$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced cryptographic system and method with key escrow feature 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0802818 (1997-02-19)
발명자 / 주소
  • Sudia Frank Wells
출원인 / 주소
  • CertCo LLC
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 96  인용 특허 : 19

초록

The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern publ

대표청구항

[ What is claimed is:] [1.] A method for secure communication in a system having at least one communicating party and a message key that is recoverable by one not a party to the communication, the method comprising steps of:providing each user with a computer hardware device;registering hardware dev

이 특허에 인용된 특허 (19)

  1. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  2. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  3. Beller Michael J. (Red Bank NJ) Chang Li Fung (Holmdel NJ) Yacobi Yacov (Berkeley Heights NJ), Cryptographic method for key agreement and user authentication.
  4. Maurer Ueli (Wil CHX), Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without u.
  5. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  6. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  7. Foster Robert I. (Mesa AZ) Pfeifer Robert F. (Scottsdale AZ) Mihm ; Jr. Thomas J. (Mesa AZ), Hierarchical key management system.
  8. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  9. Matsuzaki Natsume (Minoo) Harada Shunji (Osaka) Tatebayashi Makoto (Osaka JPX), Method for generating a public key.
  10. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  11. Pinkas Denis (Chaville FRX) Caille Philippe (Gambais FRX), Method for obtaining a securitized cleartext attestation in a distributed data processing system environment.
  12. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  13. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Method to establish and enforce a network cryptographic security policy in a public key cryptosystem.
  14. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  15. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  16. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  17. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  18. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  19. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.

이 특허를 인용한 특허 (96)

  1. Kuroda, Yasutsugu; Yoshioka, Takashi; Ono, Etsuo, Apparatus and method for managing electronic original data.
  2. Godoroja Andrei,CAX ; Fawcett Glenn S.,CAX ; Tosey Joseph P. R.,CAX, Apparatus and methods for transmission security in a computer network.
  3. Uchida, Kaoru, Authentication executing device, portable authentication device, and authentication method using biometrics identification.
  4. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  5. Giniger, Michael L.; Hilton, Warren S., Automated operation and security system for virtual private networks.
  6. Benisti, Peter S; Bramson, Steven J; Chaltiel, Victor M. G.; Kantor, Philip A, Certified email system and method.
  7. Benisti, Peter S; Bramson, Steven J; Chaltiel, Victor M. G.; Kantor, Philip A, Certified email system and method.
  8. Benisti, Peter S; Bramson, Steven J; Chaltiel, Victor M. G.; Kantor, Philip A, Certified email system and method.
  9. Silverbrook, Kia; Walmsley, Simon Robert, Circuit for protecting chips against IDD fluctuation attacks.
  10. Cromer,Daryl Carvis; Ellison,Brandon Jon; Locker,Howard Jeffrey; Trotter,Andy Lloyd; Ward,James Peter, Computer system and method for generating a digital certificate.
  11. Chen,Liqun; Lo,Hoi Kwong; Chan,David, Computing apparatus and methods using secure authentication arrangements.
  12. Brandwine, Eric J., Conditioned use of certificates.
  13. Brandwine, Eric J., Conditioned use of certificates.
  14. Aerrabotu,Naveen; Tran,Phieu; Vogedes,Jerome, Contact validation and trusted contact updating in mobile wireless communications devices.
  15. Saito, Makoto, Controlling database copyrights.
  16. Saito, Makoto, Controlling database copyrights.
  17. Zimmermann Philip, Cryptographic system with methods for user-controlled message recovery.
  18. Zimmermann,Philip, Cryptographic system with methods for user-controlled message recovery.
  19. Saito, Makoto, Data copyright management.
  20. Saito, Makoto, Data copyright management system.
  21. Saito, Makoto, Data management.
  22. Saito, Makoto, Data management system.
  23. Saito, Makoto, Digital content management system and apparatus.
  24. Micali Silvio, Distributed split-key cryptosystem and applications.
  25. Daniel E. Geer, Jr. ; Henry R. Tumblin, Enabling business transactions in computer networks.
  26. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  27. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  28. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  29. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  30. Dahan, Andre; Thornbury, Tom; Harris, Steven Brian, Facilitating a transaction in electronic commerce.
  31. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  32. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  33. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  34. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  35. Felsher, David Paul, Information record infrastructure, system and method.
  36. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  37. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  38. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  39. Hillier Stephen William,CAX ; Dilkie Ramon Jonathan Lee,CAX ; Rosenquist Gerrard Eric,CAX, Method and apparatus for centralizing processing of key and certificate life cycle management.
  40. Holopainen,Yrj철, Method and apparatus for protecting software against unauthorized use.
  41. Paul C. Van Oorschot CA, Method and apparatus for public key management.
  42. Chen, Liqun; Proudler, Graeme John, Method and apparatus for using a secret in a distributed computing system.
  43. Robert T. Durst, Jr. ; Kevin D. Hunter, Method and system for accessing electronic resources via machine-readable data on intelligent documents.
  44. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  45. Shamsaasef, Rafie; Manglore, Geetha; Peterka, Petr; Medvinsky, Alexander, Method and system for providing third party authentication of authorization.
  46. Schutzer,Daniel, Method and system of transaction security.
  47. R��ver,Stefan; Groffman,Hans Dieter, Method for digital signing of a message.
  48. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  49. Medvinsky,Alexander, Method of preventing unauthorized distribution and use of electronic keys using a key seed.
  50. Leonard, Sean Joseph, Methods and systems for allocating and indicating trustworthiness of secure communications.
  51. Leonard, Sean Joseph, Methods and systems for encouraging secure communications.
  52. Leonard, Sean Joseph, Methods and systems for indicating trustworthiness of secure communications.
  53. Hoffberg, Steven M., Multifactorial optimization system and method.
  54. Day Michael David, Network discovery system and method.
  55. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  56. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  57. Röver, Stefan; Groffman, Hans-Dieter, Process for digital signing of a message.
  58. Strahm,Frederick William; Kunze,Aaron R., Processing internet protocol security traffic.
  59. Kablotsky,Joshua, Programmable processor supporting secure mode.
  60. Dickson, Bruce; Kaminsky, David Louis; Peters Stockton, Marcia Lambert, Protecting secret data entry from infrared and audio eavesdropping.
  61. Dickson, Bruce; Kaminsky, David Louis; Peters Stockton, Marcia Lambert, Protecting secret data entry from infrared and audio eavesdropping.
  62. Dickson,Bruce; Kaminsky,David Louis; Peters,Marcia Lambert, Protecting secret data entry from infrared and audio eavesdropping.
  63. Little, Herb A., Public key encryption with digital signature scheme.
  64. Little, Herb A., Public key encryption with digital signature scheme.
  65. Little, Herb A., Public key encryption with digital signature scheme.
  66. Little, Herbert Anthony, Public key encryption with digital signature scheme.
  67. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Routing secure element payment requests to an alternate application.
  68. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  69. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  70. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  71. Wall, Jonathan; von Behren, Rob, Secure reset of personal and service provider information on mobile devices.
  72. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  73. Roskind,James, Simple secure login with multiple-authentication providers.
  74. Roskind, James, Simple, secure login with multiple authentication providers.
  75. Roskind, James, Simple, secure login with multiple authentication providers.
  76. Dent Paul W., Symmetrically-secured electronic communication system.
  77. Hoffberg, Steven M., System and method for determining contingent relevance.
  78. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  79. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  80. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  81. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  82. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  83. Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
  84. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  85. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  86. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  87. Herbach, Jonathan; Kumar, Dharmendra, Systems and methods for controlling electronic document use.
  88. Herbach, Jonathan; Mehrotra, Chetan; Sharma, Varun; Islam, Shadkam, Systems and methods for controlling electronic document use.
  89. Oxford, William V.; Woodcock, III, Gerald E., Systems and methods for establishing and using distributed key servers.
  90. Thomas, James Gordon, Techniques for managing heterogeneous key stores.
  91. Murata, Kuniharu, Upgrade service system.
  92. Paulsen Gaige B. ; Walker Amanda, Virtual private network system and method.
  93. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Wallet application for interacting with a secure element application without a trusted server for authentication.
  94. Harris, Scott C., Wireless network having multiple communication allowances.
  95. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
  96. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로