$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

File encryption method and system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04C-009/00
출원번호 US-0221521 (1998-12-28)
발명자 / 주소
  • Fielder Guy L.
  • Alito Paul N.
출원인 / 주소
  • The PACid Group
대리인 / 주소
    Lester
인용정보 피인용 횟수 : 112  인용 특허 : 2

초록

A file security system is disclosed in which both a deterministic, non-predictable, pseudo-random, symmetric encryption key and an encrypted information file are highly resistant to cryptographic analysis or brute force trial-and-error attacks. The encryption key is formed by first combining a const

대표청구항

[ What is claimed is:] [1.] A method of protecting an information file from unauthorized access, which comprises the following steps:combining a constant value and a secret plural bit sequence in accordance with an algebraic function to shuffle bits, perform a first many-to-few bit mapping, and prod

이 특허에 인용된 특허 (2)

  1. Albus James S. (Kensington MD), Method and apparatus for implementation of the CMAC mapping algorithm.
  2. Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.

이 특허를 인용한 특허 (112)

  1. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  2. Kohno, Shigeru, Apparatus and method for restoring data.
  3. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  4. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  5. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, Authorizing administrative operations using a split knowledge protocol.
  6. Grim, Evan Tyler; Alexander, Josh, Automated authorization response techniques.
  7. Grim, Evan Tyler; Alexander, Josh, Automated authorization response techniques.
  8. Brennan, Todd, Centralized timed analysis in a network security system.
  9. Rodorff, Werner, Computer system and method for storing data.
  10. Brennan, Todd, Content extractor and analysis system.
  11. Rashkovskiy, Oleg; Hannah, Eric C., Content protection using block reordering.
  12. Dilman, Mark; Stewart, Michael James; Hu, Wei-Ming; Kuchibhotla, Balasubrahmanyam; Susairaj, Margaret; Sun, Hubert Ken, Data corruption diagnostic engine.
  13. Dilman, Mark; Stewart, Michael James; Hu, Wei-Ming; Pareek, Alok; To, Jr., Lawrence HinLuen; Srihari, Vinay H., Data recovery advisor.
  14. Williams, Larry Lynn, Data storage device with data transformation capability.
  15. Kondo, Tetsujiro; Fujimori, Yasuhiro; Carey, William Knox; Carrig, James J., Data transformation for explicit transmission of control information.
  16. Kondo,Tetsujiro; Fujimori,Yasuhiro; Carey,William Knox; Carrig,James J., Data transformation for explicit transmission of control information.
  17. Howard,Michael; Garms,Jason, Distributed cryptographic methods and arrangements.
  18. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  19. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  20. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  21. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  22. Pogmore, George R.; Pandey, Pradip K., Encryption system with key recovery.
  23. Sinn, Robert Samuel; Sinn, Charles Gordon; Sinn, Robert Mannerstedt, Encryption/decryption system and method.
  24. Damgaard, Ivan Bjerre; Pedersen, Torben Pryds; Rijmen, Vincent, Exponential data transform to enhance security.
  25. Damgaard, Ivan Bjerre; Pedersen, Torben Pryds; Rijmen, Vincent, Exponential data transform to enhance security.
  26. Felsher, David Paul, Information record infrastructure, system and method.
  27. Soliman,Hamdy, Information security via dynamic encryption with hash function.
  28. Greiner, Dan F.; Nerz, Bernd; Visegrady, Tamas, Instruction for performing a pseudorandom number generate operation.
  29. Greiner, Dan F.; Nerz, Bernd; Visegrady, Tamas, Instruction for performing a pseudorandom number generate operation.
  30. Greiner, Dan F.; Nerz, Bernd; Visegrady, Tamas, Instruction for performing a pseudorandom number generate operation.
  31. Greiner, Dan F.; Nerz, Bernd; Visegrady, Tamas, Instruction for performing a pseudorandom number seed operation.
  32. Greiner, Dan F.; Nerz, Bernd; Visegrady, Tamas, Instruction for performing a pseudorandom number seed operation.
  33. Greiner, Dan F.; Nerz, Bernd; Visegrady, Tamas, Instruction for performing a pseudorandom number seed operation.
  34. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  35. Damgaard, Ivan Bjerre; Pedersen, Torben Pryds; Rijmen, Vincent, Key derivation functions to enhance security.
  36. Damgaard, Ivan Bjerre; Pedersen, Torben Pryds; Rijmen, Vincent, Key derivation functions to enhance security.
  37. Schneider, James Paul, Keyed pseudo-random number generator.
  38. Lee, Sung-min; Oh, Seung-jae, Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key.
  39. Casagrande,Steven, Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to users.
  40. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  41. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  42. Fielder, Guy, Method and system for securing communication.
  43. Fielder, Guy, Method and system for securing communication.
  44. Fielder, Guy, Method and system for securing communication.
  45. Fielder, Guy, Method and system for securing communication.
  46. Fielder, Guy, Method and system for securing communication.
  47. Fielder, Guy, Method and system for securing communication.
  48. Fielder, Guy, Method and system for securing communication.
  49. Fielder, Guy, Method and system for securing communication.
  50. Lu, Zhou; Yu, Huazhang, Method and system for upgrading firmware of a card reader.
  51. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  52. Nyberg, Kaisa; Niemi, Valtteri, Method for ensuring data transmission security, communication system and communication device.
  53. Medvinsky,Alexander, Method of preventing unauthorized distribution and use of electronic keys using a key seed.
  54. Mishra, Abhinav; Day, Michael; Keen, Charles; Fei, Mingbiao; Rivait, Derek; Back, Alan B.; Sigwald, Rainer, Method, system and device for validating repair files and repairing corrupt software.
  55. Mishra, Abhinav; Day, Michael; Keen, Charles; Fei, Mingbiao; Rivait, Derek; Back, Alan B.; Sigwald, Rainer, Method, system and device for validating repair files and repairing corrupt software.
  56. Dubrovsky, Alexander; Wu, Xiaojun; Chen, Yifeng; Cai, Yong; Lavallee, James E., Methods and apparatus for processing configuration data.
  57. Schneider, James Paul, Multifactor username based authentication.
  58. Hoffberg, Steven M., Multifactorial optimization system and method.
  59. Damgaard, Ivan Bjerre; Pedersen, Torben Pryds; Rijmen, Vincent, Permutation data transform to enhance security.
  60. Grim, Evan Tyler; Alexander, Josh, Preemptive authorization automation.
  61. Prahalad, Prashanth, Preventing secure data from leaving the network perimeter.
  62. Hars, Laszlo, Protecting stored data from traffic analysis.
  63. McCuller, Patrick, Remotely repairing files by hierarchical and segmented cyclic redundancy checks.
  64. Fielder, Guy, Secure island computing system and method.
  65. Fielder, Guy, Secure island computing system and method.
  66. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  67. Mansour, Rasta A.; Nahari, Hadi, Secure self managed data (SSMD).
  68. Fei, Mingbiao; Mishra, Abhinav; Rivait, Derek; Day, Michael; Holmes, James Aaron; Bennett, James A., Self-adapting software system.
  69. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  70. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  71. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  72. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  73. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  74. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  75. Fielder, Guy, System and method for authenticating users.
  76. Fielder, Guy, System and method for authenticating users.
  77. Fielder, Guy, System and method for authenticating users.
  78. Fielder, Guy, System and method for authenticating users.
  79. Wilson,Silvy J.; Gava,Fabio; Byington,Carl, System and method for automatic wireless detection and identification of document processing service location.
  80. Vlcan, Steve; Bakshi, Bikram S, System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium.
  81. Vlcan, Steve; Bakshi, Bikram Singh, System and method for automatically detecting and then self-repairing corrupt, modified or non-existent files via a communication medium.
  82. Vlcan, Steve; Bakshi, Bikram Singh, System and method for automatically detecting and then self-repairing corrupt, modified or non-existent files via a communication medium.
  83. Vlcan, Steve; Bakshi, Bikram Singh, System and method for automatically detecting and then self-repairing corrupt, modified or non-existent files via a communication medium.
  84. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  85. Fielder, Guy, System and method for creating and protecting secrets for a plurality of groups.
  86. Agrawal, Sunil C.; Nadell, Katherine K., System and method for decentralized management of keys and policies.
  87. Hoffberg, Steven M., System and method for determining contingent relevance.
  88. Yeung, Michael; Yami, Sameer; Shahindoust, Amir, System and method for embedding user authentication information in encrypted data.
  89. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  90. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  91. Fielder, Guy, System and method for protecting secrets file.
  92. Fielder, Guy, System and method for protecting secrets file.
  93. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  94. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  95. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  96. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  97. Wagner,Phillip Ryan; Chapman, Jr.,John Gilman, System and method for securely upgrading firmware.
  98. Misra, Pradyumna K.; Graziado, Bradley J.; Spies, Terence R., System and method for software licensing.
  99. Misra,Pradyumna K.; Graziadio,Bradley J.; Spies,Terence R., System and method for software licensing.
  100. Bergler,Peter M.; Parsons, Jr.,John E.; Hagan,Breen E.; Brockway,Tad Dennis; Leitman,Robert K., System and related methods for managing and enforcing software licenses.
  101. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for enabling lazy-revocation through recursive key generation.
  102. Harrison, Daniel Thomas, System, method and computer program product for managing access to systems, products, and data based on information associated with a physical location of a user.
  103. Harrison, Daniel Thomas, System, method and computer program product for managing access to systems, products, and data based on information associated with a physical location of a user.
  104. Kondo, Tetsujiro; Fujimori, Yasuhiro; Carey, William Knox; Carrig, James J., Time-varying randomization for data synchronization and implicit information transmission.
  105. Tetsujiro Kondo JP; Yasuhiro Fujimori ; William Knox Carey ; James J. Carrig, Time-varying randomization for data synchronization and implicit information transmission.
  106. Fielder, Guy, Token for securing communication.
  107. Grim, Evan Tyler, Two-factor authentication systems and methods.
  108. Grim, Evan Tyler; Alexander, Josh, Two-factor authentication systems and methods.
  109. Grim, Evan Tyler; Alexander, Josh, Two-factor authentication systems and methods.
  110. Schneider, James Paul, Username based authentication and key generation.
  111. Schneider, James Paul, Username based authentication security.
  112. Schneider, James Paul, Username based key exchange.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로