Match Document Document Title
8583917 Distribution of certification statements into repository  
A method and apparatus for distributing certification statements. Digital certificates are stored in a plurality of entries in a repository. Certification statements that include revocation status...
8584218 Disconnected credential validation using pre-fetched service tickets  
One or more user service tickets are obtained (i.e. pre-fetched) from an authentication server and stored in a ticket cache. The user service tickets facilitate a login device communicating with...
8583932 Signature device, signature verification device, anonymous authetication system, signing method, signature authentication method, and programs therefor  
[Problem] Provided is an anonymous authentication system which can issue an anonymous authentication certificate that can hold any number of attributes.[Means for Solving the Problem]A signature...
8584214 Secure server certificate trust list update for client devices  
A method, a network element, and a client device for creating a trusted connection with a network are disclosed. A client device 104 may attempt to access a sub-network 106. The client device 104...
8583916 System and method for issuing digital certificate using encrypted image  
The present invention relates to a system and method for issuing a digital certificate using an encrypted image, in which a digital certificate is sealed in a digital envelope image so as to...
8583935 Wireless network having multiple communication allowances  
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of...
8578508 Information recording medium manufacturing system, apparatus, and method for recording in an information recording medium contents and contents code files  
An information processing apparatus includes: a data processing unit that acquires content codes including a data processing program recorded in an information recording medium and executes data...
8578506 Digital rights management in user-controlled environment  
A method of controlling access to content comprises receiving, at a domain gateway (3) of a domain (4), a request from a device (5) in the domain for access to the content. It is determined at the...
8578167 System, apparatus, method, and program product for authenticating communication partner using electronic certificate containing personal information  
Object To provide a technique for authenticating a communication partner using an electronic certificate containing personal information. Solving Means When a client apparatus receives a request...
8578445 Micro and macro trust in a decentralized environment  
A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first...
8578175 Secure object having protected region, integrity tree, and unprotected region  
A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected region containing at least one of...
8578025 Switching between connectivity types to maintain connectivity  
Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity...
8578151 Trust-management systems and methods  
The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources,...
8578471 Information processing apparatus and security protection method  
According to one embodiment, an information processing apparatus includes an input to input a password, a biological authentication device including a storage unit for storing biological...
8578460 Automating cloud service reconnections  
Technologies are generally described for automatically reconnecting a security principal to cloud services through correlation of security principal identifier attributes. A new security principal...
8578152 Methods, systems, and apparatus for staggered renewal periods  
An embodiment relates generally to receiving a plurality of security certificates for each user of a plurality of users and generating a random renewal period for a selected security certificate....
8578159 Method and apparatus for establishing security association between nodes of an AD HOC wireless network  
A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication,...
8572367 System and method for reducing computations in an implicit certificate scheme  
There are disclosed systems and methods for reducing the number of computations performed by a computing device constructing a public key from an implicit certificate associated with a certificate...
8572696 Contextual data aided security protection  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual data aided security protection. In one aspect, a method includes...
8572715 Method for use in a network based safety data storage system  
In a method for use in a data storage system which applies high safety requirements for the storage of data on a server in a telecommunications network and for the retrieval of the files by the...
8572389 System and method for protecting master encryption keys  
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices....
8572727 System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies  
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system...
8566916 Agile OTP generation  
A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator...
8566580 Splitting an SSL connection between gateways  
A system for secure communication, including a first security computer communicatively coupled with a client computer via an SSL connection, including a certificate creator, for receiving...
8566582 System and method for searching and retrieving certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one broad aspect, a method is provided in which a certificate search...
8566581 Secure inter-process communications  
Securing inter-process communications includes receiving, from a device that supports a first process that is an instantiation of a first application being executed, a request to initiate...
8566249 Methods and systems for authentication and authorization  
A computer-implemented method for ensuring non-repudiation of a payment request and/or other action may include a step of receiving, over a network, the payment request together with a digital...
8560848 Galois/counter mode encryption in a wireless network  
A system including a temporal key module, a nonce module, a security module, and an encryption module. The temporal key module generates a first temporal key used to encrypt a plurality of...
8560834 System and method for client-side authentication for secure internet communications  
A system and method for client-side authentication for secure Internet communications is disclosed. In one embodiment, an intermediate device receives a web browser secure socket layer certificate...
8560838 Document disposal certification apparatus, document disposal certification method, computer readable medium storing document disposal certification program and computer data signal  
A document disposal certification apparatus is installed in a document generation apparatus for generating a document, a document disposal apparatus for disposing of the document, or a server that...
8560851 Managing digital certificates  
A system is provided for managing digital certificates. The system includes a host system, which includes a user interface, a plurality of disparate host certificate stores, and a management tool....
8561142 Clustered device access control based on physical and temporal proximity to the user  
A plurality of computing devices used to access backend computing resources of an enterprise by a specific user are identified, and geo-locations of the devices at specific times are tracked. A...
8561158 Providing certificate matching in a system and method for searching and retrieving certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one broad aspect, certificate identification data that uniquely...
8560839 Tamper proof location services  
A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location devices, such as GPS. They also have...
8555049 Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit  
A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted....
8555073 Motor vehicle display apparatus, motor vehicle electronic system, motor vehicle, method for displaying data, and computer program product  
The invention relates to a motor vehicle display apparatus with an electronic device, comprising: a first memory area (117) for storing data (109),a second memory area (119) for storing at least a...
8555054 Apparatus and methods for protecting network resources  
Apparatus and methods are provided for protecting network resources, particularly in association with automatic provisioning of new client devices. A global PKI (Public Key Infrastructure) scheme...
8555043 Dynamically updating a computer system firmware image  
Methods, systems, apparatus, and computer-readable media for customizing a computer system firmware image utilizing a firmware configuration data structure. At least one firmware configuration...
8555346 Generating user and avatar specific content in a virtual world  
Generation of user and avatar specific content in a virtual world may include generating a local attribute object. The local attribute object may comprise attributes identifying at least one of...
8555365 Directory authentication method for policy driven web filtering  
Enabling web filtering by authenticated group membership, role, or user identity is provided by embedding a uniform resource identifier into an electronic document requested by a client. A client...
8549606 Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content  
There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and...
8549602 System and method for handling permits for user authentication tokens  
The invention consists of a method of handling permits, comprising the steps of: (a) providing a user with a user permit linked to a user authentication token, the user permit defining permissions...
8549603 System and method for addressing a unique device from a common address book  
A method and system for addressing a unique device from an address book, the method having the steps of: receiving a message having a root token and a secondary token; checking whether the root...
8549613 Reverse VPN over SSH  
A system and method for enabling access to a computer server operating within a private network, in which the computer server is isolated by access restrictions that prevent incoming connections...
8549588 Systems and methods for obtaining network access  
Exemplary systems and methods for providing a network credential in order to access a communication network are provided. In exemplary embodiments, a digital device attempting to access the...
8548170 Document de-registration  
A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, a...
8549284 Tunable schemes and evaluation for certificate validity check in vehicle-to-entity communications  
A method and system is provide for performing a certificate validity check between a vehicle receiving a message and an entity transmitting the message in a vehicle-to-entity communication system....
8549594 Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password  
A method of identity authentication and fraudulent phone call verification uses an identification code of a communication device and a dynamic password. The “dynamic password” is directly sent to...
8549310 Method and apparatus for secure measurement certification  
The invention relates to methods and apparatuses for acquiring a physical measurement, and for creating a cryptographic certification of that measurement, such that its value and time can be...
8549292 Authentication agent apparatus, authentication agent method, and authentication agent program storage medium  
An authentication agent apparatus includes a communication request reception unit that receives a communication request to a client B of an authentication server from a client A of the...