$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for interoperable validation of key recovery information in a cryptographic system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0899855 (1997-07-24)
발명자 / 주소
  • Chandersekaran Coimbatore S.
  • Gennaro Rosario
  • Gupta Sarbari
  • Matyas
  • Jr. Stephen M.
  • Safford David R.
  • Zunic Nevenko
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Kinnaman Jr.
인용정보 피인용 횟수 : 95  인용 특허 : 11

초록

In a cryptographic communications system, a method and apparatus for allowing a sender of encrypted data to demonstrate to a receiver its ability to correctly generate key recovery information that is transmitted along with the encrypted data and from which law enforcement agents or others may recov

대표청구항

[ What is claimed is:] [1.] In a communications system in which a first party transmits encrypted data along with recovery information to a second party who decrypts the encrypted data using a decryption key, said system having one or more key recovery agents for enabling recovery of said decryption

이 특허에 인용된 특허 (11)

  1. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  2. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Yung Marcel Mordechay ; Zunic Nevenko, Cryptographic key recovery system.
  3. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  4. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  5. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  6. Gressel Carmi David (Kvutzat Urim ILX) Dror Itai (Beersheva ILX), Internationally regulated system for one to one cryptographic communications with national sovereignty without key escro.
  7. Cordery Robert A. (Danbury CT) Braun John F. (Weston CT) D\Ippolito Frank M. (Derby CT) Lawton Kathyrn V. (Branford CT) Pauly Steven J. (New Milford CT) Pintsov Leon A. (West Hartford CT) Ryan ; Jr. , Method of token verification in a key management system.
  8. Sudia Frank W. ; Freund Peter C. ; Huang Stuart T.F., Multi-step digital signature method and system.
  9. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  10. Bisbee Stephen F. (Gibson Island MD) Trotter Douglas H. (Baltimore MD), System and method for electronic transmission storage and retrieval of authenticated documents.
  11. Conner Guy (Santa Rosa CA) Schmier Larry (Santa Rosa CA), System and method for secure medical and dental record interchange.

이 특허를 인용한 특허 (95)

  1. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. Cerruti, Julian A.; Rutkowski, Matthew Francis; Shaheen, Amal Ahmed, Adding an additional level of indirection to title key encryption.
  3. Sekar Chandersekaran ; Sohail Malik ; Michael Muresan ; Narayanan Vasudevan, Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery.
  4. Gentry,Craig B.; Silverberg,Alice, Authenticated ID-based cryptosystem with no key escrow.
  5. Slick,Royce E.; Yang,Joseph; Zhang,William, Automatic generation of a new encryption key.
  6. Camenisch, Jan Leonhard; Samelin, Kai, Communication of messages over networks.
  7. Howard, Peter Thomas, Communication security.
  8. Hammersmith,Wolfgang S.; Gaines,Lance R.; Nicholls,Rod G.; Shank,Byron T., Cryptographic key distribution using key folding.
  9. Clayton, Ray; Mendoza, Eliel J.; Cochran, Ronn Warren, Data encryption system and method.
  10. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  11. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  12. Sundaram, Ganapathy S.; Mizikovsky, Semyon B., Discovery of security associations.
  13. Cakulev, Violeta; Mizikovsky, Semyon B., Discovery of security associations for key management relying on public keys.
  14. Lambert, Paul A.; Huang, Frank, Efficient key establishment for wireless networks.
  15. Iwamura, Keiichi, Embedding information in digital image data.
  16. Niwa, Akito; Kawamura, Shinichi; Aoki, Megumi; Saisho, Toshiaki; Ishihara, Tatsuya; Sano, Fumihiko; Hori, Satomi, Encryption apparatus, cryptographic communication system, key recovery system, and storage medium.
  17. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  18. Schechter, Stuart; Rouskov, Yordan I.; Herley, Cormac E.; Kaufman, Charles William, Evidence-based dynamic scoring to limit guesses in knowledge-based authentication.
  19. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  20. Iwamura,Keiichi, Extracting embedded information from digital image data.
  21. Haff, Maurice W.; Clarke, Christopher D., File transfer system.
  22. Haff,Maurice W.; Clarke,Christopher D., File transfer system.
  23. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  24. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  25. Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  26. Vasic, Ognjen; Ansari, Suhail; Gan, Ping; Hu, Jinhui; Khulusi, Bassam; Madoukh, Adam A.; Tyshlek, Alexander, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  27. Takezaki, Satoshi, Information processing apparatus and key recovery method.
  28. Felsher, David Paul, Information record infrastructure, system and method.
  29. Ben-Nun, Eitan; Zayats, Michael; Wing, Daniel G.; Patil, Kirtesh; Padhye, Jaideep; Hungund, Manohar B.; Agasaveeran, Saravanan, Interposer with security assistant key escrow.
  30. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  31. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  32. Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Yamazaki Masashi,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Seiko,JPX ; Morita Ichirou,JPX ; Torii Naoya,JPX ; Ando Hiroyuki,JPX ; Kuroda Yasutsu, Key recovery condition encryption and decryption apparatuses.
  33. Denis Pinkas FR, Key recovery process used for strong encryption of messages.
  34. Johnson, Donald B., Key validation scheme.
  35. Kim, Myungque, Loading boot code from multiple memories.
  36. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  37. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  38. Ramanathan, Ramanathan, Method and apparatus for monitoring encrypted communication in a network.
  39. Brown, Daniel R., Method and apparatus for verifiable generation of public keys.
  40. Przykucki, Robert; Agarwal, Gaurav; Janze, Leo; Jennings, Logan Rand; Bartozynski, Robert, Method and system for automatically migrating encryption keys between key managers in a network storage system.
  41. Vanstone, Scott A., Method and system for generating implicit certificates and applications to identity-based encryption (IBE).
  42. Vanstone, Scott A., Method and system for generating implicit certificates and applications to identity-based encryption (IBE).
  43. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  44. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  45. Vanstone, Scott A., Method for the application of implicit signature schemes.
  46. Vanstone, Scott A., Method for the application of implicit signature schemes.
  47. Vanstone,Scott A., Method for the application of implicit signature schemes.
  48. Maurice W. Haff ; Christopher D. Clarke, Methods and apparatus for secure electronic, certified, restricted delivery mail systems.
  49. Lambert, Paul A., Methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system.
  50. Lambert, Paul A., Methods and apparatus for synchronizing devices in a wireless data communication system.
  51. Hoffberg, Steven M., Multifactorial optimization system and method.
  52. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  53. Baratam, Vamsi Krishna; Aytek, Tolga Nihat, Parallelizing boot operations.
  54. Camenisch, Jan Leonhard; Lehmann, Anja; Neven, Gregory, Password-based authentication.
  55. Bartram,Linda Ruth; Chesser,Mark Miller; Sawadsky,Nicholas; Schumacher,Steven Joseph; Blackstock,Michael, Peer-to-peer authentication for real-time collaboration.
  56. Chu, Chee Hoe; Zhou, Wei; Zheng, Ping; Chang, Po-Chien, Preloading an application while an operating system loads.
  57. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  58. Chen, Liqun, Proving relationships between data.
  59. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  60. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  61. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  62. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  63. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  64. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  65. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  66. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  67. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  68. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  69. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  70. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  71. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  72. Andivahis,Dimitrios Emmanouil; Carnell,Shawn Michael Edwards; Fischer,Addison McElroy; Wettlaufer,Albert John, Secure electronic messaging system requiring key retrieval for deriving decryption keys.
  73. D'Souza, Roy Peter, Securing a secret of a user.
  74. Haff, Maurice W.; Clarke, Christopher D., Selective acceptance of electronic messages in communication systems.
  75. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  76. Guo, Wei Quiang Michael; Howard, John Hal; Chan, Kok Wai, Session key security protocol.
  77. Guo, Wei-Quiang Michael; Howard, John Hal; Chan, Kok Wai, Session key security protocol.
  78. Schechter, Stuart; Reeder, Robert Wilson, Social authentication for account recovery.
  79. Schechter, Stuart; Reeder, Robert Wilson, Social authentication for account recovery.
  80. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  81. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  82. Hoffberg, Steven M., System and method for determining contingent relevance.
  83. Khulusi, Bassam; Vasic, Ognjen, System and method for dis-identifying sensitive information and associated records.
  84. Lambert, Paul A., System and method for generating an identification based on a public key of an asymmetric key pair.
  85. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  86. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  87. Krawetz, Neal A., System and method for secure data transmission.
  88. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  89. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  90. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  91. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  92. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  93. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  94. Haff, Maurice W.; Clarke, Christopher D., Third party authentication of files in digital systems.
  95. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로