$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Centralized secure communications system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0673122 (1996-07-01)
발명자 / 주소
  • Colvin
  • Sr. Bryan
출원인 / 주소
  • Allsoft Distributing Incorporated
대리인 / 주소
    McCutchen, Doyle, Brown & Enersen, LLP
인용정보 피인용 횟수 : 86  인용 특허 : 32

초록

A system of secure communications between multiple parties. This system uses an index/secure key combination for each party. The index key never changes its value. A secured central router with access to a master database uses index keys to look up corresponding secure keys in the master database. T

대표청구항

[ I claim:] [1.] A communications system, comprising:a transmitting client and a receiving client, each client having an associated secure key and an encryptor/decryptor for encrypting and decrypting messages using the secure key; anda master key router remotely disposed from the transmitting client

이 특허에 인용된 특허 (32)

  1. Shimada Michio (Tokyo JPX), Arrangement for transforming plaintext into ciphertext for use in a data communications system.
  2. Childs Matthew H. (Arlington TX) Norcross Thomas M. (Arlington TX), Automatic data generation for self-test of cryptographic hash algorithms in personal security devices.
  3. Murakami Yasuyuki (Uji JPX) Ito Kazuhito (Nagaokakyo JPX), Cipher communication method and device.
  4. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  5. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
  6. Orton Glenn A. (158 Kent Street Hamilton ; Ont. CAX L8P 3Z3), Cryptographic method for communication and electronic signatures.
  7. Bellovin Steven M. (Westfield NJ) Merritt Michael (Berkeley Heights NJ), Cryptographic protocol for secure communications.
  8. Alvarez Alvarez Manuel J. (Madrid ESX), Data ciphering device.
  9. Liu Zunquan (13687 Paseo Cardiel #A San Diego CA 92129-2875), Device and method for data encryption.
  10. Takahashi Richard J. (Phoenix AZ), Digital randomizer for on-chip generation and storage of random self-programming data block.
  11. Luther Willis J. (Irvine CA), Encryption system.
  12. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  13. Shamir Adi (Rehovot ILX), Fast signature scheme based on sequentially linearized equations.
  14. Merkle Ralph C. (Sunnyvale CA), Method and apparatus for data encryption.
  15. Normile James O. (Woodside CA) Chu Ke-Chiang (Saratoga CA), Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing a data dependent e.
  16. Mueller-Schloer Christian (Vorhees NJ), Method and apparatus providing registered mail features in an electronic communication system.
  17. Aaro Tore I. (Åkersberg SEX) Rustan Torgny O. (Stockholm SEX) man Pr (Kungsngen SEX) Blom Rolf J. (Linkoping SEX) Forchheimer Robert (Linkoping SEX) Fak Viiveke A. (Linkoping SEX) Ingemarsson Bror I, Method and system for the mutual encyphered indentification between data communicating stations and stations for use wit.
  18. Mueller Kurt H. (Wallisellen CHX), Method for secure session key generation.
  19. Masnikosa V. P. (BUL. Avnoj-a 116/17 11070 New Belgrade ; Serbia YUX), Method for the protection of messages transmitted using public communication lines.
  20. Wahl Stefan (Schwieberdingen DEX), Method of generating a random element as well as a method for traffic mixing, random element generator and system compon.
  21. Cordery Robert A. (Danbury CT) Braun John F. (Weston CT) D\Ippolito Frank M. (Derby CT) Lawton Kathyrn V. (Branford CT) Pauly Steven J. (New Milford CT) Pintsov Leon A. (West Hartford CT) Ryan ; Jr. , Method of token verification in a key management system.
  22. Lowy Menahem (Arlington TX), Parallel architecture for generating pseudo-random sequences.
  23. Colvin ; Sr. Bryan, Public network merchandising system.
  24. Albert Bodo (Munich DEX) Vedder Klaus (Munich DEX), Random number generator.
  25. Busby Bruce E. (Mountain View CA), Recursive key schedule cryptographic system.
  26. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  27. Adams Carlisle M. (Ottawa CAX), Symmetric cryptographic system for data encryption.
  28. Ishida Kenji (Tokyo JPX), Synchronous pseudo-noise code sequence generation circuit.
  29. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  30. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  31. Ostermann Bernd (Weissach DEX) Bitzer Wolfgang (Weissach DEX), System for enciphering and deciphering data.
  32. Shaw William Y. (5449 Pacifica Dr. La Jolla CA 92037), Variable-key cryptography system.

이 특허를 인용한 특허 (86)

  1. Auernhammer, Florian A.; Chrysos, Nikolaos; Clauberg, Rolf; Doering, Andreas C.; Luijten, Ronald P.; Sagmeister, Patricia M., Address translation unit, device and method for remote direct memory access of a memory.
  2. Auernhammer, Florian A.; Chrysos, Nikolaos; Clauberg, Rolf; Doering, Andreas C.; Luijten, Ronald P.; Sagmeister, Patricia M., Address translation unit, device and method for remote direct memory access of a memory.
  3. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  4. Kimura,Misao, Communication network system having secret concealment function, and communication method.
  5. Kotani,Seigo; Sasaki,Takaoki; Yamanaka,Yusuke; Hasebe,Takayuki; Akiyama,Ryota, Cryptographic communication method, file access system and recording medium.
  6. Wack, C. Jay; Scheidt, Edward M.; Morris, Jeffrey K., Cryptographic information and flow control.
  7. Wack,C. Jay; Scheidt,Edward M.; Morris,Jeffrey K., Cryptographic information and flow control.
  8. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  9. Scott,Logan, Data loader using location identity to provide secure communication of data to recipient devices.
  10. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Dissemination of real estate information through text messaging.
  11. Kori, Teruhiko, Electronic transmission device, and signal transmission method.
  12. Kori,Teruhiko, Electronic transmission device, and signal transmission method.
  13. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  14. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  15. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  16. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  17. Koerkel, Donald E.; Smith, Jason A.; Sylla, Craig J., Encrypting multicast data in a wagering game network.
  18. Stufflebeam, Kenneth Wade, Encryption key lifecycle management.
  19. Kao,I Lung; Shi,Shaw Ben Shepherd, Flexible encryption scheme for GSO target passwords.
  20. Omino, Tsukasa; Komano, Yuichi, Generating device, re-encrypting device, method, and computer program product.
  21. Felsher, David Paul, Information record infrastructure, system and method.
  22. Narayanan,Ram Gopal Lakshmi, Key distribution across networks.
  23. Blom, Rolf; Cheng, Yi; Lindholm, Fredrik; Mattsson, John; Naslund, Mats; Norrman, Karl, Key management for secure communication.
  24. Blom, Rolf; Cheng, Yi; Lindholm, Fredrik; Mattsson, John; Naslund, Mats; Norrman, Karl, Key management for secure communication.
  25. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  26. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  27. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  28. Glazer, Elliott; Hobson, Carol Lee; Deming, Elizabeth S.; Royer, Coby; Fehlhaber, Jeffrey S., Method and apparatus for a user to shop online in a three dimensional virtual reality setting.
  29. Yun-Wu Huang ; Philip Shi-Lung Yu, Method and apparatus for random update synchronization among multiple computing devices.
  30. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlled media sharing in a network.
  31. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlled media sharing in a network.
  32. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlled media sharing in a network.
  33. McGough, R. Paul, Method and system for establishing real-time authenticated and secured communications channels in a public network.
  34. McGough, R. Paul, Method and system for establishing real-time trust in a public network.
  35. Macchi, Ilario, Method and system for improving robustness of secure messaging in a mobile communications network.
  36. Mandre, Sateesh, Method and system of securing data over networks.
  37. Lynch, Liam Sean, Method and system to securely store customer data in a network-based commerce system.
  38. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  39. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  40. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  41. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  42. Hoffberg, Steven M., Multifactorial optimization system and method.
  43. Kasatani, Kiyoshi, Network communication system and network multifunction product.
  44. Bellin, Robert W., Pager-based communications system.
  45. Robert W. Bellin, Pager-based communications system.
  46. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  47. Kocher, Paul C., Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks.
  48. Matthews, Brian L.; Olechowski, Scott; Ullman, Cayce M., Platform independent zero footprint decompression.
  49. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  50. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  51. Kuo, James Shaw-Han, Process and method for secure online transactions with calculated risk and against fraud.
  52. Kuo, James Shaw-Han, Process and method for secure online transactions with calculated risk and against fraud.
  53. Lin Chihuan Michael ; Mitkowski John R., Routing mechanism for networks with separate upstream and downstream traffic.
  54. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Routing secure element payment requests to an alternate application.
  55. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  56. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  57. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  58. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Hournan, Secure mobile information management system and method.
  59. Wall, Jonathan; von Behren, Rob, Secure reset of personal and service provider information on mobile devices.
  60. Durand, Alain; Andreaux, Jean-Pierre, Simplified method for renewing symmetrical keys in a digital network.
  61. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  62. Hoffberg, Steven M., System and method for determining contingent relevance.
  63. Simms,Timothy J., System and method for establishing secure communication.
  64. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  65. Lyle,Michael P.; Ross,Robert F.; Maricondo,James R., System and method for generating fictitious content for a computer.
  66. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  67. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  68. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  69. Sethi,Vincent; Vaskas,Joseph A.; Connelly,Thomas J.; Wos,Rosemarie; Barlow,Athena; Shabash,Marina; Narayanan,Chandramouli X., System and method for routing messages.
  70. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  71. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  72. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  73. Moshir, Kevin K; Moshir, Sean; Armstrong, Jay M; Panicko, Brian Stanley, System and method for tracking SMS messages.
  74. Moran, Douglas B., System and method for using timestamps to detect attacks.
  75. Young, III, Freeland Glen; Dietrich, Liane; Garland, Diana H.; Edwards, Lee, System, method and software application for accessing and processing information.
  76. Moshir, Kevin K; Moshir, Sean; Khanban, Ali A; Lindsay, Joshua, Systems and methods for encrypted mobile voice communications.
  77. Moshir, Kevin K; Moshir, Sean S; Shafiezadeh, Houman, Systems and methods for secure short messaging service and multimedia messaging service.
  78. Aiello, Roberto; Gehring, Stephan; Lynch, William; Rahardja, Krisnawan K.; Rogerson, Gerald; Sparell, Carlton J., Ultra wide band communication network.
  79. Aiello,Roberto; Sparrell,Carlton; Rogerson,Gerald, Ultra wide band communication systems and methods.
  80. Glazer, Elliott; Hobson, Carol Lee; Deming, Elizabeth S.; Royer, Coby; Fehlhaber, Jeff S., Virtual reality shopping experience.
  81. Glazer, Elliott; Hobson, Carol Lee; Deming, Elizabeth S.; Royer, Coby; Fehlhaber, Jeff S., Virtual reality shopping experience.
  82. Glazer, Elliott; Hobson, Carol Lee; Deming, Elizabeth Sandra; Royer, Coby; Fehlhaber, Jeffrey Scott, Virtual reality shopping experience.
  83. Glazer, Elliott; Hobson, Carol Lee; Deming, Elizabeth Sandra; Royer, Coby; Fehlhaber, Jeffrey Scott, Virtual reality shopping experience.
  84. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Wallet application for interacting with a secure element application without a trusted server for authentication.
  85. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
  86. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로