$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced cryptographic system and method with key escrow feature 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0802603 (1997-02-19)
발명자 / 주소
  • Sudia Frank Wells
출원인 / 주소
  • Certco LLC
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 313  인용 특허 : 22

초록

The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern publ

대표청구항

[ What is claimed is:] [12.] A method of upgrading firmware of a trusted device, comprising the steps of:embedding a public signature verification key of a trusted entity in the trusted device;issuing a certificate for a cryptographic key of a third-party firmware source;receiving a communication of

이 특허에 인용된 특허 (22)

  1. Arnold Terry Sutton, Apparatus and method for establishing a cryptographic link between elements of a system.
  2. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  3. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  4. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  5. Beller Michael J. (Red Bank NJ) Chang Li Fung (Holmdel NJ) Yacobi Yacov (Berkeley Heights NJ), Cryptographic method for key agreement and user authentication.
  6. Maurer Ueli (Wil CHX), Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without u.
  7. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  8. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  9. Matyas Stephen M. (Kingston NY), Initialization of cryptographic variables in an EFT/POS network with a large number of terminals.
  10. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  11. Cooper Gerald M. (Gretna VA), Method and apparatus for feature authorization and software copy protection in RF communications devices.
  12. Matsuzaki Natsume (Minoo) Harada Shunji (Osaka) Tatebayashi Makoto (Osaka JPX), Method for generating a public key.
  13. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  14. Pinkas Denis (Chaville FRX) Caille Philippe (Gambais FRX), Method for obtaining a securitized cleartext attestation in a distributed data processing system environment.
  15. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  16. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Method to establish and enforce a network cryptographic security policy in a public key cryptosystem.
  17. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  18. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  19. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  20. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  21. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  22. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.

이 특허를 인용한 특허 (313)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  6. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  7. Libin, Phil; Micali, Silvio, Access control.
  8. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  11. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  12. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  13. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  14. Fan, Xiaobo; Hennecke, Mark D.; Heath, Taliver Brooks, Accurate power allotment.
  15. Barrus, John W.; Savitzky, Stephen R.; Piersol, Kurt Wesley, Action stickers for identifying and processing stored documents.
  16. Barrus,John; Piersol,Kurt Wesley, Action stickers for nested collections.
  17. Libin,Phil, Actuating a security system using a wireless device.
  18. Vanderpol, Mathew L.; Borowski, Kyle A., Anti-tamper device, system, method, and computer-readable medium.
  19. Brosnan, Bill, Apparatus and method for copying gaming machine configuration settings.
  20. Das Purkayastha,Arindam; Pearson,Siani Lynne; Chen,Liqun, Apparatus and method for establishing trust.
  21. Lee, Byung-rae; Kim, Tae-sung; Jung, Kyung-im; Oh, Yun-sang; Kim, Shin-han, Apparatus and method for moving and copying rights objects between device and portable storage device.
  22. de Jong,Eduard, Apparatus for private personal identification number management.
  23. Delker, Jason R.; Everson, John M.; Norris, James W.; Ross, Carol A.; Whitney, Jason K., Application single sign on leveraging virtual local area network identifier.
  24. Churchill,Thomas; Connelly,John Patrick; Boyd,Eric; Panchapakesan,Venkat; Godin,Seth; Sohn,Henry Hyunsuk; Conway,David, Auction redemption system and method.
  25. Corella,Francisco, Authorization infrastructure based on public key cryptography.
  26. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  27. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Bitstream confirmation for configuration of a programmable logic device.
  28. Balasubramanian, Balagurunathan; Himawan, Rudi; Jayaraman, Hemanth; Kuruvalli, Bharath N.; Marshall, Stephen L., Call center dashboard.
  29. Shu,Li; Weinstein,William, Camouflage of network traffic to resist attack.
  30. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  31. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  32. Micali, Silvio, Certificate revocation system.
  33. Micali, Silvio, Certificate revocation system.
  34. Wilt,Andrew N.; Kelly,Michael J., Cipher method and system for verifying a decryption of an encrypted user data key.
  35. D'Souza, Roy Peter; Pandey, Omkant, Cloud key directory for federating data exchanges.
  36. D'Souza, Roy Peter; Pandey, Omkant, Cloud key directory for federating data exchanges.
  37. D'Souza, Roy Peter; Pandey, Omkant, Cloud key directory for federating data exchanges.
  38. D'Souza, Roy Peter; Pandey, Omkant, Cloud key directory for federating data exchanges.
  39. D'Souza, Roy Peter; Pandey, Omkant, Cloud key directory for federating data exchanges.
  40. D'Souza, Roy Peter; Pandey, Omkant, Cloud key escrow system.
  41. D'Souza, Roy Peter; Pandey, Omkant, Cloud key escrow system.
  42. D'Souza, Roy Peter; Pandey, Omkant, Cloud key escrow system.
  43. Circenis, Edgar I.; Klein, Bradley A., Codeword-based auditing of computer systems and methods therefor.
  44. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Computer and data center load determination.
  45. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Computer and data center load determination.
  46. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Computer and data center load determination.
  47. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  48. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  49. Dickinson, Alexander G; Berger, Brian; Dobson, Robert T, Context sensitive dynamic authentication in a cryptographic system.
  50. Dickinson,Alexander G.; Berger,Brian; Dobson, Jr.,Robert T., Context sensitive dynamic authentication in a cryptographic system.
  51. Feil, Stephan, Control of access to a secondary system.
  52. Feil, Stephan, Control of access to a secondary system.
  53. Feil, Stephan, Control of access to a secondary system.
  54. Krieger, Ken; Borchers, Albert, Controlling access to a power supply memory.
  55. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  56. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  57. Saito, Makoto, Controlling database copyrights.
  58. Saito, Makoto, Controlling database copyrights.
  59. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  60. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  61. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  62. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  63. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  64. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  65. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  66. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  67. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  68. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  69. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Cryptographic device with resistance to differential power analysis and other external monitoring attacks.
  70. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  71. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  72. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  73. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  74. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  75. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  76. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Data center load monitoring for utilizing an access power amount based on a projected peak power usage and a monitored power usage.
  77. Whitted, William; Sykora, Montgomery; Krieger, Ken; Jai, Benchiao; Hamburgen, William; Clidaras, Jimmy; Beaty, Donald L.; Aigner, Gerald, Data center uninterruptible power distribution architecture.
  78. Whitted, William; Sykora, Montgomery; Krieger, Ken; Jai, Benchiao; Hamburgen, William; Clidaras, Jimmy; Beaty, Donald L.; Aigner, Gerald, Data center uninterruptible power distribution architecture.
  79. Yamaguchi,Takao; Kamogawa,Akira; Etoh,Minoru; Sato,Junichi; Itoh,Tomoaki, Data connecting method, data connecting apparatus, program recording medium.
  80. Saito, Makoto, Data copyright management.
  81. Saito, Makoto, Data copyright management system.
  82. Saito, Makoto, Data management.
  83. Saito, Makoto, Data management system.
  84. Chan, Hark C., Decryption and decompression based audio system.
  85. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Detection of data tampering of encrypted data.
  86. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  87. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  88. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  89. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  90. Saito, Makoto, Digital content management system and apparatus.
  91. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Digital content protection method and apparatus.
  92. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  93. Engberg, David, Distributed delegated path discovery and validation.
  94. Barrus, John W.; Wolff, Gregory J.; Piersol, Kurt Wesley; Rhodes, Bradly; Savitzky, Stephen R., Document collection manipulation.
  95. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  96. Micali,Silvio, Efficient certificate revocation.
  97. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  98. Awada,Faisal M.; Brown,Joe Nathan; Burkes,Philip Bernard, Electronic mail distribution network implementation for safeguarding sender's address book covering addressee aliases with minimum interference with normal electronic mail transmission.
  99. Scheidt,Edward M., Encryption process including a biometric unit.
  100. Feng,An; Minjarez,Frank, Enforcing data protection legislation in Web data services.
  101. Kosaraju, Ravi K.; Pagan, William G., Enhanced privacy caller identification system.
  102. Brunswig, Frank; Tiple, Abhay, Enterprise verification and certification framework.
  103. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  104. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  105. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  106. Pyle, Harry S.; Lieberman, Bruce Louis; Simon, Daniel R.; Simonnet, Guillaume; Dollar, William, Establishing secure mutual trust using an insecure password.
  107. Pyle, Harry S.; Lieberman, Bruce Louis; Simon, Daniel R.; Simonnet, Guillaume; Dollar, William, Establishing secure mutual trust using an insecure password.
  108. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  109. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  110. Hamilton, Neil F.; Low, Arthur J., Flexible architecture for processing of large numbers and method therefor.
  111. Balasubramanian, Balagurunathan; Himawan, Rudi; Kuruvalli, Bharath N.; Perez, Richard R., Fraud detection system and method.
  112. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  113. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  114. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  115. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  116. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  117. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  118. Felsher, David Paul, Information record infrastructure, system and method.
  119. Johnson, Sr., Robert S.; Tila, Elton, Integrated sign on.
  120. Allababidi, Mouaz; Balasubramanian, Balagurunathan; Golden, Kenneth J.; Jannu, Shrikant D.; Jivani, Nadirshah N., Integrated user profile administration tool.
  121. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  122. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  123. Corella,Francisco, Lightweight public key infrastructure employing unsigned certificates.
  124. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  125. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Load control in a data center.
  126. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Load control in a data center.
  127. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  128. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  129. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  130. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  131. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  132. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  133. Barrus, John; Wolff, Gregory; Elliott, Ame; McCall, Kim; Rhodes, Bradley; Savitzky, Stephen, Method and apparatus for composing multimedia documents.
  134. Lam, Chui Shan Teresa; Syed, Jameel Ur Rahman, Method and apparatus for managing a key management system.
  135. Lam,Chui Shan Teresa; Syed,Jameel ur Rahman, Method and apparatus for managing a key management system.
  136. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Method and apparatus for preventing piracy of digital content.
  137. de Jong, Eduard, Method and apparatus for protecting against side channel attacks against personal identification numbers.
  138. Jacobs, Stuart J.; Mannix, Jr., Francis Leo; Christoffel, Thomas William; Belgard, Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  139. Sandhu,Ravi; deSa,Colin; Ganesan,Karuna, Method and system for authorizing generation of asymmetric crypto-keys.
  140. Feil, Stephan, Method and system for controlling access to a secondary system.
  141. Vanstone, Scott A., Method and system for generating implicit certificates and applications to identity-based encryption (IBE).
  142. Vanstone, Scott A., Method and system for generating implicit certificates and applications to identity-based encryption (IBE).
  143. Lam,Chui Shan Teresa; Syed,Jameel ur Rahman, Method and system for initializing a key management system.
  144. Joseph, Boby; Freed, Michael; Borella, Michael S., Method and system for network security capable of doing stronger encryption with authorized devices.
  145. Shamsaasef, Rafie; Manglore, Geetha; Peterka, Petr; Medvinsky, Alexander, Method and system for providing third party authentication of authorization.
  146. Rosenberg,Greg, Method and system for signing and authenticating electronic documents.
  147. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  148. Andrews, Richard F.; Huang, Zhiyong; Ruan, Tom Qi Xiong, Method and system of securely escrowing private keys in a public key infrastructure.
  149. Kung, Fen-Chung; Sankalia, Anish; Walker, Hopeton; Wang, Spencer, Method for billing IP broadband subscribers.
  150. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  151. R��ver,Stefan; Groffman,Hans Dieter, Method for digital signing of a message.
  152. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  153. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  154. Vanstone, Scott A., Method for the application of implicit signature schemes.
  155. Vanstone, Scott A., Method for the application of implicit signature schemes.
  156. Vanstone,Scott A., Method for the application of implicit signature schemes.
  157. Fan, Xiaobo; Hennecke, Mark D.; Heath, Taliver Brooks, Method of correlating power in a data center by fitting a function to a plurality of pairs of actual power draw values and estimated power draw values determined from monitored CPU utilization of a statistical sample of computers in the data center.
  158. Medvinsky,Alexander, Method of preventing unauthorized distribution and use of electronic keys using a key seed.
  159. Pauly, Steven J.; Shukaitis, Michael J., Method of securing postage data records in a postage printing device.
  160. Asokan,Nadarajah; Ekberg,Jan Erik; Paatero,Lauri, Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device.
  161. Immonen,Olli; Asokan,Nadarajah; Markkanen,Panu S., Method, system and computer program product for secure ticketing in a communications device.
  162. Leonard, Sean Joseph, Methods and systems for allocating and indicating trustworthiness of secure communications.
  163. Leonard, Sean Joseph, Methods and systems for encouraging secure communications.
  164. Leonard, Sean Joseph, Methods and systems for indicating trustworthiness of secure communications.
  165. Lofland, Bruce; Miller, Eric E.; Teixeira, Joao Tex, Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network.
  166. Clidaras, Jimmy; Whitted, William; Hamburgen, William; Sykora, Montgomery; Leung, Winnie; Aigner, Gerald; Beaty, Donald L., Modular computing environments.
  167. Clidaras, Jimmy; Whitted, William; Hamburgen, William; Sykora, Montgomery; Leung, Winnie; Aigner, Gerald; Beaty, Donald L., Modular computing environments.
  168. Hoffberg, Steven M., Multifactorial optimization system and method.
  169. Madoukh, Ashraf T., Object-based security system.
  170. Boyd,Eric; Bejar,Arturo; Pal,Anil; Roman,David, Offline-online incentive points system and method.
  171. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  172. Krieger, Ken; Kim, Sangsun, Online testing of secondary power unit.
  173. Sjoblom,Kai, Ordered delivery of intercepted data.
  174. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  175. Kocher, Paul C., Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks.
  176. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  177. Kung, Fen-Chung; Russell, Jesse Eugene; Sankalia, Anish; Walker, Hopeton; Wang, Spencer, Personal IP toll-free number.
  178. Kung, Fen-Chung; Russell, Jesse Eugene; Sankalia, Anish; Wang, Spencer; Walker, Hopeton, Personal IP toll-free number.
  179. Kung, Fen Chung; Sankalia, Anish; Wang, Spencer C.; Russell, Jesse E., Personal control of address assignment and greeting options for multiple BRG ports.
  180. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  181. Carlson, Andrew B.; Heath, Taliver Brooks, Power supply source blending and smoothing.
  182. Weber, Wolf-Dietrich; Fan, Xiaobo; Barroso, Luiz Andre, Powering a data center.
  183. Röver, Stefan; Groffman, Hans-Dieter, Process for digital signing of a message.
  184. Sakuma, Jun; Uramoto, Naohiko, Program, classification method and system.
  185. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Programmable logic device with resistance to external monitoring attacks.
  186. Kablotsky,Joshua, Programmable processor supporting secure mode.
  187. Kung, Fen-Chung; Russell, Jesse Eugene; Walker, Hopeton; Wang, Spencer, Protected IP telephony calls using encryption.
  188. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  189. Jin, Chao; Sun, Weitao, Protection scheme for AACS keys.
  190. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  191. Whitcomb, Michael J., Proxy authentication network.
  192. Whitcomb, Michael J., Proxy authentication network.
  193. Corella,Francisco, Public key validation service.
  194. Chan, Hark C, Receiver system for audio information.
  195. Rose, Gregory Gordon; Gantman, Alexander; Noerenberg, II, John W., Recreating a cryptographic key in a replacement device.
  196. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  197. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  198. Kung, Fen-Chung; Sankalia, Anish; Wang, Spencer C.; Russell, Jesse E., Responding to IP call with a prompt to select an extension and routing packets to IP phone at selected extension.
  199. Kung, Fen-Chung; Sankalia, Anish; Wang, Spencer C.; Russell, Jesse E., Responding to a call with a prompt and routing the call to a phone selected in response to the prompt.
  200. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  201. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  202. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  203. Qin, Yunchuan; Zhou, Jungang, Secret file access authorization system with fingerprint limitation.
  204. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Secure boot with resistance to differential power analysis and other external monitoring attacks.
  205. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  206. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  207. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  208. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  209. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  210. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  211. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  212. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  213. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  214. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  215. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  216. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  217. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  218. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  219. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  220. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  221. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  222. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  223. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  224. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  225. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  226. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  227. Vanstone, Scott A.; Gallant, Robert P.; Brown, Daniel R. L., Secure interface for versatile key derivation function support.
  228. Wuidart,Luc; Balthazar,Pierre, Secure multimedia data transmission method.
  229. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Secure processor with resistance to external monitoring attacks.
  230. Resch, Jason K.; Leggette, Wesley, Secure storage of secret data in a dispersed storage network.
  231. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  232. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  233. Roskind,James, Simple secure login with multiple-authentication providers.
  234. Roskind, James, Simple, secure login with multiple authentication providers.
  235. Roskind, James, Simple, secure login with multiple authentication providers.
  236. Fang Yi ; Kao I-Lung ; Wilson George Conerly, Single sign-on (SSO) mechanism having master key synchronization.
  237. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  238. Kocher, Paul C.; Jun, Benjamin C.; Jaffe, Joshua M., Specialized circuitry for cryptographic authentication and other purposes.
  239. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  240. Talkin, David; Brooks, Alec, Supplying grid ancillary services using controllable loads.
  241. Hoffberg, Steven M., System and method for determining contingent relevance.
  242. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  243. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  244. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  245. Woodward,Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  246. Huntzicker, Fred W.; Alrabady, Ansaf I.; Racklyeft, David, System and method for establishing a secure connection with a mobile device.
  247. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  248. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  249. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  250. Audebert, Yves Louis Gabriel; Le Saint, Eric F., System and method for generating symmetric keys within a personal security device having minimal trust relationships.
  251. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  252. Rensin, David K.; Hanay, John W.; Lavelle, Timothy C.; Montellato, David A.; Obot, James J.; Rubin, Jeff M.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall.
  253. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  254. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  255. Nagel, Robert H.; Jones, Phillip; Wener, Clifford; Readick, Jodd, System and method for providing a public number-private number telephony system.
  256. Nagel, Robert H.; Jones, Phillip; Wener, Clifford; Readick, Jodd, System and method for providing a public/private telephone number system.
  257. Dan, Asit; Iyengar, Arun K.; Kumar, Manoj, System and method for providing trusted services via trusted server agents.
  258. Kocher, Paul; Rohatgi, Pankaj; Jaffe, Joshua M., System and method for secure authentication.
  259. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  260. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  261. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  262. Paltenghe, Cris T.; Mamdani, Alnoor B.; Ezrol, Lisa; Golvin, Charles; Lichstein, Henry; Takata, Melvin Michio, System and method for securely storing electronic data.
  263. Smith, Walt E.; Fisher, Jr., Larry F.; Vargese, Bavan, System and method for securing a base derivation key for use in injection of derived unique key per transaction devices.
  264. Little, Herbert Anthony; Clark, David; Owen, Russell Norman; Totzke, Scott William; Adams, Neil Patrick; Brown, Michael Stephen, System and method of installing software applications on electronic devices.
  265. Freund,Gregor, System and methodology for providing community-based security policies.
  266. Kung, Fen-Chung; Russell, Jesse Eugene; Sankalia, Anish; Walker, Hopeton S.; Wang, Spencer C., System with call forward profile.
  267. Kung, Fen-Chung; Russell, Jesse Eugene; Sankalia, Anish; Walker, Hopeton S.; Wang, Spencer C., System with call forward profile.
  268. Kung,Fen Chung; Russell,Jesse Eugene; Sankalia,Anish; Walker,Hopeton S; Wang,Spencer C., System with call forward profile.
  269. Atkins, Barry; Challener, David Carroll; Novak, Frank; Rusnak, Joseph Gary; Timmons, Kenneth D.; Vetter, William W., System, method, and program for managing a user key used to sign a message for a data processing system.
  270. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for a cryptographic file system layer.
  271. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  272. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  273. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  274. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  275. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  276. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  277. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  278. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  279. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  280. Orsini, Rick L.; O'Hare, Mark S.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  281. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  282. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  283. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  284. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  285. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  286. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  287. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  288. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  289. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  290. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  291. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  292. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  293. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  294. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  295. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  296. Goodman, Brian Gerard; Hill, Mark Edward; Jaquette, Glen Alan; Shiratori, Toshiyuki, Target self-security for upgrades for an embedded device.
  297. Chang, Steve Chen-Lin; Clemm, L. Alexander; Dini, Petre; Lin, Shyyunn Sheran, Techniques for sequencing system log messages.
  298. Ong, Tony, Thermal control system.
  299. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  300. Harvey, Ian Nigel, Time stamping system.
  301. Chan, Hark C, Transmission and receiver system operating on different frequency bands.
  302. Chan, Hark C, Transmission and receiver system operating on different frequency bands.
  303. Chan, Hark C, Transmission and receiver system operating on multiple audio programs.
  304. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  305. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  306. Krieger, Ken; Borchers, Albert, Updating a power supply microcontroller.
  307. Murata, Kuniharu, Upgrade service system.
  308. Coulier, Frank, Use and generation of a session key in a secure socket layer connection.
  309. Hind, John R.; Peters, Marcia L., Using device certificates for automated authentication of communicating devices.
  310. Hind, John R.; Peters, Marcia L., Using device certificates to authenticate servers before automatic address assignment.
  311. Kocher,Paul C.; Jaffe,Joshua M.; Jun,Benjamin C., Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content.
  312. Kocher, Paul C.; Rohatgi, Pankaj; Jaffe, Joshua M., Verifiable, leak-resistant encryption and decryption.
  313. Beda, III, Joseph S.; Petrescu-Prahova, Cristian; Kern, Christoph, Virtual network pairs.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로