$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Removable media for password based authentication in a distributed system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0961631 (1997-10-31)
발명자 / 주소
  • Eldridge Alan D.
  • Kaufman Charles W.
출원인 / 주소
  • International Business Machines Corp.
대리인 / 주소
    Kudirka & Jobse, LLP
인용정보 피인용 횟수 : 139  인용 특허 : 11

초록

A portable medium containing client process identification information for use with a computer system requiring authentication prior to access thereto includes data identifying the client process and a plurality of data sets, each associated with a password, one of the passwords being designated as

대표청구항

[ What is claimed is:] [1.] An apparatus for use with a computer system, the computer system having one or more processes which are accessible by a client process that is authenticated by comparing information derived from a password which is changed from time to time to authentication data in the c

이 특허에 인용된 특허 (11)

  1. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  2. Kung Kenneth C. (Cerritos CA), Distributed user authentication protocol.
  3. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  4. Fujisaki Kunio (Owariasahi JPX) Iwanaga Akiko (Owariasahi JPX), High security IC card with an updatable password.
  5. Okamoto Eiji (Tokyo JPX), Key distribution method.
  6. Maher David P. (Windham NH), Key management scheme for use with electronic cards.
  7. Saada Charles (Louveciennes FRX) Oisel Andr (Louveciennes FRX) Lasnier Francois (Louveciennes FRX), Process for authentication, by an outside medium, of a portable object connected to that medium via a transmission line.
  8. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  9. Cheng Pau-Chen (Yorktown Heights NY) Luan Shyh-Wei (San Jose CA), System and method for policy-based inter-realm authentication within a distributed processing system.
  10. Samar Vipin, System and method to transparently integrate private key operations from a smart card with host-based encryption service.
  11. Newton Farrell ; Williams Gareth, User identification and authentication system using ultra long identification keys and ultra large databases of identif.

이 특허를 인용한 특허 (139)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  6. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  7. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  8. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  11. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  12. Wheeler,Henry Lynn; Wheeler,Anne M., Account authority digital signature (AADS) system using transactional account information.
  13. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  14. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  15. Wu, Peter; Reddy, Sreekanth; Zeng, Jianlin; Liu, Changming, Airtime-based packet scheduling for wireless networks.
  16. Wu, Peter; Reddy, Sreekanth; Zeng, Jianlin; Liu, Changming, Airtime-based packet scheduling for wireless networks.
  17. Wu, Peter; Reddy, Sreekanth; Zeng, Jianlin; Liu, Changming, Airtime-based packet scheduling for wireless networks.
  18. Mynam, Satish K.; Appanna, Chandrashekhar; Djernaes, Martin, Approaches for automatically switching message authentication keys.
  19. Wong,John C.; Ramaiah,Anantha; Khare,Amol; Dalal,Mitesh; Bage,Shrirang; Han,Lin, Approaches for automatically switching message authentication keys.
  20. Mynam, Satish K.; Ramaiah, Anantha; Appanna, Chandrashekhar; Patel, Keyur, Approaches for switching transport protocol connection keys.
  21. Mynam, Satish K.; Ramaiah, Anatha; Appanna, Chandrashekhar, Approaches for switching transport protocol connection keys.
  22. Shimizu, Akihiro; Tsuji, Takasuke, Authentication method, authentication apparatus, and computer product.
  23. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  24. Wang, Huizhao; Liu, Changming; Wu, Peter, Bandwidth sentinel.
  25. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  26. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  27. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  28. Wang, Huizhao; Scheers, Chris; Liu, Changming, Distributed channel selection for wireless networks.
  29. Wang, Huizhao; Scheers, Chris; Liu, Changming, Distributed channel selection for wireless networks.
  30. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  31. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  32. Li, Mingliang; Liu, Changming, Exclusive preshared key authentication.
  33. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  34. Hamid,Laurence; Hillhouse,Robert D., Flexible system and method of user authentication for password based system.
  35. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  36. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  37. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  38. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  39. Villavicencio, Francisco J., Impersonation in an access system.
  40. Villavicencio,Francisco J., Impersonation in an access system.
  41. Hansen, Kurt; Sayor, Thomas, In-lane money transfer systems and methods.
  42. Hansen, Kurt; Sayor, Thomas, In-lane money transfer systems and methods.
  43. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  44. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  45. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  46. Felsher, David Paul, Information record infrastructure, system and method.
  47. Hodges, Jeffrey D., Intrusion threat detection.
  48. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  49. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  50. Carter, Stephen R, Maintaining a soft-token private key store in a distributed environment.
  51. Carter, Stephen R., Maintaining a soft-token private key store in a distributed environment.
  52. Raman, Shankar; Gowda, Kiran Kumar Malle, Management of cryptographic keys for securing stored data.
  53. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  54. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  55. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  56. Zeng, Jianlin; Li, Mingliang; Fan, Peng, Managing rogue devices through a network backhaul.
  57. Zeng, Jianlin; Li, Mingliang; Fan, Peng, Managing rogue devices through a network backhaul.
  58. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  59. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  60. Rajasekaran, Sanguthevar; Hird, Geoffrey R.; Kausik, Balas Natarajan, Method and apparatus for camouflaging of data, information and functional transformations.
  61. Suh, Kyung Joo; Jeong, Sang Soo; Won, Sung Hwan, Method and apparatus for efficient security management of disaster message in mobile communication system.
  62. Tran Robin T. ; Simonich Christopher E., Method and apparatus for providing remote access to security features on a computer network.
  63. Lethe, David, Method and apparatus for storage and use of diagnostic software using removeable secure solid-state memory.
  64. Ooi, Chin Shyan Raymond; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks.
  65. Ooi,Chin Shyan Raymond; Lim,Lay Chuan; Poo,Teng Pin; Tan,Henry, Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks.
  66. Ooi, Chin Shyan Raymond; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks.
  67. Poo, Teng Pin, Method and devices for data transfer.
  68. Rajasekaran,Sanguthevar; Hird,Geoffrey R.; Kausik,Balas Natarajan, Method and system for camouflaging access-controlled data.
  69. Chase Salerno, Michael S.; Dague, Sean; Ferri, Richard; Grundy, Michael H., Method and system for private information exchange in smart card commerce.
  70. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  71. Challener, David Carroll; Dayan, Richard Alan; Ward, James Peter; Vanover, Michael, Method for associating a pass phase with a secured public/private key pair.
  72. Challener, David Carroll; Dayan, Richard Alan; Ward, James Peter; Vanover, Michael, Method for associating a password with a secured public/private key pair.
  73. Derouet, Odile, Method for controlling access to an encrypted programme.
  74. Varghese,John, Method for synchronizing replicas of a database.
  75. Challener,David Carroll; Goodman,Steven Dale, Method of creating password list for remote authentication to services.
  76. Kean, Brian T., Methods and systems for electromagnetic initiation of secure transactions.
  77. Seifert, Dean A.; Sayor, Thomas B.; Baumgart, Mark, Money transfer cards, systems and methods.
  78. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  79. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  80. Hanna, Assaad G.; Hansen, Kurt L.; Seifert, Dean A., Money transfer system and method.
  81. Hanna, Assaad G.; Hansen, Kurt L.; Seifert, Dean A., Money transfer system and method.
  82. Bulawa, Kurt; Bohler, Corey Allen; Seifert, Dean A.; Sayor, Thomas B.; Baumgart, Mark; Crawford, Erik S., Money transfer systems and methods.
  83. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  84. Liu, Liwu; Zeng, Jianlin, Multicast to unicast conversion technique.
  85. Liu, Liwu; Zeng, Jianlin, Multicast to unicast conversion technique.
  86. Liu, Liwu; Zeng, Jianlin, Multicast to unicast conversion technique.
  87. Liu, Liwu; Zeng, Jianlin, Multicast to unicast conversion technique.
  88. Hoffberg, Steven M., Multifactorial optimization system and method.
  89. Ohmori, Motoji; Matsuzaki, Natsume; Futa, Yuichi, Password recovery system.
  90. Laage, Dominic P.; Laage, Maria T., Payment instrument authorization technique.
  91. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  92. Cheng, Chong Seng; Poo, Teng Pin, Portable data storage device.
  93. Poo, Teng Pin; Lim, Lay Chuan, Portable device having biometrics-based authentication capabilities.
  94. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  95. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive and nomadic roaming of wireless clients across different network subnets.
  96. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive and nomadic roaming of wireless clients across different network subnets.
  97. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive and nomadic roaming of wireless clients across different network subnets.
  98. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive and nomadic roaming of wireless clients across different network subnets.
  99. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive roaming between subnets.
  100. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive roaming between subnets.
  101. Liu, Changming; Kang, Yong; Zeng, Jianlin; Reddy, Sreekanth, Predictive roaming between subnets.
  102. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  103. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  104. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  105. Graser, Thomas; Jostmeyer, Bernd; Lenz, Norbert; Schauberer, Andreas; Schaeberle, Wolfgang, Secure access to a plurality of systems of a distributed computer system by entering passwords.
  106. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  107. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  108. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  109. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  110. Wheeler,Lynn Henry; Wheeler,Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  111. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  112. Merry, David E.; Diggs, Mark; Drossel, Gary A.; Hajeck, Michael J., Solid-state storage subsystem security solution.
  113. Uchida, Yoshiaki, Storage device and access control method.
  114. Kobayashi,Hiroyuki; Uchida,Yoshiaki, Storage medium and method and apparatus for separately protecting data in different areas of the storage medium.
  115. Challener,David Carroll, Super secure migratable keys in TCPA.
  116. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  117. Varghese, John, Synchronizing replicas of a database.
  118. Poo, Teng Pin, System and apparatus for compressing and decompressing data stored to a portable data storage device.
  119. Ooi, Chin Shyan; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, System and method for authentication.
  120. Ooi, Chin Shyan; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, System and method for authentication.
  121. Ooi,Chin Shyan; Lim,Lay Chuan; Poo,Teng Pin; Tan,Henry, System and method for authentication.
  122. Hoffberg, Steven M., System and method for determining contingent relevance.
  123. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  124. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  125. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  126. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  127. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  128. Jaber, Muhammed, System and method for securing a computer system.
  129. Devanir Garcia, Jr. BR; John E. Dinger ; Luiz A. Rolim BR, System and method of enhanced directory services for telecommunications management network applications.
  130. Robert, Jean-Marc; Van De Weyer, Koen Jan; Scharre, Katrien B. N., System and method of network equipment remote access authentication in a communications network.
  131. Varghese, John, System for synchronizing replicas of a database.
  132. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  133. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  134. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  135. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  136. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  137. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  138. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  139. Gast, Matthew Stuart; Wang, Liang; Kang, Yong; Conway, Adam Michael, Zero configuration networking on a subnetted network.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로