Match Document Document Title
8543471 System and method for securely accessing a wirelessly advertised service  
In one embodiment, a method includes sending by an endpoint a request for information about available services to a network device; receiving by the endpoint a message from the network device, the...
8544085 Image processing apparatus, image processing method, and image forming apparatus  
Provided is an image forming apparatus that improves operability while securing security of image data stored in an apparatus. In the image forming apparatus having a filing function, when image...
8543819 Secure authenticated distance measurement  
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and a second communication device,...
8544070 Techniques for non repudiation of storage in cloud or shared storage environments  
Techniques for non-repudiation of storage in cloud or shared storage environments are provided. A unique signature is generated within a cloud or shared storage environment for each file of the...
8544058 Techniques of transforming policies to enforce control in an information management system  
In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be...
8543808 Trusted intermediary for network data processing  
A networked computer system in which a trusted intermediary device is allowed access to packets transmitted through a secured connection. An endpoint to a secured connection identifies a trusted...
8539226 Certificate management and transfer system and method  
A method and system for Certificate management and transfer between messaging clients are disclosed. When communications are established between a first messaging client and a second messaging...
8539544 Method of optimizing policy conformance check for a device with a large set of posture attribute combinations  
A method, apparatus, and electronic device for conforming integrity of a client device 106 are disclosed. A memory 1100 may store a policy tag 404 associated with a subgroup of a group of policies...
8539225 Method and device for dynamic deployment of trust bridges in an ad hoc wireless network  
A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification...
8539093 Port discovery and message delivery in a portable electronic device  
In accordance with some embodiments, a computer-implemented method for fetching email from an email server to a portable electronic device is disclosed. The method includes, at a portable...
8533805 Certificates to create product mappings  
A server receives a consumer request pertaining to product asset management from a client. The consumer request comprises one or more product-related certificates that associates the client with...
8533463 Reduced computation for generation of certificate revocation information  
A method and apparatus for propagating certificate revocation information. A first query is received regarding a revocation status of a first digital certificate. One or more additional queries...
8533793 Location-aware security and access system  
An invention is afforded for providing security for a protected network resource. The system includes a network access apparatus in communication with a receiver that receives signals from a...
8533461 Wireless local area network terminal pre-authentication method and wireless local area network system  
A method for pre-authenticating a wireless local area network terminal and a wireless local area network system. The pre-authentication method includes after a current access point (AP) which has...
8533796 Providing application programs with access to secured resources  
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for providing access to secured resources. A token providing system stores...
8533462 Verifying cryptographic identity during media session initialization  
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a...
8527770 System and method for provisioning device certificates  
A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The...
8527764 Method and system for secure communication  
A method and system for secure communication is provided. The method for secure communication with devices includes: obtaining a parameter for protecting a content; authenticating each other by...
8526917 Authenticity verification of authentication messages  
At least a method for verifying the authenticity of one or more authentication messages in an authentication procedure between a network and a mobile device is described wherein the method...
8528102 Method and system for protection of customer secrets in a secure reprogrammable system  
Methods and systems for protection of customer secrets in a secure reprogrammable system are disclosed, and may include controlling, via hardware logic and firmware, access to customer specific...
8528043 Systems and methods for generating trust federation data from BPMN choreography  
In practice, collaborative processes using web services present complex information security requirements, as a domain security model needs to conditionally control access to data and services by...
8522309 Security switch  
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully...
8522009 Device management system, site monitoring apparatus and method  
A server certificate and root certificate for performing secure communication with monitoring target devices are issued in a site monitoring apparatus. Using a secret key that is paired with a...
8522012 Method for the application of implicit signature schemes  
A method of certifying a correspondent in a data communication system by a certifying authority. The certifying authority includes a cryptographic unit. The method includes generating a random...
8522035 Assisted certificate enrollment  
A certificate enrollment assistant module may be provided to inject a challenge password into a certificate signing request to be sent, to a Certificate Authority, from a computing device. The...
8522328 Measurement device and method for logging use of the measurement device  
In a method for managing use information of a measurement device, an operating interface of the device is locked before the device is operated. When a user starts to use the device, the method...
8520670 Automated operation and security system for virtual private networks  
A node device provides secure communication services over a data network, such as the Internet or another public or private packet switched network, to multiple computers that are coupled through...
8522011 Computer implemented method for authenticating a user  
The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a...
8516068 System and method for processing messages being composed by a user  
A system and method for processing messages being composed by a user of a computing device (e.g. a mobile device). Embodiments are described in which the performance of certain tasks is initiated...
8516607 Facilitating data access control in peer-to-peer overlay networks  
Methods and apparatuses are provided for facilitating data access controls in peer-to-peer or other similar overlay networks. A peer node storing a data object may receive a request for access to...
8516566 Systems and methods for using external authentication service for Kerberos pre-authentication  
Systems and methods for providing Kerberos pre-authentication are presented. According to a method embodiment, a request for authentication is received from a principal of an authentication...
8516243 Host identity protocol method and apparatus  
A method and apparatus of at least partially securing communications between first and second hosts using the Host Identity Protocol (HIP) is provided. The first host is not HIP enabled and the...
8515389 Method, apparatus, and program product for provisioning secure wireless sensors  
We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of...
8515996 Secure configuration of authentication servers  
Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a...
8516245 Method, product and apparatus for accelerating public-key certificate validation  
A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance...
8516265 Authentication method, authentication device, program and recording medium  
An authentication method of performing authentication for an information processing device connected via a communication network by an authentication device, including: receiving information...
8510544 Starts up of modules of a second module group only when modules of a first group have been started up legitimately  
The present invention provides an information processing apparatus that is capable of continuously performing secure boot between module groups in the case where software of a terminal device...
8510846 Data encryption and isolation  
A method of storing data for a computer application in a shared data store is disclosed. The method includes receiving a data submission from the computer application, receiving an encryption key...
8510796 Method for application-to-application authentication via delegation  
Apparatus, methods, and computer program products are disclosed that present a delegated-right to a delegation system by a service-application provisioned with the delegation system. The...
8510811 Network transaction verification and authentication  
A two-level authentication system is described supporting two-factor authentication that offers efficient protection for secure on-line web transactions. It includes a global unique identity (UID)...
8509440 PANA for roaming Wi-Fi access in fixed network architectures  
A network component comprising at least one processor configured to implement a method comprising deriving a Master Session Key (MSK) using a secret key and at least one parameter obtained from an...
8510228 Transfer method of electronic cash  
A card to card transfer method used in the financial system is provided in the present invention, and comprises an initializing step, a transferring step and a transaction confirming step, wherein...
8504830 Transfer data management system for internet backup  
Erroneous deletion of data due to a collision of digest information during data de-duplication using digest information is prevented. When backup data is stored on a backup server 1100, digest...
8505067 Service level network quality of service policy enforcement  
Embodiments of the invention provide systems and methods for providing service level, policy-based QoS enforcement on a network or networks. According to one embodiment, a system can comprise at...
8504822 Transparent proxy of encrypted sessions  
In one embodiment, a proxy device located between a first device and a second device intercepts a security session request for a security session between the first device and the second device....
8499147 Account management system, root-account management apparatus, derived-account management apparatus, and program  
A root-account management apparatus generates an electronic signature based on a survival condition and a secret key when an authentication result of a user of a client apparatus is proper, and...
8499150 Selectively trusting signed files  
A security module on a client detects a signed file at the client and reports signing information identifying a certificate used to sign the file and a file identifier identifying the file to a...
8494969 Cryptographic server with provisions for interoperability between cryptographic systems  
The invention is a cryptographic server providing interoperability over multiple algorithms, keys, standards, certificate types and issuers, protocols, and the like. Another aspect of the...
8495375 Methods and systems for secure channel initialization  
Methods and systems for secure channel initialization between a client network element and a server network element are disclosed. In accordance with one embodiment of the present disclosure, the...
8495362 Signature systems  
A signature system includes a public key certificate obtainment device 100, a public key certificate issuance device 200, and a signature device 300. The public key certificate obtainment device...