Match Document Document Title
8494944 System, report, and method for generating natural language news-based stories  
The present invention generally relates to a system, report, and method for automatically generating a series of natural language news-based stories to be presented via a digital interface or...
8495711 Remote roaming controlling system, visitor based network server, and method of controlling remote roaming of user devices  
An authorization assisting device sends to the VBN server an authorization request for access to the WAN by a requesting user device. A registration driver has a set of assignable IP address...
8495723 Method and system for the supply of data, transactions and electronic voting  
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The...
8495361 Securely creating an endorsement certificate in an insecure environment  
A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte...
8495730 Dynamically constructed capability for enforcing object access order  
Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A...
8490191 Method and system for intrusion detection  
Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least...
8484449 Program, communication device, data processing method, and communication system  
There is provided a program for making a computer perform a first procedure for verifying whether an platform guaranteeing that device identification data for identifying a communication device...
8484460 Post attack man-in-the-middle detection  
Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer...
8484476 Computer-implemented method and system for embedding and authenticating ancillary information in digitally signed content  
A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed. The method and system include loading digital content...
8484461 Method and apparatus for external organization path length validation within a public key infrastructure (PKI)  
A method and apparatus for external organization (EO) path length (EOPL) validation are provided. A relying party node (RPN) stores a current EO path length constraint (EOPLC) value, and an EOPL...
8484474 Methods for firmware signature  
A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate...
8484467 Authentication in communications networks  
The invention relates to a method of authenticating a user equipment in a communications network. The method involves sending a message from a network entity to the user equipment. This message...
8484475 Data transmission method, and tachograph system  
In a data transmission method for a tachograph system, digital messages are transmitted between a speed transmitter (MS) and a recording unit (RU). The digital messages contain a pair of keys...
8478991 Management apparatus for managing wireless parameter, control method for the management apparatus, and computer program for instructing computer to execute the control method  
A management apparatus for managing a wireless parameter is configured to obtain a certificate from a certificate authority by using a timing related to a setting processing based on a wireless...
8478992 Methods for secure restoration of personal identity credentials into electronic devices  
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an...
8478830 Method and apparatus for processing digitally signed messages to determine address mismatches  
A method and apparatus for processing digitally signed messages in which address mismatch errors are detected. In at least one aspect, the number of address mismatch errors reported to a user for...
8478108 Apparatus, method, and computer program product for recording content  
An apparatus determines whether a combination of a certificate type of a content certificate recorded on a source recording medium and a medium type of the source recording medium is a proper...
8478995 Method of encrypting and transferring data between a sender and a receiver using a network  
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of a server receiving from the sender...
8473735 Systems and methods for managing digital certificates  
A method of managing a digital certificate by a computer system can include the steps of receiving, the at the computer system, a business request for a digital certificate from a requester and...
8473736 Method for making security mechanisms available in wireless mesh networks  
A method for making safety mechanisms available in wireless mesh networks which have a plurality of nodes that are interconnected by multi-hop communication in a wireless network meshed by mesh...
8474031 Access control method and apparatus  
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is...
8473561 System and method for handling electronic mail mismatches  
A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed....
8474011 On-line centralized and local authorization of executable files  
A system and system for controlling the execution of executable files. The executables are identified by either a cryptographic digest or a digital certificate. The cryptographic digest is...
8468354 Broker-based interworking using hierarchical certificates  
A method for authentication authorization and accounting (AAA) in an interworking between at least two networks. The at least two networks are capable of communicating with a broker and include a...
8468339 Efficient security information distribution  
Methods and software for distributing several data objects containing status information about security certificates, and a directory of the data objects, through a peer-to-peer data distribution...
8468340 Configuring a valid duration period for a digital certificate  
A valid duration period for a digital certificate is established by a process that includes assigning numeric values to certificate term. The numeric value assigned to each certificate term is...
8468579 Transformation of sequential access control lists utilizing certificates  
The subject disclosure pertains to systems and methods that facilitate managing access control utilizing certificates. The systems and methods described herein are directed to mapping an access...
8468583 Streamlined process for enrollment of multiple digital certificates  
The enrollment process for purchasing multiple digital certificates configured using different cryptographic algorithms or hashing algorithms is streamlined. A certificate purchaser wishing to...
8464326 Accessing materials via voice and a menu  
A computer implemented method for accessing materials for a meeting may include receiving a call from a meeting participant by a system, wherein the meeting participant calls a prearranged...
8464046 Emergency medical data access system and associated methods  
A system and method are provided for establishing and administering an online secure data sharing network for use in emergency situations wherein a patient is unconscious or otherwise unable to...
8464065 Procedure and architecture for the protection of real time data  
The object of the present invention is to safeguard the authenticity and integrity of real-time data in a distributed real-time computer system. The present invention considers other requirements...
8464313 Methods and apparatus related to transmission of confidential information to a relying entity  
In one embodiment, a method includes defining a request for confidential information from a domain of confidential information based on an input from a relying entity. The domain of confidential...
8464045 Distributed digital certificate validation method and system  
A distributed digital certificate validation method of a client connectable in communication with a host is provided. A first connection is made with the host to establish data communication with...
8463254 System and method for over-the-air software loading in mobile device  
A system and method updates software in a mobile device, which includes an application processor and associated application processor memory and a radio processor and associated radio processor...
8458797 System and method for securing computers against computer viruses  
In one embodiment, an antivirus mechanism (e.g., antivirus program) in a computer initiates shielding procedures in response to a triggering event indicative of a presence of a virus in the...
8457317 Method for data privacy in a fixed content distributed data storage  
An archival storage cluster of preferably symmetric nodes includes a data privacy scheme that implements key management through secret sharing. In one embodiment, the protection scheme is...
8458768 Policy-based security certificate filtering  
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a...
8458457 Method and system for certificate revocation list pre-compression encoding  
Embodiments of the present invention provide a pre-compression encoding capability for encoding a CRL, such as an X.509 CRL, stored as a file, data structure or data object in a computer system...
8458456 Method and system for verifying the identity of a communication partner  
A method for verifying the identity of a communication partner, in particular in real-time communications, wherein a caller (A) sends a message towards a callee (B), and wherein the caller (A)...
8458480 Method and apparatus for binding TPM keys to execution entities  
A method and apparatus for binding trusted platform module (TPM) keys to execution entities are described. In one embodiment, the method includes the receipt of an authorization request issued by...
8458462 Verifying integrity of network devices for secure multicast communications  
A network device, such as an access control server, verifies the integrity of other network devices requiring access to a secure multicast. The network device receives a health status report from...
8458455 Techniques for handling SSL certificate expiration and renewal  
A method for replacing a current security certificate includes producing a security certificate request at a first device that includes a request for a replacement security certificate. The method...
8458770 Application context based access control  
Access control for an application is described. An exemplary method includes receiving a first command of an application to invoke a function of a user interface, identifying a first authorization...
8452956 Methods and apparatus for network communications via a transparent security proxy  
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a communications session between two...
8452712 Method and apparatus for enforcing software licenses  
A method and apparatus for enforcing software licenses for resource libraries such as an application program interface (API), a toolkit, a framework, a runtime library, a dynamic link library...
8452964 Method for providing confidentiality protection of control signaling using certificate  
A method of enabling a mobile station (MS) to perform initial ranging in a wireless communication system includes transmitting a first message to a base station (BS), the first message comprising...
8452958 Determining certificate revocation status  
A method is disclosed for obtaining certificate revocation information from a server, obtaining from a client a request for a revocation status of a certificate and notifying the client when the...
8453211 Method of obtaining proxy call session control function address while roaming  
The present invention provides a method for obtaining a proxy call session control function address, comprising when a terminal accesses an IP multi-media subsystem through a world...
8453235 Controlling access to mail transfer agents by clients  
Provided is a method and system for controlling access to a mail transfer agent (MTA), included in a mail server infrastructure (MSI), by a client, which is either a mail user agent (MUA) or an...
8452961 Method and system for authentication between electronic devices with minimal user intervention  
A method and system for authentication between electronic devices with reduced user intervention is provided. An authentication process for electronic devices (e.g., CE devices) establishes...