$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for end to end encryption 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-029/06
출원번호 US-0168148 (2011-06-24)
등록번호 US-8775794 (2014-07-08)
발명자 / 주소
  • Benson, Glenn
출원인 / 주소
  • JPMorgan Chase Bank, N.A.
대리인 / 주소
    Hunton & Williams LLP
인용정보 피인용 횟수 : 5  인용 특허 : 34

초록

Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password

대표청구항

1. A method for user authentication, comprising: at least one computer processor receiving a login page from a server, the login page including a value B, wherein the value B is defined as: B=gb mod p where b is an arbitrary number, g is a primitive root, and p is a prime number;sending a Hash-based

이 특허에 인용된 특허 (34)

  1. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  2. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  3. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  4. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  5. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  6. Maurer Ueli (Wil CHX), Cryptographic system based on information difference.
  7. Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
  8. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  9. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  10. Kravitz David W. (Owings Mills MD), Digital signature algorithm.
  11. Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
  12. Leong,Cheah Wee; Ng,William, Electronic menu document creator in a virtual financial environment.
  13. Jansen Cornelis J. A. (Eindhoven NLX), Enciphering/deciphering method and arrangement for performing the method.
  14. Sutter Herbert P.,CAX, Independent distributed database system.
  15. Kumar, Suresh; Kumar, Vijay, Keyless encryption of messages using challenge response.
  16. Compiano,Craig M., Method and apparatus for preauthorizing electronic fund transfers without actual written authentication.
  17. Katz Ronald A., Multiple format telephonic interface control system.
  18. Matyas Stephen M. (Kingston NY), Offline PIN validation with DES.
  19. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  20. Weinstein Stephen B. (Summit NJ), Protection system for intelligent cards.
  21. Ilnicki,Slawomir K.; Shahoumian,Troy, Secure data transfer method and system.
  22. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  23. Elgamal Taher ; Hickman Kipp E.B., Secure socket layer application program apparatus and method.
  24. Peck,Adrian; Harvey,Ian, Secure transmission of data within a distributed computer system.
  25. Henry Paul S. (Holmdel NJ), Stream cipher operation using public key cryptosystem.
  26. Herz, Frederick; Ungar, Lyle; Zhang, Jian; Wachob, David; Salganicoff, Marcos, System and method for providing access to video programs and other data using customer profiles.
  27. Berson,Thomas A.; Dean,R. Drews; Franklin,Matthew K.; Smetters,Diana K., System, method and article of manufacture for providing cryptographic services utilizing a network.
  28. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  29. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  30. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  31. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  32. Katz Ronald A., Telephonic-interface lottery system.
  33. Katz Ronald A., Telephonic-interface statistical analysis system.
  34. Davis Walter Lee ; Rasor Gregg Edward ; Macnak Philip Paul, Transaction authentication for 1-way wireless financial messaging units.

이 특허를 인용한 특허 (5)

  1. Satpathy, Ansuman; Wang, Haitang, Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link.
  2. Satpathy, Ansuman; Wang, Haitang, Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link.
  3. Bradbury, Jonathan D.; Buendgen, Reinhard T.; Greiner, Dan F.; Jacobi, Christian; Paprotski, Volodymyr; Puranik, Aditya N.; Slegel, Timothy J.; Visegrady, Tamas; Zoellin, Christian, Cipher message with authentication instruction.
  4. Ng, Li Huang; Chong, Chee Wah; Yip, Ngai Kain; Lau, Hon Tat; Chan, Wendy Siew Yen; Teo, Tse Chin, Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication.
  5. Juels, Ari, Self-refreshing distributed cryptography.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로