再比如这个
United States Patent 7,406,601
Hamid July 29, 2008
--------------------------------------------------------------------------------
Secure messaging for security token
Abstract
A method
--------------------------------------------------------------------------------
Inventors: Hamid; Laurence (Ottawa, CA)
Assignee: Activecard Ireland, Ltd. (Dublin, IE)
Appl. No.: 10/443,977
Filed: May 23, 2003
--------------------------------------------------------------------------------
Current U.S. Class: 713/186 ; 726/20
Current International Class: H04L 9/20 (20060101); G06F 21/00 (20060101)
--------------------------------------------------------------------------------
References Cited [Referenced By] 点这个后显示无内容,是不是就是没有引证其它专利?
--------------------------------------------------------------------------------
U.S. Patent Documents 这一段是什么意思呢?表明引用的美国专利么?
5987155 November 1999 Dunn et al.
6011858 January 2000 Stock et al.
6092202 July 2000 Veil et al.
6219439 April 2001 Burger
6591249 July 2003 Zoka
6629591 October 2003 Griswold et al.
6735695 May 2004 Gopalakrishnan et al.
7114646 October 2006 Hillhouse
2002/0030581 March 2002 Janiak et al.
2002/0174346 November 2002 Ting
Foreign Patent Documents 这儿呢?引用 的国外专利情况?
2 780 797 Jan., 2000 FR
Other References 还有这儿呢? 指的是文献引用情况么?
Ratha et al., Secure Data Hiding in Wavelet Compressed Fingerprint Images, 2000, ACM Multimedia Workshop, pp. 127-130. cited by examiner .
Satonaka, Biometric Watermark Authentication with Multiple Verification Rule, IEEE, 2002, pp. 597-606. cited by examiner .
Mimura et al., \"Fingerprint Verification System on a Smart Card\", 2002, IEEE, pp. 182-183. cited by examiner .
Seto, \"Development of Personal Authentication Systems using Fingerprint with Smart Cards and Digital Signature Technologies\", Dec. 2002, Seventh International Conference on Control, Automation, Robotics and Vision, Dec. 2002, Singapore, pp. 996-1001. cited by examiner .
Abadi, M. et al., \"On Hiding Information from an Oracle,\" Proceedings of the Annual Conferences on Structure in Complexity Theory, Ithaca, Jun. 16-19, 1987, Conf. 2, 1-29. cited by other .
Ishida, S. et al., \"Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,\" IEICE Transactions on Information and Systems, Tokyo, Japan, Jul. 2001, 812-818. cited by other .
Ozaki, S. et al., \"Speeding up Fingerprint Verification with Insecure Auxiliary Devices,\" International Solvent Extraction Conference, Mar. 16, 1990, 17-24. cited by other .
Matsumoto, T. et al., \"Speeding up Secret Computations with Insecure Auxiliary Devices,\" Advances in Cryptology, Santa Barbara, Aug. 21-25, 1988, 497-506. cited by other.
Primary Examiner: Zand; Kambiz
Assistant Examiner: Powers; William S
Attorney, Agent or Firm: Perkins Coie LLP
--------------------------------------------------------------------------------
Claims
--------------------------------------------------------------------------------
What is claimed is: |