$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced cryptographic system and method with key escrow feature

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0802584 (1997-02-19)
발명자 / 주소
  • Sudia Frank Wells
출원인 / 주소
  • CertCo LLC
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 69  인용 특허 : 19

초록

The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern publ

대표청구항

[ What is claimed is:] [1.] A method for generating a verifiably trusted communication between a plurality of users comprising the steps of:generating a secure communication within an electronic hardware device of a first user, said secure communication including access information to permit access

이 특허에 인용된 특허 (19)

  1. Davis Derek L. (Phoenix AZ), Apparatus and method for providing secured communications.
  2. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  3. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  4. Beller Michael J. (Red Bank NJ) Chang Li Fung (Holmdel NJ) Yacobi Yacov (Berkeley Heights NJ), Cryptographic method for key agreement and user authentication.
  5. Maurer Ueli (Wil CHX), Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without u.
  6. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  7. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  8. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  9. Matsuzaki Natsume (Minoo) Harada Shunji (Osaka) Tatebayashi Makoto (Osaka JPX), Method for generating a public key.
  10. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  11. Pinkas Denis (Chaville FRX) Caille Philippe (Gambais FRX), Method for obtaining a securitized cleartext attestation in a distributed data processing system environment.
  12. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  13. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Method to establish and enforce a network cryptographic security policy in a public key cryptosystem.
  14. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  15. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  16. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  17. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  18. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  19. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.

이 특허를 인용한 특허 (69)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Libin,Phil, Actuating a security system using a wireless device.
  3. Benjamin K. Gibbs, Apparatus and method for an authenticated electronic userid.
  4. Howard ; Jr. James L. ; Hess Pennington J. ; MacStravic James A., Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  5. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  6. Wyatt, David A., Arrangements for initialization-time and run-time integration of firmware and software extensions for supporting add-in hardware.
  7. Choi, Wai F.; Sweeny, James W., Automatic root key rollover during digital signature verification.
  8. Micali, Silvio, Certificate revocation system.
  9. Micali, Silvio, Certificate revocation system.
  10. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  11. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  12. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  13. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  14. Engberg, David, Distributed delegated path discovery and validation.
  15. Micali Silvio, Distributed split-key cryptosystem and applications.
  16. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  17. Micali,Silvio, Efficient certificate revocation.
  18. Bade, Steven A.; Dayka, John C.; Jaquette, Glen Alan; Guski, Richard Henry, Encrypted tape access control via challenge-response protocol.
  19. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  20. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  21. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  22. Nanavati, Samir H.; Nanavati, Rajkumar H., Identity verification method using a central biometric authority.
  23. Nanavati,Samir H.; Nanavati,Rajkumar, Identity verification method using a central biometric authority.
  24. Miyuki Enokida JP, Image processing apparatus, method, and system, and computer-readable storage medium having program stored therein.
  25. Felsher, David Paul, Information record infrastructure, system and method.
  26. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system with verification by comparison.
  27. Itkis,Yevgeny Yakov (Gene), Key management for content protection.
  28. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  29. Gibbs, Benjamin K., Method and apparatus for an adapted digital signature.
  30. Li, Zhiguo, Method and apparatus for establishing communication between mobile terminals, incoming communication control and outgoing communication control and system by use thereof.
  31. Holopainen,Yrj철, Method and apparatus for protecting software against unauthorized use.
  32. Goldstein Gary Allan ; Sumner Terence Edward, Method and system for securely transferring a data set in a data communications system.
  33. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  34. Ober Timothy ; Reed Peter, Method of implementing a key recovery system.
  35. Ober, Timothy; Reed, Peter, Method of implementing a key recovery system.
  36. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  37. Asokan,Nadarajah; Ekberg,Jan Erik; Paatero,Lauri, Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device.
  38. Immonen,Olli; Asokan,Nadarajah; Markkanen,Panu S., Method, system and computer program product for secure ticketing in a communications device.
  39. Hoffberg, Steven M., Multifactorial optimization system and method.
  40. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  41. Sakuma, Jun; Uramoto, Naohiko, Program, classification method and system.
  42. Kablotsky,Joshua, Programmable processor supporting secure mode.
  43. Little, Herb A., Public key encryption with digital signature scheme.
  44. Little, Herb A., Public key encryption with digital signature scheme.
  45. Little, Herb A., Public key encryption with digital signature scheme.
  46. Little, Herbert Anthony, Public key encryption with digital signature scheme.
  47. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  48. Lord, Robert B.; Hayes, Terry N.; Uberti, Justin, Secure instant messaging system.
  49. Lord, Robert B.; Hayes, Terry N.; Uberti, Justin, Secure instant messaging system.
  50. Lord, Robert B.; Hayes, Terry N.; Uberti, Justin, Secure instant messaging system.
  51. Lord, Robert B.; Hayes, Terry N; Ubertin, Justin, Secure instant messaging system.
  52. Lord,Robert B.; Hayes,Terry N.; Uberti,Justin, Secure instant messaging system.
  53. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  54. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  55. Hoffberg, Steven M., System and method for determining contingent relevance.
  56. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  57. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  58. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  59. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  60. Wyatt,David A., System and method for loading and integrating a firmware extension onto executable base system firmware during initialization.
  61. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  62. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  63. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  64. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  65. Belgaied, Kais; Powers, Mark C.; Yenduri, Bhargava K.; Johnson, Darrin P., Tracking of resource utilization during cryptographic transformations.
  66. Gibbs Benjamin K. ; Roeder G. R. Konrad, Unique digital signature.
  67. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  68. Murata, Kuniharu, Upgrade service system.
  69. Sueyoshi,Masahiro; Kubono,Fumio; Tateno,Kei, Version management system for multiple application elements.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트