phil, Actuating a security system using a wireless device.
  11. Minogue, David; Tucker, Paul A., Agent rank.
  12. Minogue, David; Tucker, Paul A., Agent rank.
  13. Minogue, David; Tucker, Paul A., Agent rank.
  14. Minogue, David; Tucker, Paul A., Agent rank.
  15. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  16. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  17. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  18. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  19. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  20. Nilsen, B.o slashed.rge, Arrangement in a data communication system.
  21. Sandhu, Ravinderpal Singh; Schoppert, Brett Jason; Ganesan, Ravi; Bellare, Mihir; deSa, Colin Joseph, Asymmetric crypto-graphy with rolling key security.
  22. Grawrock,David W., Attestation using both fixed token and portable token.
  23. Perlman Radia Joy ; Hanna Stephen R., Authentication system and process.
  24. Corella,Francisco, Authorization infrastructure based on public key cryptography.
  25. Follis, Benjamin D., Automatic E-signatures in response to conditions and/or events.
  26. Follis, Benjamin D., Automatic E-signatures in response to conditions and/or events.
  27. Fiske, Michael S.; Louis, Jon, Biometric print quality assurance.
  28. Damale, Shridhar, Capturing and replaying application sessions using resource files.
  29. Damale, Shridhar, Capturing and replaying application sessions using resource files.
  30. Micali, Silvio, Certificate revocation system.
  31. Micali, Silvio, Certificate revocation system.
  32. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  33. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  34. Grawrock,David W., Connecting a virtual token to a physical token.
  35. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  36. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  37. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  38. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  39. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  40. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  41. Grawrock,David W., Creation and distribution of a secret value between two devices.
  42. Frankel, Yair; Montgomery, Charles T.; Yung, Marcel M., Cryptographic control and maintenance of organizational structure and functions.
  43. Vanstone Scott A,CAX, Data card verification system.
  44. Vanstone, Scott A., Data card verification system.
  45. Vanstone, Scott A., Data card verification system.
  46. Vanstone, Scott A., Data card verification system.
  47. Vanstone, Scott Alexander, Data card verification system.
  48. Vanstone,Scott A, Data card verification system.
  49. De Boursetty, Benoît; Frisch, Laurent; Mouton, Dimitri, Delegation of electronic signature by multi-agent cryptography.
  50. Fiske, Michael Stephen, Determining whether to grant access to a passcode protected system.
  51. Terao,Taro; Kakehi,Rumiko, Device and method for authenticating user's access rights to resources.
  52. Hisashi Nakatsuyama JP, Device for verifying use qualifications.
  53. Kakehi, Rumiko, Digital signature computer, system, method, and storage medium storing program for collectively affixing signature to plurality of messages.
  54. Kinnis, Tony F.; Sit, Ho Wing, Digital signature service.
  55. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  56. Engberg, David, Distributed delegated path discovery and validation.
  57. Horita,Eiichi; Ono,Satoshi, Distributed digital signature generation method and digitally signed digital document generation method and apparatus.
  58. Zhu, Bin Benjamin; Feng, Min, Distributed single sign on technologies including privacy protection and proactive updating.
  59. Han, Shocky; Ku, Pon Chun, Document authentication using electronic signature.
  60. Follis, Benjamin D., Document distribution and interaction.
  61. Kumar, Divij; Saxena, Neha; Pandey, Aditya Kumar; Dang, Nikhil; Jain, Pulkit, Document distribution and interaction.
  62. Saxena, Neha; Kumar, Divij; Pandey, Aditya Kumar, Document distribution and interaction.
  63. Saxena, Neha; Kumar, Divij; Pandey, Aditya Kumar, Document distribution and interaction with delegation of signature authority.
  64. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  65. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  66. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  67. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  68. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  69. Micali,Silvio, Efficient certificate revocation.
  70. Kitaori Shoji,JPX ; Koganezawa Yuichi,JPX, Electronic signature addition method, electronic signature verification method, and system and computer program product.
  71. Saxena, Neha; Kumar, Divij; Pandey, Aditya Kumar, Electronic signature framework with enhanced security.
  72. Kamijo, Koichi, Encrypted communication for selectively delivering a message to multiple decrypting devices.
  73. Kamijo, Koichi, Encrypted communication for selectively delivering a message to multiple decrypting devices.
  74. Roskind, James A., Establishing historical usage-based hardware trust.
  75. Roskind, James A., Establishing historical usage-based hardware trust.
  76. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  77. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  78. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  79. Wendt, Barry; Brown, Jeffry R.; LaCous, Mira Kristina; Zarn, Gary Lawrence, Image identification system.
  80. Felsher, David Paul, Information record infrastructure, system and method.
  81. Fiske, Michael S., Interfacing with a system that includes a passcode authenticator.
  82. Corella,Francisco, Lightweight public key infrastructure employing unsigned certificates.
  83. Tolfmans, Joakim, Locating cryptographic keys stored in a cache.
  84. Tolfmans, Joakim, Locating cryptographic keys stored in a cache.
  85. Tolfmans, Joakim, Locating cryptographic keys stored in a cache.
  86. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  87. Bernsen, Johannes Arnoldus Cornelis; Staring, Antonius Adriaan Maria, Management of group secrets by group members.
  88. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  89. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  90. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  91. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  92. Cheng, Ken-Shin; Cheng, Ting; Plachy, Emily; Long, John, Managing electronic documents utilizing a digital seal.
  93. Crawford,Timothy J.; Hunt,Brandon L.; Rinaldi,Brian A.; Ripberger,Richard A., Managing virtual server control of computer support systems with heartbeat message.
  94. Goldshlag, David Moshe; Kravitz, David William, Manufacturing trusted devices.
  95. Johnson, Donald B.; Vanstone, Scott A.; Ou, Minghua, Masked digital signatures.
  96. Johnson,Donald B.; Vanstone,Scott A.; Ou,Minghua, Masked digital signatures.
  97. Vanstone, Scott Alexander; Johnson, Donald B.; Qu, Minghua, Masked digital signatures.
  98. Vanstone, Scott Alexander; Johnson, Donald B.; Qu, Minghua, Masked digital signatures.
  99. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  100. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  101. LaCous,Mira Kristina, Match template protection within biometric security systems.
  102. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  103. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  104. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  105. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  106. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  107. Baxter, Samuel C.; Colson, Thomas J., Method and apparatus for collecting electronic signatures.
  108. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  109. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  110. Smith ; Sr. Ronald M. ; D'Avignon Edward J. ; DeBellis Robert S. ; Easter Randall J. ; Green Lucina L. ; Kelly Michael J. ; Spano Vincent A. ; Yeh Phil Chi-Chung, Method and apparatus for controlling the configuration of a cryptographic processor.
  111. Keim,Reiner; R��βler,George; Rottloff,Mario, Method and apparatus for distinguishing the origin of operator inputs in electronic control systems and printing machine having the apparatus.
  112. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  113. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  114. Powell, Travis Spence; Caspi, Nadav; Wenig, Robert I.; Herda, Wolf; Dietrich, Gerard, Method and apparatus for generating privacy profiles.
  115. Powell, Travis Spence; Caspi, Nadav; Singhania, Ashwin; Wenig, Robert I., Method and apparatus for intelligent capture of document object model events.
  116. Powell, Travis Spence; Caspi, Nadav; Singhania, Ashwin; Wenig, Robert I., Method and apparatus for intelligent capture of document object model events.
  117. Powell, Travis Spence; Caspi, Nadav; Singhania, Ashwin; Wenig, Robert I., Method and apparatus for intelligent capture of document object model events.
  118. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  119. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  120. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  121. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  122. Pezeshki, Farhad; Lambert, Robert J., Method and apparatus for minimizing differential power attacks on processors.
  123. Pezeshki, Farhad; Lambert, Robert J., Method and apparatus for minimizing differential power attacks on processors.
  124. Pezeshki, Farhad; Lambert, Robert J., Method and apparatus for minimizing differential power attacks on processors.
  125. Pezeshki, Farhad; Lambert, Robert John, Method and apparatus for minimizing differential power attacks on processors.
  126. Pezeshki, Farhad; Lambert, Robert John, Method and apparatus for minimizing differential power attacks on processors.
  127. Wenig, Robert; Dawes, John; Berkley, John; Gettier, Al; Saathoff, Kirk; Herda, Wolf; Austin, Paul; Knudsen, Ted, Method and apparatus for monitoring and synchronizing user interface events with network data.
  128. Wenig, Robert; Dawes, John; Berkley, John; Gettier, Al; Saathoff, Kirk; Herda, Wolf; Austin, Paul; Knudsen, Ted, Method and apparatus for monitoring and synchronizing user interface events with network data.
  129. Guevin, Thomas F.; Thakkar, Sohil Babubhai; Compton, Duane Charles; Foy, Patrick Joseph, Method and apparatus for network access control.
  130. Epstein, Michael A.; Pasieka, Michael S., Method and apparatus for secure distribution of public/private key pairs.
  131. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  132. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  133. Jacobs, Stuart J.; Mannix, Jr., Francis Leo; Christoffel, Thomas William; Belgard, Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  134. Jacobs,Stuart J.; Mannix, Jr.,Francis Leo; Christoffel,Thomas William; Belgard,Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  135. Cordasco, Matthew, Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions.
  136. Wenig, Robert; Knudsen, Ted, Method and system for communication between a client system and a server system.
  137. Madhusudhana,Honnuduke S.; Nagaraj,Shishir; Tripathi,Aridaman, Method and system for enhancing network security using a multilateral authorization mechanism.
  138. Dare, Peter R.; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  139. Dare, Peter R.; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  140. Dare, Peter Roy; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  141. Dare, Peter Roy; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  142. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  143. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  144. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  145. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  146. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  147. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  148. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  149. Andrews, Richard F.; Huang, Zhiyong; Ruan, Tom Qi Xiong, Method and system of securely escrowing private keys in a public key infrastructure.
  150. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  151. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  152. Wells, Bill; Wilder, Richard, Method for downloading data to gaming devices.
  153. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  154. Pauschinger Dieter,DEX, Method for operating a digitally printing postage meter to generate and check a security imprint.
  155. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  156. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  157. Gertner, Dmitry Aleksandrovich, Method for signing electronic documents with an analog-digital signature with additional verification.
  158. Lambert, Robert J., Method for strengthening the implementation of ECDSA against power analysis.
  159. Lambert, Robert J., Method for strengthening the implementation of ECDSA against power analysis.
  160. Lambert, Robert J., Method for strengthening the implementation of ECDSA against power analysis.
  161. Brickell,Ernie F., Method of confirming a secure key exchange.
  162. Fiske, Michael, Method of generating access keys.
  163. Cirulli, Susan B.; Jhingan, Nitin; Kofkee, Andrew; Oswald, James G. L., Method, system, and program storage device for processing electronic requisitions.
  164. Royer, Coby, Methods and apparatus for credential validation.
  165. Royer, Coby, Methods and apparatus for credential validation.
  166. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  167. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Methods used in a mass storage device with automated credentials loading.
  168. Sudia, Frank W.; Freund, Peter C.; Huang, Stuart T. F., Multi-step digital signature method and system.
  169. Grawrock,David W., Multi-token seal and unseal.
  170. Hoffberg, Steven M., Multifactorial optimization system and method.
  171. Sandhu, Ravinderpal Singh; Schoppert, Brett Jason; Ganesan, Ravi; Bellare, Mihir; deSa, Colin Joseph, Multiple factor private portion of an asymmetric key.
  172. Juels, Ari; Brainard, John G.; Hopley, Robert Damon, On-demand proactive epoch control for cryptographic devices.
  173. Cardasco, Matthew, On-page manipulation and real-time replacement of content.
  174. Fiske, Michael Stephen, One-time passcodes with asymmetric keys.
  175. Greene, David; Mierzwa, Dennis; Abukhater, Ayman; Sievert, Michael, Online trading system having real-time account opening.
  176. Greene, David; Mierzwa, Dennis; Abukhater, Ayman; Sievert, Michael, Online trading system having real-time account opening.
  177. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, III, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  178. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kägi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  179. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  180. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  181. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  182. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  183. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  184. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  185. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  186. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  187. Dasari, Shiva R.; Gundam, Raghuswamyreddy, Preventing a rollback attack in a computing system that includes a primary memory bank and a backup memory bank.
  188. Paya, Cem; Benaloh, Josh, Prevention of unauthorized forwarding and authentication of signatures.
  189. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  190. Miyazaki, Kunihiko; Takaragi, Kazuo; Fukuzawa, Yasuko, Processing apparatus, program, or system of secret information.
  191. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  192. Fiske, Michael Stephen, Protecting codes, keys and user credentials with identity and patterns.
  193. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  194. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  195. Corella,Francisco, Public key validation service.
  196. Wilber, Scott A., Random number generator and generation method.
  197. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  198. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  199. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  200. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  201. Wenig, Robert I.; Saathoff, Kirk R.; Gettier, Albert F., Replaying captured network interactions.
  202. Wenig, Robert I.; Saathoff, Kirk R.; Gettier, Albert F., Replaying captured network interactions.
  203. Sandhu, Ravinderpal Singh; Schoppert, Brett Jason; Ganesan, Ravi; Bellare, Mihir; deSa, Colin Joseph, Roaming utilizing an asymmetric key pair.
  204. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  205. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  206. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  207. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  208. Jackson, Todd; Bunner, Andrew A.; Steiner, Matthew S.; Pongsajapan, John; Chen, Annie Tsung-I; Coleman, Keith J.; Ho, Edward S.; McBride, Sean E.; Cheng, Jessica Shih-Lan, Scoring authors of posts.
  209. Guha, Ramanathan V., Search result ranking based on trust.
  210. Guha, Ramanathan V., Search result ranking based on trust.
  211. Saito, Tamio; Drizin, Wayne; Aida, Takashi, Secure biometric verification of identity.
  212. Saito,Tamio; Drizin,Wayne; Aida,Takashi, Secure biometric verification of identity.
  213. Okumura, Kenneth K.; Simpson, Garret L.; Paul, Jason N.; Le, Binh P., Secure mapping and aliasing of private keys used in public key cryptography.
  214. Michael A. Epstein, Secure proxy signing device and method of use.
  215. Barnes, James W.; Alle, Vasantha K.; Patel, Devang; Wilson, Ryan R., Securing displayed information.
  216. Sandhu, Ravinderpal Singh; Schoppert, Brett Jason; Ganesan, Ravi; Bellare, Mihir; deSa, Colin Joseph, Securing multifactor split key asymmetric crypto keys.
  217. Fiske, Michael, Setting up a security access system.
  218. Obana,Satoshi, Signature calculation system by use of mobile agent.
  219. B. Gentry, Craig, Signature schemes using bilinear mappings.
  220. Gentry, Craig B., Signature schemes using bilinear mappings.
  221. Gentry, Craig B., Signature schemes using bilinear mappings.
  222. Gentry, Craig B., Signature schemes using bilinear mappings.
  223. Grawrock,David W.; Poisner,David I., Sleep protection.
  224. Saito, Tamio, Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport.
  225. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  226. Cirulli,Susan B.; Jhingan,Nitin; Kofkee,Andrew; Oswald,James, Synchronous electronic requisition processing methods.
  227. Sandhu,Ravi; deSa,Colin; Ganesan,Karuna, System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys.
  228. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  229. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  230. Hoffberg, Steven M., System and method for determining contingent relevance.
  231. Wenig Robert ; Tsyganskiy Igor, System and method for encrypting audit information in network applications.
  232. Roskind, James A., System and method for establishing historical usage-based hardware trust.
  233. Roskind, James A., System and method for establishing historical usage-based hardware trust.
  234. Roskind, James A., System and method for establishing historical usage-based hardware trust.
  235. Roskind,James A., System and method for establishing historical usage-based hardware trust.
  236. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  237. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  238. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  239. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  240. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  241. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  242. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  243. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  244. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  245. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  246. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  247. Sandhu,Ravi; deSa,Colin; Ganesan,Karuna, System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions.
  248. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  249. Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
  250. Whyte, William, System and method for processing a shared secret.
  251. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  252. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  253. Audebert,Yves; Wen,Wu, System and method for secure replacement of high level cryptographic keys in a personal security device.
  254. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  255. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  256. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  257. Silberman, Joshua; Subramanian, Ananthan; Okushi, Fumiaki, System and method for signing a message to provide one-time approval to a plurality of parties.
  258. Komura Masahiro,JPX ; Ono Etsuo,JPX ; Kuroda Yasutsugu,JPX ; Torii Satoru,JPX, System and method of authentication of digital information.
  259. Little, Herbert Anthony; Clark, David; Owen, Russell Norman; Totzke, Scott William; Adams, Neil Patrick; Brown, Michael Stephen, System and method of installing software applications on electronic devices.
  260. Hernandez, Omar; Singh, Sukhbir; Phadnis, Neel, System for capturing and replaying screen gestures.
  261. Fiske, Michael, System for generating requests to a passcode protected entity.
  262. Wenig, Robert I.; Punjabi, Manoj; Townsend, Geoff, System identifying and inferring web session events.
  263. Wenig, Robert; Tsyganskiy, Igor; Landry, Kenneth, Systems and methods for recording and visually recreating sessions in a client-server environment.
  264. Unagami, Yuji; Futa, Yuichi; Matsuzaki, Natsume; Shizuya, Hiroki; Isobe, Shuji; Umeta, Atsushi, Tampering monitoring system, management device, protection control module, and detection module.
  265. Eskicioglu,Ahmet, Threshold cryptography scheme for conditional access systems.
  266. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  267. Follis, Benjamin D., Tracking and notification of fulfillment events.
  268. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  269. LaCous,Mira, Trusted biometric device.
  270. Grawrock, David, Trusted platform module for generating sealed data.
  271. Poisner,David I., Trusted system clock.
  272. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  273. Brown, Michael Kenneth; Gutoski, Gustav Michael; Struik, Marinus; Yamada, Atsushi, Using a secret generator in an elliptic curve cryptography (ECC) digital signature scheme.
  274. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  275. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  276. Zaverucha, Gregory Marc, Verifying implicit certificates and digital signatures.
  277. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  278. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  279. Cordasco, Matthew, Visualization of website analytics.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로