$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Pseudorandom number generator 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/58
  • G06F-001/02
출원번호 US-0856562 (1997-05-15)
발명자 / 주소
  • DeBellis Robert S.
  • Smith
  • Sr. Ronald M.
  • Yeh Phil Chi-Chung
출원인 / 주소
  • International Business Machine Corporation
대리인 / 주소
    Kinnaman, Jr.
인용정보 피인용 횟수 : 75  인용 특허 : 7

초록

Pseudorandom numbers are generated in a cryptographic module in a cryptographically strong manner by combining a time-dependent value with a secret value and passing the result through a one-way hash function to generate a hash value from which a random number is generated. The secret value is conti

대표청구항

[ What is claimed is:] [1.] A method for pseudorandomly generating numbers capable of use in a cryptographic system, comprising the steps of:storing a nonrepeating current time-dependent value;storing a current secret value;generating an updated secret value as a function of said current secret valu

이 특허에 인용된 특허 (7)

  1. Nakagawa Shinichi,JPX ; Kawamoto Kiyofumi,JPX ; Ishihara Kazuya,JPX ; Kumaki Satoshi,JPX ; Hanami Atsuo,JPX, Control signal generating device generating various control signals using storage unit having small storage capacity.
  2. Matyas Stephen M. (Manassas VA), Cryptographic method for updating financial records.
  3. Anderson Robert ; Schultz George R. ; Heptig John P., Electronic encryption device and method.
  4. Anshel Michael M. ; Goldfeld Dorian, Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
  5. Thomlinson Matthew W. ; Simon Daniel R. ; Yee Bennet, Non-biased pseudo random number generator.
  6. Albert Bodo (Munich DEX) Vedder Klaus (Munich DEX), Random number generator.
  7. Schulz Raymond A. (Manassas VA), Random number generator circuit.

이 특허를 인용한 특허 (75)

  1. Bishop, Fred; Saunders, Peter D, Authenticating an RF transaction using a transaction counter.
  2. Labrou, Yannis; Agre, Jonathan Russell, Authentication services using mobile device.
  3. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Authorizing payment subsequent to RF transactions.
  4. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Authorizing radio frequency transactions using a keystroke scan.
  5. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Biometric registration for facilitating an RF transaction.
  6. Vesely, Ivan, Cascaded stream cipher.
  7. Anderson, Jordan; Takahashi, Richard J.; Little, Sean; Noehring, Lee, Client(s) to cloud or remote server secure data or file object encryption gateway.
  8. Saunders, Peter D, Converting account data associated with a radio frequency device.
  9. Au,Derek C.; Fruehauf,Hugo, Cryptographic communications using pseudo-randomly generated cryptography keys.
  10. Davis, Michael L.; Hulusi, Tam, Device authentication using a unidirectional protocol.
  11. Wettstein,Gregory H., Digital identity creation and coalescence for service authorization.
  12. Brown, Daniel R. L.; Vanstone, Scott A., Elliptic curve random number generation.
  13. Brown, Daniel Richard L.; Vanstone, Scott Alexander, Elliptic curve random number generation.
  14. Brown, Daniel Richard L.; Vanstone, Scott Alexander, Elliptic curve random number generation.
  15. Johnson, Simon B., Encryption key generation in encrypted storage devices.
  16. Johnson, Simon B., Encryption key generation in encrypted storage devices.
  17. Kunitz, Hardy; Mettken, Werner, Encryption of data to be stored in an information processing system.
  18. Desai,Anand; Yin,Yiqun; Hevia,Alejandro, Enhanced ANSI X9.17 pseudorandom number generators with forward security.
  19. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell, Framework and system for purchasing of goods and services.
  20. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Hand geometry recognition biometrics on a fob.
  21. Felsher, David Paul, Information record infrastructure, system and method.
  22. Nishikawa,Meisei, Interface security system and method.
  23. Klein,Udo; Januschke,Peter, Mapping pseudo-random numbers to predefined number ranges.
  24. Field, Scott A.; Spelman, Jeffrey F., Method and apparatus for generating random numbers.
  25. Saarinen,Markku Juhani, Method and apparatus for improved pseudo-random number generation.
  26. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Method and system for auditory recognition biometrics on a FOB.
  27. Balinsky, Helen; Loh, Weng Wah; Chen, Liqun; Harrison, Keith; Waters, John, Method and system for generating data transaction ID.
  28. Michtchenko, Valentin Alexandrovich; Zakharau, Uladzimir Uladzimirovich; Vilanski, Yuri Victorovich; Verzhbalovich, Dzmitry Iiharavich, Method for encrypting information and device for realization of the method.
  29. Coron,Jean Sebastien; Naccache,David, Method for improving a random number generator to make it more resistant against attacks by current measuring.
  30. Labrou,Yannis; Ji,Lusheng; Agre,Jonathan Russell, Methods for purchasing of goods and services.
  31. Takahashi, Richard J., Multi-level independent security architecture.
  32. Takahashi, Richard J., Multi-level independent security architecture.
  33. Takahashi, Richard J., Multi-tenancy architecture.
  34. Takahashi, Richard J., Multi-tenancy architecture.
  35. Hoffberg, Steven M., Multifactorial optimization system and method.
  36. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell; Terriza, Jesus Molina, Opinion registering application for a universal pervasive transaction framework.
  37. She,Alfred C.; Gimlett,James L., Pipelined deciphering round keys generation.
  38. Bishop, Fred; Saunders, Peter D., Processing an RF transaction using a routing number.
  39. Dillaway, Blair B., Protection of application secrets.
  40. Saunders, Peter D, RF transaction system and method for storing user personal data.
  41. Park, Dae-Seon; Kang, In-Seok; Ahn, Byeong-Ho, Random number generation method and apparatus using low-power microprocessor.
  42. Bishop, Fred; Saunders, Peter D, Recurrent billing maintenance with radio frequency payment devices.
  43. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  44. Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, Registering a biometric for radio frequency transactions.
  45. Berardi, Michael J.; Bliman, Michal; Bonalle, David; Elwood, Jennifer Anne; Hood, Matthew C.; Isenberg, Susan E.; Mayers, Alexandra; Perry, Trevor J.; Saunders, Peter D.; Scheding, Kathryn D.; Shah, Sejal Ajit; VonWald, Kristin L.; Williamson, John R., Reload protocol at a transaction processing entity.
  46. Takahashi, Richard J., Replaceable or removable physical interface input/output module.
  47. Guthery, Scott B.; Robinton, Mark; Davis, Michael Lawrence; Andresky, David, Secure Wiegand communications.
  48. Davis, Michael; Andresky, David; Guthery, Scott B.; Robinton, Mark, Secure wiegand communications.
  49. Guthery, Scott B.; Robinton, Mark; Davis, Michael Lawrence; Andresky, David, Secure wiegand communications.
  50. Bonalle, David S; Isenberg, Susan E; Saunders, Peter D; Williamson, John R, Securing RF transactions using a transactions counter.
  51. Takahashi, Richard J., Security device with programmable systolic-matrix cryptographic module and programmable input/output interface.
  52. Takahashi, Richard J., Security device with programmable systolic-matrix cryptographic module and programmable input/output interface.
  53. Labrou,Yannis; Ji,Lusheng; Agre,Jonathan Russell, Security framework and protocol for universal pervasive transactions.
  54. Bonalle,David S.; Salow,Glen, Smartcard transaction method and system using voiceprint recognition.
  55. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  56. Bonalle, David S.; Salow, Glen, Smartcard transaction system and method.
  57. Hoffberg, Steven M., System and method for determining contingent relevance.
  58. Jarosinski,Tad; Agre,Daniel H.; Carter,Stephen S.; Iraninejad,Mehraban; Odenwalder,Joseph P.; Quick,Roy Franklin; Wheatley,Charles E., System and method for encypting spread spectrum carrier.
  59. Peart, Lee J.; Saunders, Peter D., System and method for generating an unpredictable number using a seeded algorithm.
  60. Peart, Lee J; Saunders, Peter D, System and method for generating an unpredictable number using a seeded algorithm.
  61. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  62. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  63. Bishop, Fred; Neemann, Trey; Armes, David, System and method for reassociating an account number to another transaction account.
  64. Davidson, John H., System and method for secure and flexible key schedule generation.
  65. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  66. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  67. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  68. Saunders, Peter D.; Barnes, Brian T., System and method for secure transactions manageable by a transaction account provider.
  69. Saunders, Peter D; Barnes, Brian T, System and method for secure transactions manageable by a transaction account provider.
  70. Bishop, Fred; Saunders, Peter D, Systems and methods for non-traditional payment using biometric data.
  71. Bishop, Fred; Saunders, Peter D., Systems and methods for non-traditional payment using biometric data.
  72. Brown, Michael K.; Little, Herbert A.; MacFarlane, David Victor; Brown, Michael S.; Davis, Dinah Lea Marie, Systems and methods to securely generate shared keys.
  73. Brown, Michael K.; Little, Herbert A.; MacFarlane, David Victor; Brown, Michael S.; Davis, Dinah Lea Marie, Systems and methods to securely generate shared keys.
  74. Labrou, Yannis; Agre, Jonathan Russell, Wireless computer wallet for physical point of sale (POS) transactions.
  75. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell; Molina Terriza, Jesus; Chen, Wei-lun, Wireless wallet.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로