Sudia et al. - Google Patents
Commercialization of Digital SignaturesSudia et al.
View PDF- Document ID
- 1322694126111339207
- Author
- Sudia F
- Ankney R
- Publication venue
- July
External Links
Snippet
Commercialization of Digital Signatures Page 1 © 1993 by Frank Sudia and Rich Ankney 1
Commercialization of Digital Signatures Frank Sudia Bankers Trust Rich Ankney Fischer
International February 19, 1994 1 Introduction Public-key cryptography is a modern computer …
- 238000005516 engineering process 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5659616A (en) | Method for securely using digital signatures in a commercial cryptographic system | |
| US7904722B2 (en) | Method for securely using digital signatures in a commercial cryptographic system | |
| WO1996002993A9 (en) | Method for securely using digital signatures in a commercial cryptographic system | |
| US6553493B1 (en) | Secure mapping and aliasing of private keys used in public key cryptography | |
| US4868877A (en) | Public key/signature cryptosystem with enhanced digital signature certification | |
| CA2232170C (en) | Document authentication system and method | |
| US7676433B1 (en) | Secure, confidential authentication with private data | |
| US5615268A (en) | System and method for electronic transmission storage and retrieval of authenticated documents | |
| US6237096B1 (en) | System and method for electronic transmission storage and retrieval of authenticated documents | |
| US20040059924A1 (en) | Biometric private key infrastructure | |
| JP2005328574A (en) | Cryptographic system and method with key escrow feature | |
| GB2385955A (en) | Key certification using certificate chains | |
| CN113347008A (en) | Loan information storage method adopting addition homomorphic encryption | |
| KR102804006B1 (en) | System and Method for Servicing Secure Credit Evaluation Data Transaction based on Decentralized SSI | |
| Konashevych | Data insertion in blockchain for legal purposes. How to sign contracts using blockchain | |
| Sudia et al. | Commercialization of Digital Signatures | |
| Moukhliss et al. | A digital identity security model with smart card and public key infrastructure | |
| AU2003253777B2 (en) | Biometric private key infrastructure | |
| Gollmann | PUBLIC KEY INFRASTRUCTURES | |
| Clarke | The Re-Invention of Public Key Infrastructure | |
| Gollmann | Public key infrastructures a tutorial | |
| Information Security Committee | Section of Science and Technology, American Bar Association, Tutorial, 38 | |
| Sedov | Certificate classes | |
| Van Buuren | Information Security in a Distributed Banking Environment, with Specific Reference to Security Protocols |