$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced cryptographic system and method with key escrow feature 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0803024 (1997-02-19)
발명자 / 주소
  • Sudia Frank Wells
출원인 / 주소
  • CertCo LLC
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 85  인용 특허 : 23

초록

The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern publ

대표청구항

[ What is claimed is:] [1.] A method for generating verifiably trusted, stream-oriented communications among a plurality of users, comprising the steps of:escrowing at a trusted escrow center an asymmetric cryptographic key associated with each of a plurality of users;verifying each of the keys at t

이 특허에 인용된 특허 (23)

  1. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  2. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  3. Beller Michael J. (Red Bank NJ) Chang Li Fung (Holmdel NJ) Yacobi Yacov (Berkeley Heights NJ), Cryptographic method for key agreement and user authentication.
  4. Maurer Ueli (Wil CHX), Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without u.
  5. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  6. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  7. Hawe William R. (Pepperell MA) Tardo Joseph J. (Acton MA) Kaufman Charles W. (Northboro MA) Gupta Amar (Northboro MA) Spinney Barry A. (Wayland MA) Waters Gregory M. (Boston MA), Generic encryption technique for communication networks.
  8. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  9. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  10. Matsuzaki Natsume (Minoo) Harada Shunji (Osaka) Tatebayashi Makoto (Osaka JPX), Method for generating a public key.
  11. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  12. Pinkas Denis (Chaville FRX) Caille Philippe (Gambais FRX), Method for obtaining a securitized cleartext attestation in a distributed data processing system environment.
  13. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  14. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Method to establish and enforce a network cryptographic security policy in a public key cryptosystem.
  15. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  16. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  17. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  18. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  19. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  20. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  21. Perlman Radia (Acton MA), Robust data broadcast over a distributed network with malicious failures.
  22. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  23. Adelmann Harry W. (Neptune NJ) Tomcik James D. (Aberdeen NJ), Time stamp and packet virtual sequence numbering for reconstructing information signals from packets.

이 특허를 인용한 특허 (85)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Libin,Phil, Actuating a security system using a wireless device.
  3. Cuthbertson, Robert John, Apparatus and method for data matching and anonymization.
  4. Kato, Taku; Matsushita, Tatsuyuki; Nagai, Yuji; Zhao, Fangming, Authenticator, authenticatee and authentication method.
  5. Carnall, Murat, Call management in a telecommunications system.
  6. Shu,Li; Weinstein,William, Camouflage of network traffic to resist attack.
  7. Micali, Silvio, Certificate revocation system.
  8. Micali, Silvio, Certificate revocation system.
  9. Wilt,Andrew N.; Kelly,Michael J., Cipher method and system for verifying a decryption of an encrypted user data key.
  10. Takemori, Keisuke; Miyake, Yutaka; Tanaka, Toshiaki; Isohara, Takamasa; Sasase, Iwao, Communication system and security assurance device.
  11. Xia, Sharon; Muñoz, Eduardo; Brombaugh, Dan, Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys.
  12. Yamashima, Masaki; Kawai, Osamu, Content management program, method and device.
  13. Yamashima, Masaki; Kawai, Osamu, Content management program, method and device.
  14. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  15. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  16. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  17. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  18. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  19. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  20. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  21. Engberg, David, Distributed delegated path discovery and validation.
  22. Micali Silvio, Distributed split-key cryptosystem and applications.
  23. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  24. Micali,Silvio, Efficient certificate revocation.
  25. Zank Anthony E. ; Stevens David R., Electronic signature management system.
  26. Zank, Anthony E., Electronic signature security system.
  27. Bade, Steven A.; Dayka, John C.; Jaquette, Glen Alan; Guski, Richard Henry, Encrypted tape access control via challenge-response protocol.
  28. Gundavelli, Srinath; McNamee, David, Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key.
  29. Pellacuru,Chinna Narasimha Reddy, Facilitating secure communications among multicast nodes in a telecommunications network.
  30. Nanavati,Samir H.; Nanavati,Rajkumar, Identity verification method using a central biometric authority.
  31. Felsher, David Paul, Information record infrastructure, system and method.
  32. Bell, Robert T.; Kandasamy, Subbiah; Wing, Daniel G., Intercepting a communication session in a telecommunication network.
  33. Bell, Robert T.; Kandasamy, Subbiah; Wing, Daniel G., Intercepting a communication session in a telecommunication network.
  34. Uusitalo,Ilkka; Ahonen,Pasi; Blom,Rolf; Krister,Boman; N��slund,Mats, Lawful interception of end-to-end encrypted data traffic.
  35. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  36. Plotnikov, Igor; Sokolsky, Alexander; Herne, Michael L., Method and apparatus for accessing a computer behind a firewall.
  37. Srivastava, Sunil K.; Trostle, Jonathan; Bell, Raymond; Golla, Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  38. Srivastava,Sunil K.; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  39. Srivastava, Sunil K., Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure.
  40. Srivastava, Sunil K., Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure.
  41. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  42. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  43. Salowey, Joseph A., Method and apparatus for distributing, interpreting, and storing heterogeneous certificates in a homogenous public key infrastructure.
  44. Apostolopoulos, John; Wee, Susie, Method and apparatus for ensuring the integrity of data.
  45. Holopainen,Yrj철, Method and apparatus for protecting software against unauthorized use.
  46. Dan Harkins, Method and apparatus for regenerating secret keys in Diffie-Hellman communication sessions.
  47. Carbajal, John M.; Graunke, Gary; Rozas, Carlos, Method and apparatus for verifying the integrity of digital objects using signed manifests.
  48. Srivastava,Sunil K., Method and apparatus providing secure multicast group communication.
  49. Parrish, David L., Method and system for establishing secure communications using composite key cryptography.
  50. Parrish, David L., Method and system for establishing secure communications using composite key cryptography.
  51. Dabbish Ezzat A. ; Geiger Robert Lawrence ; Puhl Larry Charles, Method and system for hierarchical key access and recovery.
  52. Srivastava,Sunil K., Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach.
  53. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  54. Horn Gunther,DEX ; Muller Klaus,DEX ; Kessler Volker,DEX, Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N.
  55. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  56. Hoffberg, Steven M., Multifactorial optimization system and method.
  57. Srivastava,Sunil K., Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups.
  58. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  59. Srivastava,Sunil K., Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange.
  60. Kablotsky,Joshua, Programmable processor supporting secure mode.
  61. Xia, Sharon (Hong); Brombaugh, Dan, Proxy server security token authorization.
  62. Mire,Philip Jason, Public key infrastructure utilizing master key encryption.
  63. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  64. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  65. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  66. Biddle, Peter N.; Ray, Kenneth D.; Ureche, Octavian T.; Holt, Erik, Secure data protection during disasters.
  67. Whitten, Jon Marcus Randall; Sharpe, Tracy Clayton; Asmi, Yasser B.; Lange, Jonathan E.; Pirich, Christopher Michael; Thomason, Jonathan Gerald, Secure digital data format and code enforced policy.
  68. Liu, Gary G.; Cook, David P., Secure pipeline processing.
  69. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  70. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  71. Hoffberg, Steven M., System and method for determining contingent relevance.
  72. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  73. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  74. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  75. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  76. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  77. Harkins Dan, System and method for regenerating secret keys in diffie-hellman communication sessions.
  78. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  79. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  80. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  81. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  82. Boccon-Gibod, Gilles; Boeuf, Julien; Ellison, Gary F.; Maher, David P., Tethered device systems and methods.
  83. Boccon-Gibod, Gilles; Boeuf, Julien; Ellison, Gary F.; Maher, David P., Tethered device systems and methods.
  84. Boccon-Gibod, Gilles; Boeuf, Julien; Ellison, Gary F.; Maher, David P., Tethered device systems and methods.
  85. Murata, Kuniharu, Upgrade service system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로