$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced cryptographic system and method with key escrow feature 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0840227 (1997-04-11)
발명자 / 주소
  • Sudia Frank Wells
출원인 / 주소
  • CertCo LLC
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 136  인용 특허 : 0

초록

The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses a modern public key ce

대표청구항

[ What is claimed is:] [1.] A method for generating verifiably trusted communication among a plurality of users, comprising the steps of:escrowing at a trusted escrow center a plurality of secret asymmetric cryptographic keys to be used by a plurality of users;verifying each of said plurality of key

이 특허를 인용한 특허 (136)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Libin,Phil, Actuating a security system using a wireless device.
  3. Kang, Seong-min, Apparatus and method for reusing pair of public and private keys.
  4. Wang, Ynjiun P., Authorization firmware for conducting transactions with an electronic transaction system and methods therefor.
  5. Suarez, Luis A.; Kauer, Neil; Gray, Tim; Badia, David; Ahuja, Vijay, Automated key management system.
  6. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  7. Moses Timothy,CAX ; Vandergeest Ronald,CAX, Certificate management system and method for a communication security system.
  8. Micali, Silvio, Certificate revocation system.
  9. Micali, Silvio, Certificate revocation system.
  10. Hamann, Ernst-Michael; Kreyss, Jutta; Vasudevan, Narayanan, Certification of multiple keys with new base and supplementary certificate types.
  11. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  12. Wilt,Andrew N.; Kelly,Michael J., Cipher method and system for verifying a decryption of an encrypted user data key.
  13. Rich, Bruce Arland; Yarsa, Julianne; Shrader, Theodore Jack London; Skibbie, Donna, Composite keystore facility apparatus and method therefor.
  14. Yamashima, Masaki; Kawai, Osamu, Content management program, method and device.
  15. Yamashima, Masaki; Kawai, Osamu, Content management program, method and device.
  16. Matsushita, Tatsuyuki, Content providing system, user system, tracing system, apparatus, method and program.
  17. Matsushita, Tatsuyuki, Content providing system, user system, tracing system, apparatus, method, and program.
  18. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  19. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  20. Saito, Makoto, Controlling database copyrights.
  21. Saito, Makoto, Controlling database copyrights.
  22. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  23. Bieswanger, Andreas; Bolte, Dirk; Mayer, Carl; Pohl, Thomas; Troester, Martin, Controlling the configuration of computer systems.
  24. Bieswanger, Andreas; Bolte, Dirk; Mayer, Carl; Pohl, Thomas; Troester, Martin, Controlling the configuration of computer systems.
  25. Zheng, Yuliang; Kauer, Neil Kevin; Badia, David Victor, Cryptographic key backup and escrow system.
  26. Zheng, Yuliang; Kauer, Neil Kevin; Badia, David Victor, Cryptographic key backup and escrow system.
  27. Bjorn Vance, Cryptographic key generation using biometric data.
  28. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  29. Zimmermann,Philip, Cryptographic system with methods for user-controlled message recovery.
  30. Saito, Makoto, Data copyright management.
  31. Saito, Makoto, Data copyright management system.
  32. Saito, Makoto, Data management.
  33. Saito, Makoto, Data management system.
  34. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  35. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  36. Saito, Makoto, Digital content management system and apparatus.
  37. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  38. Engberg, David, Distributed delegated path discovery and validation.
  39. Micali Silvio, Distributed split-key cryptosystem and applications.
  40. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  41. Micali,Silvio, Efficient certificate revocation.
  42. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  43. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  44. Daniel E. Geer, Jr. ; Henry R. Tumblin, Enabling business transactions in computer networks.
  45. Geer ; Jr. Daniel E. ; Tumblin Henry R. ; Solomon Eliot M., Enabling business transactions in computer networks.
  46. Nakano,Toshihisa; Omori,Motoji; Tatebayashi,Makoto, Encrypted data delivery system.
  47. Nakano, Toshihisa; Omori, Motoji; Tatebayashi, Makoto, Encryption communications system.
  48. Feng,An; Minjarez,Frank, Enforcing data protection legislation in Web data services.
  49. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  50. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  51. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  52. Miyuki Enokida JP, Image processing apparatus, method, and system, and computer-readable storage medium having program stored therein.
  53. Olkin,Terry M.; Moreh,Jahanshah, Implementing nonrepudiation and audit using authentication assertions and key servers.
  54. Felsher, David Paul, Information record infrastructure, system and method.
  55. Zaverucha, Gregory Marc; Campagna, Matthew John, Intercepting key sessions.
  56. Frank, Alexander; Hall, Martin H.; Phillips, Thomas G., Isolated computing environment anchored into CPU and motherboard.
  57. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  58. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  59. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  60. Richard A. Stokes, Magnetic optical encryption/decryption disk drive arrangement.
  61. Tanaka, Toru; Taguchi, Yuichi; Yamamoto, Masayuki; Mizuno, Jun, Management method for archive system security.
  62. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  63. Holopainen,Yrj철, Method and apparatus for protecting software against unauthorized use.
  64. Duke,Andrew; Stephens,George, Method and apparatus for storing and updating information in a multi-cast system.
  65. Peterson, James C., Method and system for asymmetrically encrypting .ZIP files.
  66. Peterson, James C., Method and system for encryption of file characteristics of .ZIP files.
  67. Gulati, Sandeep, Method and system for facilitating opportunistic transactions using auto-probes.
  68. Peterson, James C., Method and system for mixed symmetric and asymmetric encryption of .ZIP files.
  69. Thorsen, Hans, Method and system for secure hardware provisioning.
  70. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  71. Peterson, James C., Method for strongly encrypting .ZIP files.
  72. Peterson, James C., Method for strongly encrypting .zip files.
  73. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  74. Asokan,Nadarajah; Ekberg,Jan Erik; Paatero,Lauri, Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device.
  75. Immonen,Olli; Asokan,Nadarajah; Markkanen,Panu S., Method, system and computer program product for secure ticketing in a communications device.
  76. Webb, Andrew Supplee; Peirce, Michael, Methods and systems for increasing the security of private keys.
  77. Webb, Andrew Supplee; Peirce, Michael, Methods and systems for increasing the security of private keys.
  78. Hoffberg, Steven M., Multifactorial optimization system and method.
  79. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  80. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  81. Belenky, Yaacov, Privacy-aware content protection system.
  82. Belenky, Yaacov, Privacy-aware content protection system.
  83. Kablotsky,Joshua, Programmable processor supporting secure mode.
  84. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  85. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  86. Mire,Philip Jason, Public key infrastructure utilizing master key encryption.
  87. Soppera, Andrea; Burbridge, Trevor; Tutsch, Chritian, Radio frequency identification devices and reader systems.
  88. Wilber,Scott A., Random number generator and generation method.
  89. Kahler, David Ray; Mathur, Anjul; Ripberger, Richard Anthony; Sheppard, Jacob Lee; Jaquette, Glen Alan, Redundant key server encryption environment.
  90. Kahler, David Ray; Mathur, Anjul; Ripberger, Richard Anthony; Sheppard, Jacob Lee; Jaquette, Glen Alan, Redundant key server encryption environment.
  91. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  92. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  93. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  94. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  95. Biddle, Peter N.; Ray, Kenneth D.; Ureche, Octavian T.; Holt, Erik, Secure data protection during disasters.
  96. Kerschbaum, Florian, Secure dissemination of events in a publish/subscribe network.
  97. Resch, Jason K.; Leggette, Wesley, Secure storage of secret data in a dispersed storage network.
  98. Kerschbaum, Florian; Sorniotti, Alessandro, Securing communications sent by a first user to a second user.
  99. Olkin,Terry M.; Moreh,Jahanshah, Security server system.
  100. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  101. Roskind,James, Simple secure login with multiple-authentication providers.
  102. Roskind, James, Simple, secure login with multiple authentication providers.
  103. Roskind, James, Simple, secure login with multiple authentication providers.
  104. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  105. Adams, Neil Patrick; Sibley, Richard Paul; Davis, Dinah Lea Marie; Singh, Ravi, Simplified multi-factor authentication.
  106. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  107. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  108. Hoffberg, Steven M., System and method for determining contingent relevance.
  109. Wang,Xin, System and method for document distribution.
  110. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  111. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  112. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  113. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  114. Bell, Robert T.; Dexter, Douglas Q., System and method for installing trust anchors in an endpoint.
  115. Gasparini, Louis A; Harris, William H, System and method for making accessible a set of services to users.
  116. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  117. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  118. Peterson, James C.; Peterson, Karen L.; Basin, Yuri; Beirne, Michael J., System and method for manipulating and managing computer archive files.
  119. Bell, Robert T.; Dexter, Douglas Q., System and method for obtaining a digital certificate for an endpoint.
  120. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  121. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  122. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  123. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  124. Nussbaum, Lawrence Edward; Thompson, Stephen, System and method for securing data.
  125. Wang,Xin, System and method for transferring the right to decode messages.
  126. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  127. Olkin,Terry M.; Moreh,Jahanshah, System for implementing business processes using key server events.
  128. Gruse, George Gregory; Dorak, Jr., Jonn J.; Milsted, Kenneth Louis, System for tracking end-user electronic content usage.
  129. Basin, Yuri; Beirne, Michael J.; Peterson, James C.; Peterson, Karen L., Systems and methods for manipulating and managing computer archive files.
  130. Basin, Yuri; Beirne, Michael J.; Peterson, James C.; Peterson, Karen L., Systems and methods for manipulating and managing computer archive files.
  131. Basin, Yuri; Beirne, Michael J; Peterson, James C; Peterson, Karen L, Systems and methods for manipulating and managing computer archive files.
  132. Brookner,George M., Technique for secure remote configuration of a system.
  133. Vishnu, Vardhan Itta; Puthali, H. B., Techniques for validating and sharing secrets.
  134. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  135. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  136. Murata, Kuniharu, Upgrade service system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로