http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2008085579-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_dd852b225b407b2b4d316b2c46e639e3
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_2a8b9c9db853dee02abb30ab7dbba27c
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_b708e60203407e637492a2a4b7b25dc1
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_79774814f2313a87755af01d41d31da1
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1c7efad1bfcaa7310f020346135ee9f7
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-20
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3236
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3066
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3252
filingDate 2007-10-25-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_783eccb7e091d355cfed43efce4fbe43
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_904db4dc252ceeae0ae67ce8d644d032
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_fc34c2c2af94df78faacbf5ad796b4fc
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c38262c142d2c33927c8b122f76aa2ad
publicationDate 2008-07-17-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2008085579-A2
titleOfInvention Method and system for deploying advanced cryptographic algorithms
abstract A method and system for deploying a suite of cryptographic algorithms including: providing a legacy cryptographic interface associated with a legacy operating system and a legacy application, and supports a suite of legacy cryptographic algorithms; providing a suite of advanced cryptographic algorithms that includes one or more of an advanced asymmetric key algorithm, an advanced symmetric key algorithm, and/or an advanced hash function; providing an advanced cryptographic interface that is independent of the legacy operating system and the legacy application, backwards compatible with the legacy cryptographic interface, and capable of supporting the suite of advanced cryptographic algorithms; and transparently and automatically substituting the suite of advanced cryptographic algorithms for the legacy cryptographic algorithms through the invocation of the advanced cryptographic interface at the time of an initial performance of encrypting, hashing, digitally signing the hash of, decrypting, re-hashing, and/or validating the digital signature of an item.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/KR-102269335-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/KR-20210046363-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110011995-B
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110011995-A
priorityDate 2006-10-25-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2006149962-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/KR-20040000925-A
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID164073
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCP19879
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID411573
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ8MJF1
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID411573
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ9DE65
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID4969
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCP20774
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ9W6H0
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ62000
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415859406
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID18295
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ5RBL2

Total number of triples: 40.