$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for strengthening passwords for protection of computer systems 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-009/00
출원번호 US-0866673 (1997-06-02)
발명자 / 주소
  • Abadi Martin
  • Needham Roger Michael,GBX
  • Lomas Thomas Mark Angus,GBX
출원인 / 주소
  • Digital Equipment Corporation
대리인 / 주소
    Pennie & Edmonds LLP
인용정보 피인용 횟수 : 57  인용 특허 : 7

초록

A computer implemented method provides access to processes and data using strengthened password. During an initialization phase, an access code is stored in a memory of a computer system. The access code is an application of a one-way hash function to a concatenation of a password and a password sup

대표청구항

[ We claim:] [26.] A computer program product for use in conjunction with a computer system, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising:a first module for establishing a passw

이 특허에 인용된 특허 (7)

  1. Merrick Roland A. (Worchestershire GBX), Cryptography system.
  2. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for controlling access to encrypted data files in a computer system.
  3. Kaufman Charles William (Northboro MA), Method and apparatus for cryptographic authentication.
  4. Swift Michael M. ; Van Dyke Clifford P. ; Misra Pradyumna Kumar, Method for changing passwords on a remote computer.
  5. Anderson Milton M., Re-initialization of an iterated hash function secure password system over an insecure network connection.
  6. Wittenberg David K. (Hudson MA) Leichter Jerrold S. (Stamford CT), System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and gr.
  7. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.

이 특허를 인용한 특허 (57)

  1. Rittle, Loren J.; Mohapatra, Shivajit; Williams, Jay J.; Shah, Krunal S., Authentication using a subset of a user-known code sequence.
  2. Ong, Peng T., Consolidation of user directories.
  3. Michael S. Borella ; David A. Grabelsky ; Dan Nessett, Control channel security for realm specific internet protocol.
  4. Boyen, Xavier, Cryptographic system with halting key derivation function capabilities.
  5. Boyen, Xavier, Cryptographic system with halting key derivation function capabilities.
  6. Levner, David, Distributed storage of password data.
  7. Suominen, Edwin A, Encryption and authentication systems and methods.
  8. Suominen, Edwin A., Encryption and authentication systems and methods.
  9. Suominen, Edwin A., Encryption and authentication systems and methods.
  10. Kitamura, Hiroshi, Identification information management system, method of generating and managing identification information, terminal, and generation and management programs.
  11. Suzuki, Koji, Information processing apparatus and computer readable medium for preventing unauthorized operation of a program.
  12. Felsher, David Paul, Information record infrastructure, system and method.
  13. Borella, Michael S.; Beser, Nurettin B.; Sidhu, Ikhlaq S.; Schuster, Guido M., Internet telephony using network address translation.
  14. Borella, Michael S.; Beser, Nurettin B.; Sidhu, Ikhlaq S.; Schuster, Guido M., Internet telephony using network address translation.
  15. David Carroll Challener ; Barry Douglas Atkins ; Todd W. Arnold, Method and apparatus for establishing computer configuration protection passwords for protecting computer configurations.
  16. Borella,Michael S.; Beser,Nurettin B., Method and application programming interface for assigning multiple network addresses.
  17. Borella, Michael S.; Grabelsky, David; Sidhu, Ikhlaq; Petry, Brian D., Method and protocol for distributed network address translation.
  18. Borella, Michael S.; Grabelsky, David, Method and system for address server redirection for multiple address networks.
  19. Borella, Michael S.; Beser, Nurettin B.; Grabelsky, David, Method and system for allocating persistent private network addresses between private networks.
  20. Borella,Michael S.; Jaszewski,Gary; Nessett,Danny M., Method and system for controlling attacks on distributed network address translation enabled networks.
  21. Borella, Michael S.; Grabelsky, David, Method and system for distributed generation of unique random numbers for digital tokens.
  22. Borella, Michael S.; Grabelsky, David; Mahler, Jerry; Sidhu, Ikhlaq, Method and system for distributed network address translation for mobile network devices.
  23. Grabelsky,David; Borella,Michael S.; Sidhu,Ikhlaq; Nessett,Danny M., Method and system for distributed network address translation with network security features.
  24. Borella, Michael S.; Grabelsky, David, Method and system for dual-network address utilization.
  25. Challener, David Carroll; Peyravian, Mohammad; Resnick, Russell Alan, Method and system for password protection of a data processing system that permit a user-selected password to be recovered.
  26. Grabelsky,David A.; Borella,Michael S.; Poplett,John; Dynarski,Richard J., Method for address mapping in a network access system and a network access device for use therewith.
  27. Swann, Matthew Michael; LeBlanc, David Charles, Method for generating and detecting auditable passwords.
  28. Borella,Michael S.; Joseph,Boby; Grabelsky,David A., Method for supporting secondary address delivery on remote access servers.
  29. Hoffberg, Steven M., Multifactorial optimization system and method.
  30. Clubb, Kenneth Wayne, Password enhancing device.
  31. Mantin, Itsik, Password protection.
  32. Sanai,Daiji; Arimoto,Michiharu; Mishima,Takashi; Seki,Hidenobu, Password strength checking method and apparatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof.
  33. Suominen, Edwin A., Secure messaging with disposable keys.
  34. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Thomas; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for analyzing de-identified health care data.
  35. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Thomas; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for analyzing de-identified health care data.
  36. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Tom; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for analyzing de-identified health care data.
  37. Hoffberg, Steven M., System and method for determining contingent relevance.
  38. Quigley, Benjamin; Sandler, Robert; Jones, Fletcher; Mahajan, Rajesh; Muppirala, Prakash; Lowe, David; Price, Laura; Goldstein, Seth; Subramanya, Venkatesh; Rawat, Jai, System and method for electronic wallet conversion.
  39. Kress, Andrew E.; Stevens, Steve E.; Martin, Ann R., System and method for encrypting provider identifiers on medical service claim transactions.
  40. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Tom; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for generating de-identified health care data.
  41. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Tom; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for generating de-identified health care data.
  42. Ober,N. Stephen; Grubmuller,John; Farrell,Maureen; Wentworth,Charles; Gilbert,Tom; Barrett,Kevin; Davis,Steven; Nordman,Erik; Grenier,Randell, System and method for generating de-identified health care data.
  43. Abadi Martin ; Bharat Krishna ; Marais Johannes, System and method for generating unique passwords.
  44. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  45. Bauchot, Frederic; Marmigère, Gerard, System and method for password validation based on password's value and manner of entering the password.
  46. Matzkel, Ben; Tal, Maayan; Lahav, Aviad, System and method for protecting access to authentication systems.
  47. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  48. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  49. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  50. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  51. Stevens, Steven E.; Kress, Andrew E.; Dublin, Adam, System and method for the protection and de-identification of health care data.
  52. Serpa, Michael Lawrence, System and method for user authentication with enhanced passwords.
  53. Serpa, Michael Lawrence, System and method for user authentication with enhanced passwords.
  54. Donnelly, Austin; Gunawardena, Dinan; Zugenmaier, Alf; Scott, Jacob, System security using human authorization.
  55. Lee,Kun Hak, User authentication method using password.
  56. Suominen, Edwin A., Verification of signed digital documents.
  57. Suominen, Edwin A., Verification of signed video streams.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로