$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure messaging with disposable keys 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/08
  • H04L-029/06
  • H04L-009/32
  • H04L-029/08
출원번호 US-0588420 (2017-05-05)
등록번호 US-10020938 (2018-07-10)
발명자 / 주소
  • Suominen, Edwin A.
출원인 / 주소
  • Callahan Cellular L.L.C.
대리인 / 주소
    Knobbe Martens Olson & Bear LLP
인용정보 피인용 횟수 : 0  인용 특허 : 90

초록

Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secu

대표청구항

1. A method comprising: receiving, at a secure messaging system, an electronic message for a recipient;generating, at the secure messaging system, an encrypted message using a first key and the electronic message, wherein the first key is operable for a first period of time;storing the encrypted mes

이 특허에 인용된 특허 (90)

  1. Epstein, Michael A., Administration and utilization of private keys in a networked environment.
  2. Holloway Christopher J.,GBX ; Matyas ; Jr. Stephen Michael, Apparatus and method for authentication of printed documents.
  3. Hayosh, Thomas D., Apparatus and method for enhancing check security.
  4. Subler Ronald J. (Charlestown MA) Hastings Thomas Mark (Lexington MA), Assembly, distribution, and use of digital information.
  5. Geist, Bruce K., Autonomously secured image data.
  6. Rohatgi, Pankaj, Commitments in signatures.
  7. Berringer, Ryan R.; Hougaard, Todd R.; Andrus, Richard S., Creating and verifying electronic documents.
  8. Berringer,Ryan R.; Hougaard,Todd R.; Andrus,Richard S., Creating and verifying electronic documents.
  9. Follendore ; III Roy D., Cryptographic access and labeling system.
  10. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  11. Lepetit Olivier (Sur Mer FRX) Revillet Marie-Josephe (Verson FRX), Device and process for securizing a document and graphic authentification code.
  12. Friedman Gary L. (Encino CA), Digital camera with apparatus for authentication of images produced from an image file.
  13. Yoshiura Hiroshi,JPX ; Takaragi Kazuo,JPX ; Sasaki Ryoichi,JPX ; Susaki Seiichi,JPX ; Toyoshima Hisashi,JPX ; Saito Tsukasa,JPX, Digital data authentication method.
  14. Haber Stuart A. ; Stornetta ; Jr. W. Scott, Digital document authentication system.
  15. Paltenghe, Cris T., Digital graphic signature system.
  16. Bakhoum Ezzat G. (P.O. Box 305 Marlton NJ 08053), Digital signature verification technology for smart credit card and internet applications.
  17. Mullin Ronald C.,CAX ; Vanstone Scott A.,CAX, Digital signatures on a smartcard.
  18. Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302) Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651), Document authentication apparatus.
  19. Merkle Ralph C. (Sunnyvale CA) Bloomberg Dan S. (Palo Alto CA) Brown John S. (San Francisco CA), Document copy authentication.
  20. Aisaka Kazuo,JPX, Electronic authentication system.
  21. Takahashi Naoki,JPX ; Shiina Hiromitsu,JPX ; Matsunawa Masahito,JPX ; Yamada Shinichi,JPX ; Kamada Yoshiharu,JPX ; Miyake Tsuyoshi,JPX ; Okamura Akira,JPX ; Tominaga Masasuke,JPX, Electronic business transaction system with notarization database and means for conducting a notarization procedure.
  22. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  23. Petrie ; Jr. Charles J. (Palo Alto CA) Allen Wayne P. (Leander TX), Electronic proof of receipt.
  24. Kitaori Shoji,JPX ; Koganezawa Yuichi,JPX, Electronic signature addition method, electronic signature verification method, and system and computer program product.
  25. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  26. Meunier, Jean-Luc; Dymetman, Marc; Fernstrom, Christer, Encoded sheet material.
  27. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  28. Radia J. Perlman, Ephemeral decryptability.
  29. Blonder Greg E. (Summit NJ), Graphical password.
  30. Zdybel ; Jr. Frank (Palo Alto CA) Sang ; Jr. Henry W. (Cupertino CA) Pedersen Jan O. (Palo Alto CA) Smith ; III Z. E. (Palo Alto CA) Henderson ; Jr. D. A. (Palo Alto CA) Hecht David L. (Palo Alto CA), Hardcopy lossless data storage and communications for electronic document processing systems.
  31. Martino Michael J. (Gardiner NY) Meissner Geoffrey L. (Poughkeepsie NY) Paulsen ; Jr. Robert C. (Highland NY), Identity verification system resistant to compromise by observation of its use.
  32. Graziano James M. (4662 Weld County Road 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication (apparatus).
  33. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  34. Jeffrey C. Smith ; Jean-Christophe Bandini ; Randy Shoup, Method and apparatus for delivering documents over an electronic network.
  35. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for establishing the authenticity of an electronic document.
  36. Turnbull James Arthur,CAX ; Curry Ian H.,CAX ; Van Oorschot Paul C.,CAX ; Hillier Stephen William,CAX, Method and apparatus for extending secure communication operations via a shared list.
  37. Indeck Ronald S. ; Muller Marcel W. ; Morley ; Jr. Robert E., Method and apparatus for fingerprinting and authenticating various magnetic media.
  38. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO), Method and apparatus for fingerprinting magnetic media.
  39. Jaeger, Jr., William L.; Shanton, M. Greg, Method and apparatus for providing human readable signature with digital signature.
  40. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for scene-based video watermarking.
  41. Abadi Martin ; Needham Roger Michael,GBX ; Lomas Thomas Mark Angus,GBX, Method and apparatus for strengthening passwords for protection of computer systems.
  42. Ur Shmuel,ILX, Method and system for identifying the source of documents generated by software and documents generated thereby.
  43. Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
  44. Veil Leonard Scott ; Ward Gary Paul ; Weiss Richard Alan ; Murray Eric Alan, Method and system for secure transactions in a computer system.
  45. Craig, James; Osburn, Andrew; Cockerill, Carter; Bernard, Jeremy; Boyle, Mark, Method and system for securely recording a verbal transaction.
  46. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  47. Jean-Luc Meunier FR; Antonietta Grasso FR, Method for indexing and retrieval of physical documents.
  48. Pauschinger Dieter,DEX, Method for operating a digitally printing postage meter to generate and check a security imprint.
  49. Park Chang Soon,KRX ; Kim Tae Geun,KRX ; Tak Sung Woo,KRX, Method for preparing safe electronic notarized documents in electronic commerce.
  50. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method for secure time-stamping of digital documents.
  51. Rubin Aviel D. (East Hanover NJ), Method for the secure distribution of electronic files in a distributed environment.
  52. Horino Naoharu,JPX ; Suto Masayuki,JPX ; Matsui Kineo,JPX, Method of and apparatus for embedding data into an electronic document by modulating spaces between words.
  53. Preneel Bart K. B. (Heverlee BEX) Van Oorschot Paul C. (Ottawa CAX), Method of building fast MACS from hash functions.
  54. Behnke Alfons,DEX, Method of encoding identification cards and verifying such encoded identification cards, and apparatus for carrying out.
  55. Naccache David (Maisons-Alfort FRX), Method, identification device and verification device for identificaiton and/or performing digital signature.
  56. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  57. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  58. Terao,Taro, One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device.
  59. Narayanaswami, Chandrasekhar, Password protection using spatial and temporal variation in a high-resolution touch sensitive display.
  60. Bloomberg Dan S., Performing document image management tasks using an iconic image having embedded encoded information.
  61. Davis Derek L., Peripheral device preventing post-scan modification.
  62. Fischer Addison M., Personal date/time notary device.
  63. Pintsov Leon A. (West Hartford CT) Connell Richard A. (South Salem NY) Sansone Ronald P. (Weston CT) Schmidt Alfred C. (Wilton CT), Postal rating system with verifiable integrity.
  64. Slater, Calvin N.; Rasmussen, Andy L., Processing electronic documents with embedded digital signatures.
  65. Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
  66. Ganesan Ravi, Programmed computer for generating pronounceable security passwords.
  67. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  68. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  69. Anderson Milton M., Re-initialization of an iterated hash function secure password system over an insecure network connection.
  70. Pastor Jose (Westport CT), Reliable document authentication system.
  71. Jalili Reza, Secure data entry and visual authentication system and method.
  72. Fielder Guy L ; Alito Paul N, Secure deterministic encryption key generator system and method.
  73. Giest,Bruce K.; Hayosh,Thomas D., Self-authentication of value documents using digital signatures.
  74. Kaish Norman ; Fraser Jay ; Durst David I., System and method for authentication of goods.
  75. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for certifying content of hard-copy documents.
  76. Brown, Bruce E.; Israelsen, D. Brent, System and method for document-driven processing of digitally-signed electronic documents.
  77. Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
  78. Lloyd, Michael; Shepley, Christopher; Stidman, Sean; Browne, H. Lee; Generous, Curtis; Lycas, John, System and method for personalizing electronic mail messages.
  79. Birgit Baum-Waidner CH, System and method for providing commitment security among users in a computer network.
  80. Heckman Dean A. (Palmyra NY) Tuttle Steven R. (Rochester NY) Qureshi Irshad H. (Fairport NY), System for electronically printing plural-color tamper-resistant documents.
  81. Berson William, System for identifying authenticating and tracking manufactured articles.
  82. Gary S. Brown, System for remote pass-phrase authentication.
  83. Clark John I. (Milford CT) Eckert Alton B. (Norwalk CT) Warren David M. (Woodmere NY), System for the printing and reading of encrypted messages.
  84. Goldstein, Richard J., System, method and article of manufacture for knowledge-based password protection of computers and other systems.
  85. Christopher B. Burfield ; Alan C. Van Ness, Technique for integrating electronic accounting systems with an electronic payment system.
  86. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  87. Garland Harry (Los Altos Hills CA) Melen Roger (Los Altos Hills CA), Unified scanner computer printer.
  88. Ritter Terry F., Variable size block ciphers.
  89. Rhoads Geoffrey B., Video steganography.
  90. Keller Neal Martin ; Pickover Clifford Alan, Visual access to restricted functions represented on a graphical user interface.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로