$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method of verifying cryptographic postage evidencing using a fixed key set 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0340592 (1999-06-28)
발명자 / 주소
  • Cordery Robert A.
  • Lee David K.
  • Pauly Steven J.
  • Pintsov Leon A.
  • Ryan
  • Jr. Frederick W.
  • Weiant
  • Jr. Monroe A.
출원인 / 주소
  • Pitney Bowes Inc.
대리인 / 주소
    Malandra, Jr.
인용정보 피인용 횟수 : 35  인용 특허 : 25

초록

A method for controlling keys used in the verification of encoded information generated by a transaction evidencing device and printed on a document comprises the steps of generating a plurality of random verifier master keys to obtain a set of verifier master keys consisting of a fixed number of ke

대표청구항

[ What is claimed is:] [1.] A method for providing keys used in the verification of encoded information generated by a transaction evidencing device and printed on a document, the method comprising the steps of:generating a plurality of random verifier master keys to obtain a set of verifier master

이 특허에 인용된 특허 (25)

  1. Hardy Douglas A. (Mesa AZ) Lewis Leslie K. (Scottsdale AZ) Altschuler Barry N. (Scottsdale AZ), Algorithm independent cryptographic key management.
  2. Sansone Ronald P. (Weston CT) Schumacher Karl H. (Westport CT) Keating Raymond (Purdys NY) Wall Joseph W. (Monroe CT) Joshi Uday W. (Wilton CT), Central postage data communication network.
  3. Matyas ; Jr. Stephen M. (Manassas VA) Meyer Carl H. W. (Kingston NY) Brachtl Bruno O. (Boeblingen DEX), Controlled use of cryptographic keys via generating station established control values.
  4. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
  5. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication security for single domain networks.
  6. Baker Walter J. ; Bator Feliks ; Cordery Robert A. ; Hunter Kevin D. ; Lawton Kathryn V. ; Loglisci Louis J. ; Pauly Steven J. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A. ; H, Cryptographic key management and validation system.
  7. Matyas Stephen M. (Manassas VA), Cryptographic method for updating financial records.
  8. Cordery Robert A. (Danbury CT) Pauly Steven J. (New Milford CT) Pintsov Leon A. (West Hartford CT), Electronic data interchange postage evidencing system.
  9. Kim Hyung-Kun Paul ; Cordery Robert A. ; Pintsov Leon A., Encryption key control system for mail processing system having data center verification.
  10. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  11. Pastor Jose (Stamford CT), Error tolerant 3x3 bit-map coding of binary data and method of decoding.
  12. Pollard Alan J. (Winnipeg CAX) Lemire James R. (Winnipeg CAX), Key management system for open communication environments.
  13. Pastor Jose (Medinaceli CT ESX) Brookner George M. (Norwalk CT) Cordery Robert A. (Danbury CT) Kim Hyung-Kun P. (Wilton CT), Mail processing system including data center verification for mailpieces.
  14. Pastor Jose (191 Wilton Rd. Westport CT 06880), Method and apparatus for authenticating messages.
  15. Abraham Dennis G. ; Hite Richard K., Method and apparatus for initialization of cryptographic terminal.
  16. Eckert Alton B. (Norwalk CT), Method and apparatus for verifying postage.
  17. Baker Walter J. (Stratford CT) Bator Feliks (Easton CT) Cordery Robert A. (Danbury CT) D\Ippolito Frank M. (Derby CT) Hunter Kevin D. (Stratford CT) Lawton Kathryn V. (Branford CT) Lee David K. (Monr, Method of manufacturing generic meters in a key management system.
  18. Cordery Robert A. (Danbury CT) Braun John F. (Weston CT) D\Ippolito Frank M. (Derby CT) Lawton Kathyrn V. (Branford CT) Pauly Steven J. (New Milford CT) Pintsov Leon A. (West Hartford CT) Ryan ; Jr. , Method of token verification in a key management system.
  19. Fougere Guy L. (Easton CT) Hunter Kevin D. (Redbank NJ) Sansone Ronald P. (Weston CT) Schmidt ; Jr. Alfred C. (Wilton CT), Postage and mailing information applying system.
  20. Sansone Ronald P. (Weston CT) Fougere Guy L. (Easton CT), Postage and mailing information applying system.
  21. Pastor Jose (Westport CT), Reliable document authentication system.
  22. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  23. Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
  24. Edelmann George B. (Wilton CT) Hunter Kevin D. (Redbank NJ) Muller Arno (Westport CT) Schmidt ; Jr. Alfred C. (Wilton CT), System for detecting unaccounted for printing in a value printing system.
  25. Edelmann George B. (Wilton CT) Muller Arno (Westport CT), System for detecting unaccounted for printing in a value printing system.

이 특허를 인용한 특허 (35)

  1. Cameron, Kim; Nanda, Arun K., Account linking with privacy keys.
  2. Rosenau, Dirk; Wagner, Andreas, Arrangement and method for generating a security imprint.
  3. Valente,Luis Filipe Pereira; Cooper,Geoffrey Howard; Shaw,Robert Allen; Sherlock,Kieran Gerard, Declarative language for specifying a security policy.
  4. Gallagher, Thomas Patrick; Renganathan, Venkataramann; Carver, Brian Thomas; Soran, Muhammed Serdar; Swann, Matthew Michael; Ferrier, Trace David, Dynamic cross-site request forgery protection in a web-based client application.
  5. Pagel, Martin J., Evidencing and verifying indicia of value using secret key cryptography.
  6. Pagel,Martin J., Evidencing indicia of value using secret key cryptography.
  7. Pauschinger, Dieter, Franking unit and method for generating valid data for franking imprints.
  8. Felsher, David Paul, Information record infrastructure, system and method.
  9. Overton,John K.; Bailey,Stephen W., Method and apparatus for managing location information in a network separate from the data to which the location information pertains.
  10. Cooper, Geoffrey; Sherlock, Kieran G.; Hoy, Mark, Method and apparatus for rate limiting.
  11. Chen, Liqun; Proudler, Graeme John, Method and apparatus for using a secret in a distributed computing system.
  12. Wong, Shek Duncan; Xiong, Xiaokang, Method for implementing encryption and transmission of information and system thereof.
  13. Jessee, Lucas John, Methods and systems for data recovery.
  14. Hoffberg, Steven M., Multifactorial optimization system and method.
  15. Overton, John K.; Bailey, Stephen W., Network distributed tracking wire transfer protocol.
  16. Overton,John K.; Bailey,Stephen W., Network distributed tracking wire transfer protocol.
  17. Deslandes, Thierry; Lecarpentier, Marc, Process for monitoring the consumptions of franking machines.
  18. Deslandes, Thierry; Lecarpentier, Marc, Process for monitoring the consumptions of franking machines.
  19. Fransen, Frank; Wolthuis, Reinder; Döll, Jeroen, Protectedly reading out an enciphered, cryptographic key.
  20. Sturms, James Richard; Jeffries, Matthew Bryan; Griffin, William James, Refreshing a page validation token.
  21. Chin, Andy; Vikutan, Alina; Liu, Johnny C., Request authentication token.
  22. Chin, Andy; Vikutan, Alina; Liu, Johnny C., Request authentication token.
  23. Kresina, Roman, Resource sharing for document production.
  24. Cordery,Robert A.; Pintsov,Leon A., System and method for controlling a postage metering system using data required for printing.
  25. Hoffberg, Steven M., System and method for determining contingent relevance.
  26. Overton, John; Roizen, Michael F., System and method for establishing and retrieving data based on global indices.
  27. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  28. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  29. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  30. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  31. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  32. Lincoln, Patrick D.; Shankar, Natarajan, System and method using information based indicia for securing and authenticating transactions.
  33. Lincoln, Patrick D.; Shankar, Natarajan, System and method using information based indicia for securing and authenticating transactions.
  34. Lincoln, Patrick D.; Shankar, Natarajan, System and method using information-based indicia for securing and authenticating transactions.
  35. Lincoln,Patrick D.; Shankar,Natarajan, System and method using information-based indicia for securing and authenticating transactions.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로