$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for facilitating data access and management on a secure token 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-040/00
출원번호 US-0727741 (2010-03-19)
등록번호 US-8548923 (2013-10-01)
발명자 / 주소
  • Reed, Sonia
  • Aabye, Christian
출원인 / 주소
  • Reed, Sonia
대리인 / 주소
    Kilpatrick Townsend Stockton LLP
인용정보 피인용 횟수 : 1  인용 특허 : 100

초록

A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is provided in the smart card which allows data stored thereon to be shared by multiple parties. Access to data stored on the smart card is contro

대표청구항

1. A system for facilitating data management on a secure token, comprising: a client having a plurality of applications residing thereon;a secure token having a storage architecture, wherein the storage architecture includes: a directory and one or more attributes associated with the directory, wher

이 특허에 인용된 특허 (100)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Draeger Juergen (Tbingen DEX) Paret Guenter (Herrenberg DEX), Activating circuit for modifying or adding a new program to an electronic device.
  3. Hayakawa Tomihiro (Sayama JPX), Adapter for integrated circuit device, and data transmission system using the same.
  4. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  5. Kanevsky Dimitri ; Maes Stephane Herman, Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic mo.
  6. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  7. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  8. Burger Paul M., Biometric authentication system.
  9. Hoshino Masao (Kawasaki JPX), Card type storage medium and card type storage medium issuing apparatus.
  10. De Jong Eduard Karel,NLX, Coherent data structure with multiple interaction contexts for a smart card.
  11. Proust Philippe,FRX ; Laget Anne,FRX ; Huet Cedric,FRX, Communication system for managing safely and independently a plurality of applications by each user card and corresponding user card and management method.
  12. Varadharajan Vijay,AUX ; Dack David George,GB2, Communication system for portable appliances.
  13. Nukui Harumi (Kanagawa JPX), Computer network capable of accessing file remotely between computer systems.
  14. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  15. Lapointe Brian K. (53 Jerdens La. Rockport MA 01966) Lapointe James A. (43 Ledgewood Dr. Danvers MA 01923), Computer security system.
  16. O'Toole ; Jr. James W. ; Gifford David K., Controlled transfer of information in computer networks.
  17. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  18. Bellovin Steven M. (Westfield NJ) Merritt Michael J. (Berkeley Heights NJ), Cryptographic protocol for remote authentication.
  19. Bellovin Steven M. (Westfield NJ) Merritt Michael (Berkeley Heights NJ), Cryptographic protocol for secure communications.
  20. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  21. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  22. Jones, Julian Hamilton; Lambert, Howard Shelton; Orchard, James Ronald Lewis, Data processing system using active tokens and method for controlling such a system.
  23. David C. Wentker ; Klaus P. Gungl DE, Delegated management of smart card applications.
  24. Bublitz Hermann (Boeblingen DEX) Rindtorff Klaus (Weil im Schoenbuch DEX), Device and method for the simplified generation of tools for the initialization and personalization of and communication.
  25. Wagner Richard Hiers, Editor for developing statements to support i/o operation on open network using segregator for segregating protocol sta.
  26. Hardy Ann Ewing ; Hardy Norman ; Tribble E. Dean, Electronic authority server.
  27. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  28. Wang Ynjiun Paul, Electronic transaction systems and methods therefor.
  29. Haff Maurice W. ; Clarke Christopher D., File transfer system using dynamically assigned ports.
  30. Rovin George H. (Ojai Valley School ; 723 El Paseo Rd. Ojai CA 93023), IC card system with removable IC modules.
  31. Clark Paul C., Intelligent token protected system with network authentication.
  32. Howarth David I. (Middlesex MA), Keyring metaphor for user\s security keys on a distributed multiprocess data system.
  33. Kocher Paul C. ; Jaffe Joshua M., Leak-resistant cryptographic method and apparatus.
  34. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  35. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Logon certification.
  36. Takahashi Masashi (Tokyo JPX) Ikegami Takashi (Yokosuka JPX), Memory card.
  37. Lee Robert D. ; Curry Stephen M. ; Bolan Michael L. ; Kurkowski Hal ; Diaz Donald R. ; Scherpenberg Francis A. ; Peirling Kevin E., Metal token having units of value stored therein using a single wire communication method.
  38. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  39. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  40. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  41. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  42. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  43. Weiss Kenneth P. (Newton MA), Method and apparatus for utilizing a token for resource access.
  44. Kaufman James Harvey ; Sincerbox Glenn Tavernia, Method and means for limiting adverse use of counterfeit credit cards, access badges, electronic accounts or the like.
  45. Iijima Yasuo (Yokohama JPX), Method and system for allocating file area in memory area of IC card.
  46. Hamdy-Swink Kathryn Anne, Method and system for communication access restriction.
  47. Smart David C. ; Cipolla David, Method for archiving film unit information.
  48. Wlodarczyk, Lukasz, Method for authenticating the result of an instruction in a token.
  49. Angelo Michael F. ; Collins David L. ; Kim Donald D. ; Jansen Kenneth A., Method for securely communicating remote control commands in a computer network.
  50. Mittermayer Josef,DEX ; Moreira Alberto,DEX, Method of processing spotlight SAR raw data.
  51. Drupsteen Michel Marco Paul,NLX, Method of securely loading commands in a smart card.
  52. Zizzi Stephen, Method of transparent encryption and decryption for an electronic document management system.
  53. Hohle William ; Petit Frederic, Methods and apparatus for a travel-related multi-function smartcard.
  54. Hohle William, Methods and apparatus for dynamic smartcard synchronization and personalization.
  55. Perlman Radia J. ; Hanna Stephen R., Methods and systems for establishing a shared secret using an authentication token.
  56. Brittenham, Peter J.; Henson, Larry W.; Kleinert, Stephen R., Methods, systems and computer program products for smart card product management.
  57. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  58. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  59. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  60. Le Roux Jean-Yves (La Ciotat FRX), Multi-applications portable card for personal computer.
  61. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,GBX, Multi-view personalized communications agent.
  62. Wagner Richard Hiers, Open network system for I/O operations with non-standard I/O devices utilizing extended protocol including device identi.
  63. Northington Cathy C. ; Goodson Louis J., Open-architecture system for real-time consolidation of information from multiple financial systems.
  64. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  65. Bradney Monty T. ; Stairhime ; Jr. Walter L. ; Reid Herbert Wayne ; Warfel George, Personal verification in a commercial transaction system.
  66. Alson Lee ; Mary L. Gorden, Personalization of smart cards.
  67. Iijima Yasuo (Yokohama JPX), Portable electronic apparatus having key data for limiting memory access.
  68. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  69. Mikurak, Michael G., Problem isolation through translating and filtering events into a standard object format in a network based supply chain.
  70. Boerbert William E. (Minneapolis MN), Secure computer interface.
  71. Benhammou Jean-Pierre ; Baran Dennis F. ; Tonge Phillip D. ; Terry ; Jr. Edward L., Secure memory having multiple security levels.
  72. Rinaldo DiGiorgio ; Michael S. Bender, Secure token device access to services provided by an internet service provider (ISP).
  73. Bruwer Frederick Johannes,ZAX ; Pretorius Pieter Jacobus,ZAX ; Dippenaar Theodor Johannes,ZAX, Secure token integrated circuit and method of performing a secure authentication function or transaction.
  74. Carlisle William Reid (Morristown NJ) Curtis Lydia Anne (Bridgewater NJ) Murphy Kathleen M. (Bedminster NJ) Skibo Richard John (Skillman NJ), Smart card with multiple charge accounts and product item tables designating the account to debit.
  75. Fehrman R. David ; Thaxton Daniel David ; Hileman Martin H. ; Wilkinson Patrick Fitzgerald, Smart card with replaceable chip.
  76. Deo, Vinay; Costea, Mihai; Lotlikar, Mahesh Sharad; Lung, Tak Chung; Milstein, David; Odinak, Gilad, Smart card with volatile memory file subsystem.
  77. Griswold, Chauncey Warner; Hedrick, Joseph R., Smart token.
  78. Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
  79. Hamann Ernst-Michael,DEX ; Kaisser Michael,DEX, Storing data objects in a smart card memory.
  80. Elliott, Isaac K.; Krishnawswamy, Sridhar, System and method for a directory service supporting a hybrid communication system architecture.
  81. Bertina Johannes Marinus George (Canning Vale AUX) Oliver Quentin Rees (South Perth AUX), System and method for performing transactions and a portable intelligent device therefore.
  82. Nakamura Lance S. ; Roberts Alan B. ; Sheets John F.,FRX, System and method for revaluation of stored tokens in IC cards.
  83. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  84. Wagner Richard Hiers, System for extending present open network communication protocols to communicate with non-standard I/O devices directly.
  85. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  86. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  87. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information acce.
  88. Rowney Kevin T. B., System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible.
  89. Weber Jay C. ; Rowney Kevin T. B. ; Kramer Glenn A., System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture.
  90. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.
  91. Rowney Kevin T. B. ; Chen Yuhua, System, method and article of manufacture for secure digital certification of electronic commerce.
  92. Michaels Wayne David,GBX ; Timson Anthony Richard,GBX ; Dervan Aden William,GBX, Telecommunications system with value added service directory and an integrated circuit module therefor.
  93. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  94. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  95. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  96. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  97. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  98. Haverty Rand,CAX, User authentification using a virtual private key.
  99. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  100. Wilkinson Timothy J.,GBX ; Guthery Scott B. ; Krishna Ksheerabdhi ; Montgomery Michael A., Using a high level programming language with a microcontroller.

이 특허를 인용한 특허 (1)

  1. Lee, Kun-Ta, Method of activating a battery.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로