$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of securing a cryptographic key 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0007183 (1998-01-15)
발명자 / 주소
  • Hillhouse Robert D.,CAX
출원인 / 주소
  • DEW Engineering and Development Limited, CAX
대리인 / 주소
    Neil Teitelbaum & Associates
인용정보 피인용 횟수 : 99  인용 특허 : 7

초록

A method is disclosed for improving portability of secure encryption key data files. The method provides for re-securing key data files according to different security processes for mobility. For porting an encryption key secured using a fingerprint authentication process to a system having only a p

대표청구항

[ What is claimed is:] [1.] In a system comprising a cryptographic key encrypted and stored in a key data file and a secured key for decrypting the cryptographic key wherein the secured key is stored in a secured fashion, a method of securing the secured key comprising the steps of:a) accessing stor

이 특허에 인용된 특허 (7)

  1. Tabuki Takaaki,JPX, Authentication method for networks.
  2. Smid Miles E. (Silver Spring MD) Branstad Dennis K. (Gaithersburg MD), Crytographic key notarization methods and apparatus.
  3. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Key authentication method and key authentication apparatus.
  4. Kanevsky Dimitri ; Yung Marcel Mordechay ; Zadrozny Wlodek Wlodzimierz, Method and apparatus utilizing dynamic questioning to provide secure access control.
  5. Haas Zygmunt ; Paul Sanjoy, Methods for providing secure access to shared information.
  6. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  7. Wu Tajen R. ; Shannon William A. ; Fronberg Paul ; Stephenson Donald R. ; Samar Vipin, Pluggable account management interface with unified login and logout and multiple user authentication services.

이 특허를 인용한 특허 (99)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. Tsukamura, Yoshihiro; Funahashi, Takeshi, Authentication system, fingerprint identification unit, and authentication method.
  3. Debrito, Daniel N., Authorization method.
  4. Davis, Mark Charles; Robinson, Douglas Warren, Biometric account card.
  5. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Biometric based multi-party authentication.
  6. LaCous, Mira, Biometric identification network security.
  7. Davis, Steve, Centralized electronic commerce card transactions.
  8. Davis, Steve, Centralized electronic commerce card transactions.
  9. Hammersmith,Wolfgang S.; Gaines,Lance R.; Nicholls,Rod G.; Shank,Byron T., Cryptographic key distribution using key folding.
  10. Slade, Glen Jonathan, Data storage.
  11. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  12. Bottomley,Chris, Electronic security system.
  13. Hamid, Laurence D.; Hillhouse, Robert, Flexible method of security data backup.
  14. Hamid,Laurence; Hillhouse,Robert D., Flexible method of security data backup.
  15. Ushiku, Toru, Information processing apparatus for receiving biometric information from an external apparatus.
  16. Felsher, David Paul, Information record infrastructure, system and method.
  17. Hodges, Jeffrey D., Intrusion threat detection.
  18. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  19. Shiftan, Nicholas; Gauthier, Patrick; Lins, Julie, Method and administration system for management of electronic receipts.
  20. Vandergeest, Ron J.; Hillier, Stephen W., Method and apparatus for dynamically accessing security credentials and related information.
  21. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  22. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  23. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  24. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  25. Shiftan, Nicholas; Gauthier, Patrick; Lins, Julie, Method and apparatus for management of electronic receipts on portable devices.
  26. Shiftan, Nicholas; Gauthier, Patrick; Lins, Julie, Method and apparatus for management of electronic receipts on portable devices.
  27. Berenzweig, Adam L., Method and apparatus for performing authentication in communication systems.
  28. Thomas P. Hardjono, Method and apparatus for secure data storage using distributed databases.
  29. Place, Roger Nicholas; Blackburn, Andrew John; Tennison, Stephen Robert; Rawlinson, Anthony Paul; Crittenden, Barry David, Method and equipment for removing volatile compounds from air.
  30. Shiftan, Nicholas; Gauthier, Patrick; Lins, Julie, Method and portable device for management of electronic receipts.
  31. Shiftan, Nicholas; Gauthier, Patrick; Lins, Julie, Method and server for management of electronic receipts.
  32. Hyppönen, Ari, Method and system for backing up encryption key generated on computer device and accessing encrypted information stored on computer device.
  33. Bahar, Reuben, Method and system for confirming proper receipt of e-mail transmitted via a communications network.
  34. Bortolin, Corinne; Farnsworth, Jean Elizabeth; Nelson, Chris S.; Gordon, James G., Method and system for determining rewards.
  35. Spaeth, Paul; Jones, Douglas; Creighton, Adam, Method and system for implementing a loyalty merchant component.
  36. Redford, Liane; Shimko, Bryan; Mazour, James; Viswanathan, Rajkumar, Method and system for managing limited use coupon and coupon prioritization.
  37. Redford, Liane; Shimko, Bryan; Mazour, James; Viswanathan, Rajkumar, Method and system for managing limited use coupon and coupon prioritization.
  38. Redford, Liane; Shimko, Bryan; Mazour, James; Viswanathan, Rajkumar, Method and system for managing limited use coupon and coupon prioritization.
  39. Spaeth, Paul; Jones, Douglas; Shimko, Bryan; Gordon, James G.; Madore, Kim; Black, Marc; Mazour, James; Salters, Michael, Method and system for managing loyalty program information on a phone.
  40. Bortolin, Corinne; Hammad, Ayman, Method and system for managing reward reversal after posting.
  41. Bortolin, Corinne; Hammad, Ayman, Method and system for managing reward reversal after posting.
  42. Spaeth, Paul; Jones, Douglas; Shimko, Bryan; Gordon, James G.; Madore, Kim; Black, Marc; Mazour, James; Salters, Michael, Method and system for managing token image replacement.
  43. Spaeth, Paul; Jones, Douglas; Shimko, Bryan; Gordon, James G.; Madore, Kim; Black, Marc; Mazour, James; Salters, Michael, Method and system for managing token image replacement.
  44. Spaeth,Paul; Jones,Douglas; Shimko,Bryan; Gordon,James G.; Madore,Kim; Black,Marc; Mazour,James; Salters,Michael, Method and system for managing token image replacement.
  45. Spaeth,Paul; Jones,Douglas; Shimko,Bryan; Gordon,James G.; Madore,Kim; Black,Marc; Mazour,James; Salters,Michael, Method and system for managing token image replacement.
  46. Nguyen, Loc; Hammad, Ayman; Gauthier, Patrick, Method and system for providing a distributed adaptive rules based dynamic pricing system.
  47. Nguyen, Loc; Hammad, Ayman; Gauthier, Patrick, Method and system for providing a distributed adaptive rules based dynamic pricing system.
  48. Nguyen, Loc; Shimko, Bryan; Redford, Liane; Gordon, James G.; Madore, Kim; Black, Marc; Mazour, James; Salters, Michael; Berg, Glenda, Method and system for providing interactive cardholder rewards image replacement.
  49. Nguyen,Loc; Shimko,Bryan; Redford,Liane; Gordon,James G.; Madore,Kim; Black,Marc; Mazour,James; Salters,Michael; Berg,Glenda, Method and system for providing interactive cardholder rewards image replacement.
  50. Nguyen,Loc; Shimko,Bryan; Redford,Liane; Gordon,James G.; Madore,Kim; Black,Marc; Mazour,James; Salters,Michael; Berg,Glenda, Method and system for providing interactive cardholder rewards image replacement.
  51. Costello, Tana; Nguyen, Loc, Method and system for providing reward status.
  52. Costello, Tana; Nguyen, Loc Duc, Method and system for providing reward status.
  53. Nguyen, Loc; Shimko, Bryan; Redford, Liane; Gordon, James G.; Madore, Kim; Black, Marc; Mazour, James; Salters, Michael; Berg, Glenda, Method and system including phone with rewards image.
  54. Bortolin, Corinne; Nguyen, Loc Duc; Redford, Liane, Method and system using wildcard values.
  55. Shiftan, Nicholas; Gauthier, Patrick; Lins, Julie, Method and user device for management of electronic receipts.
  56. Bortolin, Corinne; Nguyen, Loc; Redford, Liane, Method, system and portable consumer device using wildcard values.
  57. Bortolin,Corinne; Nguyen,Loc; Redford,Liane, Method, system and portable consumer device using wildcard values.
  58. Bortolin,Corinne; Nguyen,Loc; Redford,Liane, Method, system and portable consumer device using wildcard values.
  59. Bortolin,Corinne; Nguyen,Loc; Redford,Liane, Method, system and portable consumer device using wildcard values.
  60. Brezak,John E.; Brundrett,Peter T.; Ward,Richard B., Methods and arrangements for controlling access to resources based on authentication method.
  61. Harrison, Ryan James; Wolfe, Christopher, Methods and systems for performing secure authenticated updates of authentication credentials.
  62. Wong,Leon; Aggarwal,Sudhanshu; Beebee,Peter; Vincent,Jesse, Methods and systems for selecting methodology for authenticating computer systems on a per computer system or per user basis.
  63. Elliott, Brig Barnum, Methods and systems for supplying encryption keys.
  64. Bortolin, Corinne; Nguyen, Loc; Redford, Liane, Mobile phone including wildcard data string.
  65. Bortolin, Corinne; Farnsworth, Jean Elizabeth; Nelson, Chris S.; Gordon, James G., Multi-application smart card device software solution for smart cardholder reward selection and redemption.
  66. Hoffberg, Steven M., Multifactorial optimization system and method.
  67. Yokoyama, Akira, Network apparatus.
  68. Redford, Liane; Shimko, Bryan; Nguyen, Loc; Hammad, Ayman, Network centric loyalty system.
  69. Spaeth, Paul; Shimko, Bryan; Levy, Philippe; Toibero, Liz; Garton, Benjamin; Black, Marc; Salters, Michael; Mazour, James, Opt-in/opt-out in loyalty system.
  70. Crosbie, Tanya M. Mastin; Knouse, Charles W., Query string processing.
  71. Yudasaka, Ichio, Recording medium, recording medium reading/writing apparatus, and method of using recording medium.
  72. Qin, Yunchuan; Zhou, Jungang, Secret file access authorization system with fingerprint limitation.
  73. Grove, Brian; Tibbetts, Reed; Khalaf, James; Elteto, Laszlo, Secure authentication using hardware token and computer fingerprint.
  74. Grove, Brian; Tibbetts, Reed; Khalaf, James; Elteto, Laszlo, Secure authentication using hardware token and computer fingerprint.
  75. Abraham, Dennis G., Secure establishment of cryptographic keys using persistent key component.
  76. Carter, Kenneth Russell, Securing access to touch-screen devices.
  77. Hamid, Laurence, Support for multiple login method.
  78. Leeper,Kim, System and method for authenticating electronic documents.
  79. Hoffberg, Steven M., System and method for determining contingent relevance.
  80. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  81. Singh, Shantnu, System and method for processing payment transaction receipts.
  82. Singh, Shantnu, System and method for processing payment transaction receipts.
  83. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  84. Alexander Dorfman ; Jeffrey Wayne Pence, System and method for providing temporary remote access to a computer.
  85. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  86. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  87. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  88. Vennelakanti, Ravigopal; Fernandes, Savio, System, method and apparatus for cryptography key management for mobile devices.
  89. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  90. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  91. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  92. Buckingham, Thomas B.; Davey, Richard A.; Sanclemente, Tammy; Johnson, Ryan M.; Leatham, Adam J.; Wilkinson, Christopher Thomas, Systems and methods for secure logon.
  93. Abbott, Shawn D.; Afghani, Bahram; Anderson, Allan D.; Godding, Patrick N.; Punt, Maarten G.; Sotoodeh, Mehdi, USB-compliant personal key.
  94. Zizzi, Stephen, User authentication system and method for encryption and decryption.
  95. Odom, Gary, User selectable signature.
  96. Odom,Gary, User selection of computer login.
  97. Odom, Gary, User-selectable signatures.
  98. Odom, Gary, User-selectable signatures.
  99. Harris, Scott C., Using biometrics as an encryption key.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로