AcclaimIP-ad

Match Document Document Title
8453005 System and method for container monitoring, real time authentication, anomaly detection, and alerts  
An invention is provided for monitoring an item, such as a container. The invention includes a computer in communication with a receiver that receives signals from a remote source. A transmitter...
8453243 Real time lockdown  
A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new...
8447038 Method and systems using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects  
A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate...
8448228 Separating authorization identity from policy enforcement identity  
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the...
8447971 Self-signed implicit certificates  
There are disclosed systems and methods for creating a self-signed implicit certificate. In one embodiment, the self-signed implicit certificate is generated and operated upon using...
8443187 Authentication of computing devices in server based on mapping between port identifier and MAC address that allows actions-per-group instead of just actions-per-single device  
In one or more embodiments, attributes other than a supplicant's MAC address can be used for the user name in the authentication process in a network computing environment. In at least some...
8443193 State-maintained multi-party signatures  
A hash module of a mail sender creates a hash data context structure. The hash module processes the headers and the body of an e-mail message in the order required, for example by the DKIM...
8443436 Systems and methods for diverting children from restricted computing activities  
A computer-implemented method for diverting children from restricted computing activities. The method may include maintaining a list of safe computing activities, maintaining a list of restricted...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules...
8438618 Provisioning active management technology (AMT) in computer systems  
Active management technology (AMT) may be provisioned in a client device automatically, which may provide a secure connection between the provisioning server and the client device. The client...
8437473 Small public-key based digital signatures for authentication  
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a...
8438385 Method and apparatus for identity verification  
A method for identity verification includes receiving a request for proof of identity from a service provider and receiving biometric information associated with a user of a communication device....
8437474 Public key encryption for groups  
A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group...
8438628 Method and apparatus for split-terminating a secure network connection, with client authentication  
A method and apparatus are provided for split-terminating a secure client-server communication connection, with client authentication. During handshaking between the client and the server,...
8438619 Network access control  
An system for controlling access to a network by a user device. The system includes a criteria engine that generates a plurality of criteria to be monitored on the user device and a checker that...
8438116 Token based new digital cash protocols  
Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital...
8438624 Systems and methods of modifying system resources  
A method for modifying one or more system resources is provided. One or more licenses for modifying one or more system resources on a client device can be acquired. An authenticator can be...
8438388 Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network  
A method and apparatus for distributing Certificate Revocation List (CRL) information in an ad hoc network are provided. Ad hoc nodes in an ad hoc network can each transmit one or more certificate...
8433903 Asynchronous enhanced shared secret provisioning protocol  
An Asynchronous Enhanced Shared Secret Provisioning Protocol (ESSPP) provides a novel method and system for adding devices to a network in a secure manner. A registration process is launched by at...
8433929 Data management device, stored data management method and computer program  
Provided is a data management device for managing data recorded onto a readable and writable recording medium by an application that is verified based on a digital certificate. The recording...
8429408 Masking the output of random number generators in key generation protocols  
To mitigate the effects of a weak random number generator (RNG) in a public key cryptosystem, a public key obtained from the RNG is encrypted using a deterministic cryptographic scheme before...
8428570 Service provider activation  
Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for...
8429734 Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes  
Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources,...
8423773 Method for receiving/sending multimedia messages  
A multimedia messaging system for receiving/sending multimedia messages, includes: a wireless LAN; and a MMS gateway. The MMS gateway performs: receiving/sending the multimedia message to/from a...
8424107 Selectively exposing base class libraries based on application execution context  
Allowing access to APIs based on application context. A method includes determining an application context for an application. A layer is determined for a base class library. Layers of the base...
8423762 Common access card heterogeneous (CACHET) system and method  
What is disclosed is a system and method that allows a secondary certificate authority to rely on one or more existing primary certificate authorities to establish identity of a user and provide...
8423761 Method and device for enabling a trust relationship using an expired public key infrastructure (PKI) certificate  
A method and device are useful for enabling a trust relationship using an expired public key infrastructure (PKI) certificate. The method includes determining at a relying party a maximum...
8424054 Secret information management apparatus, information processing apparatus, and secret information management system  
Secret key backup is safely implemented even if a role base access structure in which the access structure is specified using roles is used. An all combination generating unit 107 obtains a backup...
8423763 System and method for supporting multiple certificate status providers on a mobile communication device  
A method and system for supporting multiple digital certificate status information providers are disclosed. An initial service request is prepared at a proxy system client module and sent to a...
8418241 Method and system for traffic engineering in secured networks  
Aspects of a method and system for traffic engineering in an IPSec secured network are provided. In this regard, a node in a network may be authenticated as a trusted third party and that trusted...
8418226 Persistent servicing agent  
A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software)...
8417941 Apparatus and method to prevent man in the middle attack  
A system, peripheral device, and method for authenticating an encryption key before transmitting encrypted messages containing sensitive information are provided. Authentication of a client device...
8412932 Collecting account access statistics from information provided by presence of client certificates  
A method and system for collecting account access statistics from information provided by client certificates. In one embodiment, the method comprises requesting client certificates from remote...
8413247 Adaptive data collection for root-cause analysis and intrusion detection  
Endpoints in an enterprise security environment are configured to adaptively switch from their normal data collection mode to a long-term, detailed data collection mode where advanced analyses are...
8413211 Access control policy compliance check process  
A storage medium on which is recorded a program for causing an information processing device. The program executes, an access right management information obtainment process for obtaining access...
8413226 User-type handling in a wireless access network  
A system, method, and apparatus in an access network such as the Generic Access Network (GAN) for providing user-type information to a Security Gateway (SEGW) or for enabling the SEGW to obtain...
8412933 Enabling users to select between secure service providers using a key escrow service  
Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and...
8413257 Document management system, document manipulation apparatus, and computer readable medium  
According to an aspect of the invention, a document management system includes a protection policy storage unit, a correspondence storage unit, an embedding unit, a portable identification unit, a...
8407464 Techniques for using AAA services for certificate validation and authorization  
In one embodiment, techniques to validate certificates using authentication, authorization, and accounting (AAA) services are provided. A service receives a request from a requester for validation...
8407465 Mobile authentication framework  
Disclosed are apparatus and methods for associating a mobile device with a web service or a user account. A unique code is displayed on the mobile device. The unique code is associated with a user...
8402523 System and method for associating message addresses with certificates  
A system and method for associating message addresses with certificates, in which one or more secondary message addresses are identified and associated with a user-selected certificate that does...
8397078 Method for authenticating and executing a program  
Unlike the technology for a program downloaded through conventional broadcast waves, in the case of downloading a program via a network, there is a possibility that such program will be activated...
8397060 Requesting digital certificates  
A method for requesting a certificate from a certificate issuer for a public key that is associated with a corresponding private key stored by a storing entity, the method comprising: generating...
8397061 Unattended code update of storage facility  
Various embodiments for providing an update to at least one storage facility in a computing storage environment are provided. In one embodiment, a security verification is performed on the update...
8397072 Computer-implemented method and system for embedding ancillary information into the header of a digitally signed executable  
A computer-implemented method and system for embedding ancillary information into the header of a digitally signed executable are disclosed. The method and system include identifying a digital...
8392716 Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method  
An initiator shares y_ir with a responder, calculates HASH_I on the basis of y_ir, and sends HASH_I to an IKE proxy server. The initiator receives a digital signature SIG_S generated for HASH_I...
8392996 Malicious software detection  
A method, system, computer program product and/or a computer readable medium of instructions for detecting one or more entities which are able to reinfect a processing system with malicious...
8387152 Attested content protection  
Computer systems and environments implemented herein permit a local machine increased participation in authorizing access to protected content. An operating system attests to a computing...
8386776 Certificate generating/distributing system, certificate generating/distributing method and certificate generating/distributing program  
In a certificate generating/distributing system, an authentication apparatus includes token transmitting means transmitting, to a service mediating apparatus, a certificate generation request...
8386789 Method and system for performing an electronic signature approval process  
The present invention includes a computer-implemented method and an Enterprise Resource Planning System (ERP). The method and system allows a user to enable an electronic signature approval...