Matches 1 - 50 out of 103 1 2 3 >


Match Document Document Title
US20140359294 CONFIGURABLE, SECURE QUICK RESPONSE CODE CREATION AND USE  
Systems, software, and methods are provided for configurable, encrypted, secure QR code creation and use. Furthermore, these codes can be used by many entities to provide improved monitoring for a...
US20130198520 UNATTENDED CODE UPDATE OF STORAGE FACILITY  
Various embodiments for providing an update to at least one storage facility in a computing storage environment are provided. In one embodiment, media is received in one or more updatable elements...
US20100313028 Electronic Signature Method and Electronic Signature Tool  
The present invention provides an electronic signature method and an electronic signature tool. The method includes: outputting verification prompt information; receiving verification confirmation...
US20140289516 PORTABLE DIGITAL VAULT AND LENDING OF SAME  
A portable digital vault and related methods are disclosed that can provide a digital equivalent to the physical act of lending copyrighted content (such as a book or CD) while also providing...
US20120278614 USER AUTHENTICATION SYSTEM, USER AUTHENTICATION APPARATUS, SMART CARD, AND USER AUTHENTICATION METHOD FOR UBIQUITOUS AUTHENTICATION MANAGEMENT  
A user authorization system, a user authorization apparatus, a smart card, and a user authorization method for ubiquitous authorization management are disclosed. The user authorization system for...
US20100019031 Forged Card Discrimination System  
A forged card discrimination system, an authenticity determination information writing device and a forged card discrimination device which can directly utilize an existing cash card or a credit...
US20110258453 METHOD AND APPARATUS FOR AUTHENTICATION TOKEN-BASED SERVICE REDIRECTION  
A method, apparatus, and computer readable medium is provided. According to an embodiment, a method includes, receiving a message from a client. The method further includes, forwarding the message...
US20100325428 System and Method for Authentication of a Hardware Token  
A method for authentication. A computer obtains a random number R generated by a hardware token. The computer forms and returns to the hardware token a signature Ck′(R) formed using the random...
US20120239934 CREATION OF USER DIGITAL CERTIFICATE FOR PORTABLE CONSUMER PAYMENT DEVICE  
A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate...
US20120216042 System and Method for Provisioning Device Certificates  
A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established...
US20110060904 SECURE SYSTEM FOR THE ISSUANCE, ACQUISITION, AND REDEMPTION OF CERTIFICATES IN A TRANSACTION NETWORK  
A transaction network contains a networked certificate authority, by which one or more virtual certificates may be remotely defined and stored, such as by an issuer user through a issuer web...
US20070005956 Remote certificate management  
A system for managing security certificates on a plurality of remote computers comprises a certificate manager that can determine in accordance with at least one preestablished criterion whether a...
US20110238995 METHODS FOR AUTHENTICATION USING NEAR-FIELD  
Authentication methods are used to authenticate, a device1 having an ESN1 (electronic serial number), a device2 having an ESN2, and/or a user of the devices. In one implementation, device1...
US20080072048 Enabling Use of a Certificate Stored in a Smart Card  
If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the...
US20120297195 ENABLING USE OF A CERTIFICATE STORED IN A SMART CARD  
If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the...
US20080155262 System and method for tamper evident certification  
A storage device has a storage medium, a set of credentials stored on the storage medium, and a controller. The controller within the storage device is coupled to the storage medium, and adapted...
US20100031046 Method for Authorizing Access to at Least One Automation Component of a Technical System  
A method for authorizing access of different types to an automation component of a technical system and, if needed, logging and digitally signing them, is provided. An authorization unit, for...
US20070055877 Security in a communication network  
Disclosed is a method of establishing a secured peer-to-peer communication between two communications devices, each communications device having stored a respective set of previously established...
US20140372762 TRUSTED DEVICE  
A trusted device, such as a wristwatch 2, is provided with authentication circuitry 26, used to perform an authentication operation to switch the trusted device into an authenticated state....
US20060101268 Communications method and communications device  
The present invention relates to a communication method that includes an operation of receiving a succession of pages originating from a first site of a computer network. That method further...
US20140281553 SECURE COMMUNICATIONS KIT AND CLIENT DEVICE FOR SECURELY COMMUNICATING USING THE SAME  
A secure communication kit is disclosed. The secure communication kit may include a plurality of tangible security tokens; each security token storing one or more cryptographic keys and a group...
US20080046735 SECURE NETWORK DEPLOYMENT  
In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is...
US20080086766 CLIENT-BASED PSEUDONYMS  
Obtaining tokens with alternate personally identifying information. A method may be practiced, for example, in a networked computing environment including a client and a token issuer. The token...
US20080250246 Method for Controlling Secure Transactions Using a Single Multiple Dual-Key Device, Corresponding Physical Deivce, System and Computer Program  
A device is provided for controlling secure transactions using a physical device held by a user and bearing at least one first pair of asymmetric keys, including a first device public key and a...
US20070234055 Communication system, network device and program  
There is provided a communication system in which a network device and an information processing device are communicatably connected to each other through a network. The network device comprises a...
US20070266249 Implicit trust of authorship certification  
Techniques for establishing implicit trust of authorship certification are provided. A message's domain is validated in response to a valid domain certificate. A message's author is validated in...
US20080086634 Techniques for using AAA services for certificate validation and authorization  
In one embodiment, techniques to validate certificates using authentication, authorization, and accounting (AAA) services are provided. A service receives a request from a requester for validation...
US20060075222 System for personal group management based on subscriber certificates  
A method and corresponding equipment, for enabling a subscriber device (14) to engage a service provided by a server (12) to give a friend device (15) access to the service, including a step (21)...
US20070180248 Process for the authentication of products  
A process for the generation of product authentication certificates with steps for: the generation of data identifying each product in a unique manner and storage of these data in a product...
US20140304514 APPLICATION PROGRAMMING INTERFACE FOR WEB APPLICATION PLATFORM SECURITY SYSTEM  
The present invention includes a system for monitoring the transmission of digital files across a secured boundary of a private ecosystem. Because an application programming interface making calls...
US20060064580 Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority  
A low-cost, network based, secure printer that can provide multiple vendors with independent protected access, as authorized by a secure printer authority, is provided. The secure printer...
US20060010325 Security system for computer transactions  
A Security system for computer transactions incorporates a USB Security Key, a remote terminal and a secure access appliance to provide Security for a central computer. The USB Security Key is...
US20060282661 System and method of providing certified document retrieval  
A method of providing a certified digital copy of a certified document for display on a requesting party mobile terminal display screen is provided. The method includes retrieving the certified...
US20080098214 Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media  
An encryption/decryption method is disclosed. The method comprises: using at least one public encryption algorithm for encrypting/decrypting data by using an encryption key, and using a digital...
US20140359295 METHOD OF TRANSFERRING THE CONTROL OF A SECURITY MODULE FROM A FIRST ENTITY TO A SECOND ENTITY  
A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain controlled by the first entity by at...
US20100293382 VERIFICATION OF PORTABLE CONSUMER DEVICES  
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB...
US20070016781 Secure data transfer  
The invention concerns secure data transfer from a first radio communication device of a first party to a second radio communication device. A random first symmetric key is generated at the first...
US20060020801 Adaptive management method with workflow control  
A self-adaptive resource management method and a corresponding system. An authority publishes multiple rules into a corresponding repository. Each rule defines a desired target configuration for a...
US20080072037 Robust peer-to-peer networks and methods of use thereof  
A method of authentication of peers of a peer-to-peer network includes a certificate issuer tracking at most a predetermined number of node IDs for each peer on the peer-to-peer network, a...
US20070199075 Method of and device for generating authorization status list  
A method of generating an authorization status list, comprising generating a run-length encoded representation of an authorization status of a number of devices and storing the representation in...
US20070150744 Dual authentications utilizing secure token chains  
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code...
US20060230270 Method and apparatus for providing status information from a security and automation system to an emergency responder  
An access portal is provided for establishing communication between an environmental management system used on a premises and an authorized responder equipped with an external access device. In...
US20070220258 Method, apparatus, and computer product for computing credibility  
A credibility computing apparatus calculates credibility of a certificate based on use duration of the certificate. The use duration is a duration from the date of issue of the certificate to the...
US20070074019 Method and system for establishing trust in a peer-to-peer network  
A method and system for establishing trust in a peer-to-peer network is disclosed. According to one embodiment, a computer implemented method comprises receiving a certificate associated with...
US20080091949 Propagation of authentication data in an intermediary service component  
A system may include a sender computing system, an intermediary service component, and a receiver computing system. The sender computing system may transmit a message and authentication data, and...
US20070098176 Wireless LAN security system and method  
A wireless LAN security system and method. The system includes a separate server managing an encryption key and an authentication certificate used for security, and providing the encryption key...
US20070154014 Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel  
A system and method for establishing a trusted connection on a mobile computing device. A shared secret is generated on a trusted platform of the mobile computing device. The shared secret is...
US20060288224 SYSTEM AND METHOD FOR DETECTING EXPOSURE OF OCSP RESPONDER'S SESSION PRIVATE KEY  
A system and method for detecting exposure of an OCSP responder's session private key in a D-OCSP-KIS to verify the status of a user's certificate online are provided. The system includes: a...
US20070220257 Controlled-Access Recording Generator  
A recording system for securely recording an event, the system including: a capturing device for an owner to capture signals from the event, and for converting the signals into digital data; a...
US20070016801 Method, apparatus, and product for establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform  
A method, apparatus, and computer program product are disclosed in a data processing system for establishing virtual endorsement credentials. The data processing system includes a hardware trusted...

Matches 1 - 50 out of 103 1 2 3 >