Match Document Document Title
8341716 Information processing device, information processing method, and storage media storing user certification program  
The information processing device includes, a communication portion that communicates with a certification device which performs certification of whether or not a user has usage permission, a...
8341726 System and method for controlling email propagation  
A system and method for controlling the propagation of an email message includes defining at least a first email recipient and a second email recipient of the email message. A first email...
8341717 Dynamic network policies based on device classification  
A dynamic network policies system based on device classification is provided. The system comprises a computer system, a configuration database, and a dynamic network policies application based on...
8340296 Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains  
Disclosed herein is a method and system for registering and verifying a smart card certificate for users moving between public key infrastructure domains, which allows a user moving between...
8336100 Systems and methods for using reputation data to detect packed malware  
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3)...
8332629 Mail certificate responder  
A method and apparatus for generating a mail certificate is described. A client determines whether the client possesses a certificate. If a certificate is needed, the client sends a request to a...
8332630 Method and system for electronic device authentication  
A method and system for authentication an electronic device is provided. One implementation involves obtaining a set of authentication parameters; prioritizing the authentication parameters into:...
8332643 Establishing secure mutual trust using an insecure password  
A process for establishing secure mutual trust includes generating a one-time-password. The one-time-password is transferred between the devices in a communication occurring off of the network....
8332950 Disc manufacturing method, data recording apparatus, information recording medium, information processing apparatus and method, and computer program  
A product mark including a public key certificate issued with respect to an information-recording-medium manufacturing entity or information-recording-medium manufacturing equipment, and an...
8332632 Method and system for execution monitor-based trusted computing  
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service...
8331568 Efficient distribution of computation in key agreement  
In Transport Layer Security (TLS) or other communication protocols, the load on the server may be lowered by reducing the number of expensive decryption operations that the server has to perform....
8332541 Methods and apparatus for communicating and/or using discovery information  
Methods and apparatus related to peer/network/service discovery in a mobile wireless system, e.g., an ad hoc peer-to-peer network are described. Transmission of discovery information, e.g., upper...
8332649 Authentication system, signature creating device, and signature verifying device  
A signature generating device generating digital signature data for certifying authenticity of information of a person, and obfuscating the information. The signature generating device includes a...
8332631 Secure software licensing and provisioning using hardware based security engine  
Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password,...
8332823 Application program verification system, application program verification method and computer program  
There is provided a means to perform a source-level verification by a third-party organization in a shorter time, while preventing leakage of technology and know-how of an ISV (Independent...
8327131 Method and system to issue trust score certificates for networked devices using a trust scoring service  
A target machine can be verified prior to being granted access to a resource on a network by interrogating and analyzing digests of various elements of the target machine. The digests can be...
8327147 Non-transferable anonymous digital receipts  
The present invention relates electronic receipts. There is provided a method for generating an electronic receipt in a communication system providing a public key infrastructure, the method...
8327424 Method and apparatus for selecting a certificate authority  
A certificate authority selection unit implements a method for selecting one of a plurality of certificate authorities servicing a plurality of administrative domains in a communication system....
8327146 Wireless communication using compact certificates  
A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a digital signature and only a portion...
8327128 Supporting secure sessions in a cloud-based proxy service  
A proxy server in a cloud-based proxy service receives a secure session request from a client device as a result of a Domain Name System (DNS) request for a domain resolving to the proxy server....
8327143 Techniques to provide access point authentication for wireless network  
According to an example embodiment, an apparatus may include a client device including a processor and memory. The client device may be configured to obtain, via a secure communication, a...
8321680 Multisigning—a protocol for robust multiple party digital signatures  
Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing...
8321348 Computer-based method and system for aiding transactions  
A method for providing a warranty relating to a transaction between two parties, each party being a client of at least one respective institution which provides services to the respective party,...
8321662 Certificate renewal using secure handshake  
A method, system, and computer usable program product for certificate renewal using a secure handshake are provided in the illustrative embodiments. A determination is made, forming an expiration...
8321672 Authentication system, information processing apparatus and method, program, and recording medium  
An authentication system includes a mobile device carried by a user and a sensor sensing the user's biometric information. The mobile device includes a template storage unit storing the user's...
8321663 Enhanced authorization process using digital signatures  
A method is provided for enhancing security of a communication session between first and second endpoints which employs a key management protocol. The method includes sending a first message to a...
8316429 Methods and systems for obtaining URL filtering information  
A host computer system is categorized according to uniform resource locator (URL) information extracted from a digital certificate purportedly associated with said host. Thereafter, a secure...
8315381 Methods and apparatus performing hash operations in a cryptography accelerator  
Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated...
8316229 Secure certificate installation on IP clients  
According to one embodiment of the invention, a method is deployed for loading a user CA certificate into the trusted certificate storage of a network device. The method comprises a number of...
8312262 Management of signing privileges for a cryptographic signing service  
A Management System (MS) manages signing privileges for entities desiring cryptographic signatures, and a Certificate Authority (CA) provides a cryptographic signing service. MS registers entities...
8312527 Authentication system and method including image forming apparatus  
The present invention enables any authentication for a plurality of authentication methods with an authentication server for storing management data on a user. The present invention uses one of...
8312165 System and method for handling electronic mail mismatches  
A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed....
8312526 Method and system for delegating authority with restricted access right in an online collaborative environment  
A method and system to delegate an authority to access collaborative resources are provided. The system enables a participant to re-delegate the authority to another participant by an...
8312286 Wireless network having multiple communication allowances  
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of...
8312264 Method and system for authentication among peer appliances within a computer network  
A digital certificate associating a unique identifier for a computer-based appliance with an authentication key pair for that appliance is obtained from a certificate authority using a different,...
8312263 System and method for installing trust anchors in an endpoint  
According to one embodiment of the present invention, a method of updating a certificate trust list on a first endpoint includes receiving an initial certificate trust list at the first endpoint....
8312528 System and method for generating a digital certificate  
A system and method for generating a digital certificate is provided wherein a new digital record is received and is assigned a sequence value. A first composite digital value is generated by...
8312519 Agile OTP generation  
A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator...
8307424 Password authentication apparatus and password authentication method  
A password authentication apparatus and a password authentication method for preventing the leakage of password information from user's password input operations includes a memory device for...
8307202 Methods and systems for using PKCS registration on mobile environment  
The invention relates to method and system for using PKCS and especially PKCS#10 registration standard on a mobile environment and in particularly in a WPKI (Wireless PKI) environment comprising a...
8307203 Methods and systems for secure communications using a local certification authority  
A local network traffic processor and an application are resident on a common computer system. The application is configured to trust a server certificate issued by a local network traffic...
8302211 Domain-based application functionality  
Systems and methods of enabling or disabling functionality in a web browser or browser-based application are disclosed. An example method of controlling the functionality of an application program...
8301878 System and method for enabling bulk retrieval of certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, a certificate synchronization application is programmed...
8301881 Proactive forced renewal of content protection implementations  
A method, apparatus, and system for proactive forced renewal of content protection implementations in devices. The method includes, on a first substantially periodic basis, automatically pushing a...
8301892 Secure instant messaging system  
A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the...
8302208 Compliance validator for restricted network access control  
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation...
8300829 Verification key handling  
A method, an apparatus, and a computer program product for enabling verification key handling is disclosed. Said handling is enabled by receiving a verification key including an identifier of the...
8302183 Apparatus and method of security identity checker  
A method and apparatus that establish secure communications between two stations. The apparatus includes a low power communication processor and a host processor in a sleep mode. The low power...
8301877 System and method for configuring a valid duration period for a digital certificate  
A method and system for configuring a valid duration period for a digital certificate. The method includes assigning a positive numeric value for each certificate term. The positive numeric value...
8301880 Certificate enrollment with purchase to limit sybil attacks in peer-to-peer network  
A system may protect against Sybil attacks on a peer-to-peer (P2P) network based on each one the nodes in the P2P network being identified by a corresponding certificate. In particular, a node may...