$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for providing access to secured data or area 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0970689 (1997-11-14)
발명자 / 주소
  • Timson Colin J.,GBX
  • Yap Chas Hock Eng,GBX
  • Kelly Sean,GBX
출원인 / 주소
  • TL Technology Rerearch (M) SDN. BHD., MYX
대리인 / 주소
    Milde, Hoffberg & Macklin, LLP
인용정보 피인용 횟수 : 114  인용 특허 : 5

초록

An apparatus and a method for providing access to a secured data or area includes at least two secure data modules which contain security data and other information and which belong to a particular security scheme and a dual module reader for reading data and permissions instructions contained on th

대표청구항

[ What is claimed is:] [1.] An apparatus for providing access to secured data, which comprises:a central processing device ("CPD") for controlling the operation of said apparatus;a first device coupled to said CPD for receiving a first data set of information from an enabling secure data module ("SD

이 특허에 인용된 특허 (5)

  1. Anvret Lena (Upplands Vsby SEX) Mersich Lszl (Madrid ESX), Means for identification and exchange of encryption keys.
  2. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  3. Claus David M. (Indianapolis IN), Secure money transfer techniques using smart cards.
  4. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  5. Curry Stephen M. ; Loomis Donald W. ; Bolan Michael L., Transfer of valuable information between a secure module and another module.

이 특허를 인용한 특허 (114)

  1. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  2. Balasubramanian, Sembian, Application security framework.
  3. Balasubramanian, Sembian, Application security framework.
  4. Bishop, Fred; Saunders, Peter D, Authenticating an RF transaction using a transaction counter.
  5. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Authenticating fingerprints for radio frequency payment transactions.
  6. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Authorizing payment subsequent to RF transactions.
  7. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Authorizing radio frequency transactions using a keystroke scan.
  8. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric registration for facilitating an RF transaction.
  9. Awatsu, Kiyotaka; Ohkoshi, Masanori; Kudoh, Takahiro, Biometrics authentication method and biometrics authentication system.
  10. Awatsu, Kiyotaka; Ohkoshi, Masanori; Kudoh, Takahiro; Akutsu, Kazuhiro; Ogawa, Yoshiharu, Biometrics authentication method and biometrics authentication system.
  11. Beenau,Blayn W; Bonalle,David S; Fields,Seth W; Gray,William J; Larkin,Carl; Montgomery,Joshua L; Saunders,Peter D, Biometrics for radio frequency payment transactions.
  12. Kowalski, Jacek; Charrat, Bruno, Chip card reader having contact and contactless operating modes.
  13. Alisuag,Cora, Computer oriented record administration system.
  14. Saunders, Peter D, Converting account data associated with a radio frequency device.
  15. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  16. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  17. Ferren, Bran; Jung, Edward K. Y., Data recovery systems.
  18. Ferren, Bran; Jung, Edward K. Y., Data retrieval methods.
  19. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  20. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  21. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems.
  22. Bhaskar, Rao B S; High Court, Rajan G.; Deepa, Josephine G., Device for secure access to digital media contents, virtual multi-interface driver and system for secure access to digital media contents.
  23. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  24. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  25. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  26. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  27. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Digital content protection method and apparatus.
  28. Kawai,Shigeyuki; Ito,Koji, Electronic money system and electronic money terminal device.
  29. Kortum, Philip; Sullivan, Marc A., Firewall switching system for communication system applications.
  30. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  31. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  32. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry recognition biometrics on a fob.
  33. Felsher, David Paul, Information record infrastructure, system and method.
  34. Merten, C. William, Interlock system and method.
  35. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  36. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  37. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  38. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  39. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  40. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  41. Ferren, Bran; Jung, Edward K. Y., Memory device activation and deactivation.
  42. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Method and apparatus for preventing piracy of digital content.
  43. Caronni, Germano, Method and apparatus for re-encrypting data in a transaction-based secure storage system.
  44. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Method and system for auditory recognition biometrics on a FOB.
  45. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  46. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  47. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  48. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  49. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  50. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  51. Ferren,Bran; Goodall,Eleanor V.; Jung,Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  52. Brandt, William M., Method and system for preventing identity theft in electronic communications.
  53. Yan, Shunguo, Method for device dependent access control for device independent web content.
  54. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  55. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  56. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device including structured data and primary and secondary read-support information.
  57. Asokan,Nadarajah; Ekberg,Jan Erik; Paatero,Lauri, Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device.
  58. Immonen,Olli; Asokan,Nadarajah; Markkanen,Panu S., Method, system and computer program product for secure ticketing in a communications device.
  59. Ferren, Bran; Jung, Edward K. Y., Modifiable memory devices having limited expected lifetime.
  60. Hoffberg, Steven M., Multifactorial optimization system and method.
  61. Bossemeyer, Jr.,Robert Wesley; Israelski,Edmond W.; Heinmiller,Wayne Robert; Light,Jordan Howard; Ekstrom,Gayle Roberta, Network arrangement for smart card applications.
  62. McFarland, Alan David, Personal familiarity authentication.
  63. McFarland, Alan David, Personal familiarity authentication.
  64. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  65. Bishop, Fred; Saunders, Peter D., Processing an RF transaction using a routing number.
  66. Walker, John Mitchell; Bleisch, Paul L.; Miller, Jr., Thomas Wayne; Picioccio, Matthew; Hargreaves, Shawn, Programming framework for closed systems.
  67. Saunders, Peter D, RF transaction system and method for storing user personal data.
  68. Yudasaka, Ichio, Recording medium, recording medium reading/writing apparatus, and method of using recording medium.
  69. Bishop, Fred; Saunders, Peter D, Recurrent billing maintenance with radio frequency payment devices.
  70. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  71. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  72. Berardi, Michael J.; Bliman, Michal; Bonalle, David; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Reload protocol at a transaction processing entity.
  73. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  74. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  75. Ferren,Bran; Jung,Edward K. Y.; Tegreene,Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  76. Bonalle, David S; Isenberg, Susan E; Saunders, Peter D; Williamson, John R, Securing RF transactions using a transactions counter.
  77. Shields, Adrian, Self-service terminal.
  78. Carta,David R.; Kelly,Guy M.; Ravenis, II,Joseph V J, Smart card access control system.
  79. Bossemeyer, Robert W.; Israelski, Edmond W.; Heinmiller, Wayne Robert; Light, Jordan Howard; Ekstrom, Gayle Roberta, Smart card application system and method.
  80. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using auditory scan recognition.
  81. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using facial scan recognition.
  82. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using fingerprint recognition.
  83. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using iris scan recognition.
  84. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using retinal scan recognition.
  85. Bonalle, David S.; Salow, Glen, Smartcard transaction method and system using signature recognition.
  86. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using smellprint recognition.
  87. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using voiceprint recognition.
  88. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  89. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  90. Kocher, Paul C.; Jun, Benjamin C.; Jaffe, Joshua M., Specialized circuitry for cryptographic authentication and other purposes.
  91. Dutta, Tanmoy; Chander, Girish; Li, Ziquan; Gott, Steven Richard; Dibble, Clifford T., Specification of a hierarchical authorization model for a DBMS--SQL language extensions.
  92. Lee,Chung I; Lee,Da Peng, System and method for controlling user authorities to access one or more databases.
  93. Belanger, Brian N.; Phillips, Rebecca K.; Sullivan, Todd W.; Kriewald, Bonnie A.; Arkell, Frank J.; Voegtly, Carl H., System and method for data access and control.
  94. Hoffberg, Steven M., System and method for determining contingent relevance.
  95. Peart, Lee J; Saunders, Peter D, System and method for generating an unpredictable number using a seeded algorithm.
  96. Korosec, Jason A., System and method for identity validation for a regulated transaction.
  97. Korosec,Jason A., System and method for identity validation for a regulated transaction.
  98. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  99. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  100. Bishop, Fred; Neemann, Trey; Armes, David, System and method for reassociating an account number to another transaction account.
  101. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  102. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  103. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  104. Saunders, Peter D; Barnes, Brian T, System and method for secure transactions manageable by a transaction account provider.
  105. Bonalle, David S.; Salow, Glen, System and method of a smartcard transaction with biometric scan recognition.
  106. Bonalle, David S.; Salow, Glen, System and method of a smartcard transaction with biometric scan recognition.
  107. Arnouse,Michael, System and method of electronic signature verification.
  108. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  109. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  110. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  111. Bonalle,David S.; Salow,Glen, System for biometric security using a smartcard.
  112. Bishop, Fred; Saunders, Peter D, Systems and methods for non-traditional payment using biometric data.
  113. Kelley,Edward E; Motika,Franco; Webb,James B, Universal password generation method.
  114. Kocher,Paul C.; Jaffe,Joshua M.; Jun,Benjamin C., Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로