AcclaimIP-ad

Match Document Document Title
8966260 Credentials management in large scale virtual private network deployment  
Techniques for credentials management in large scale virtual private network (VPN) deployment are disclosed. In some embodiments, credentials management in large scale VPN deployment includes...
8966248 Secure software file transfer systems and methods for vehicle control modules  
A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job...
8964974 Zero configuration of security for smart meters  
Techniques for injecting encryption keys into a meter as a part of a manufacturing process are discussed. Since various encryption keys injected into meters may be specific to each individual...
8966245 System and method for assigning quality to cryptographic identities used in a digital transaction  
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital transaction. The quality assignment supports...
8966659 Automatic fraudulent digital certificate detection  
A computing device analyzes digital certificates received from various different sites (e.g., accessed via the Internet or other network) in order to automatically detect fraudulent digital...
8966247 Managing security certificates of storage devices  
A method and data processing system for managing security certificates in a data processing environment is disclosed. A computer identifies a security certificate associated with a management...
8966599 Automatic token renewal for device authentication  
Approaches are described for automatically generating new security credentials, such as security tokens, which can involve automatically re-authenticating a user (or client device) using a...
8959598 Wireless device authentication between different networks  
A method and system for roaming between heterogeneous networks. The method involves authenticating a mobile communication device on a first network, and providing the device with a single-use...
8959645 Method for providing control information for a distributed operation in an automation system, computer program and automation system  
A distributed operation is performed using at least one first and second computer-based object, wherein control information is used to influence or determine a property, a function of the first...
8959642 Real time lockdown  
A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new...
8959337 Digital certificate issuer-correlated digital signature verification  
A message including a digital signature is received at a processor. It is determined whether a specific authorized certificate issuer is configured for a message originator within a data...
8959618 Managing password expiry  
A method and apparatus for managing the expiration of a password. In one embodiment, the method comprises determining whether a behavior anomaly associated with an account has occurred. In...
8959336 Securing locally stored web-based database data  
The present invention extends to methods, systems, and computer program products for locally storing Web-based database data in a secure manner. Embodiments of the present invention permit...
8954731 Distributive computation of a digital signature  
A method and apparatus are presented to perform a distributive computation of a digital signature in a document signing process. A signing request from a remote device initiates the document...
8954733 Embedded extrinsic source for digital certificate validation  
A computer uses the information included within a digital certificate to obtain a current date and time value from a trusted extrinsic trusted source and the computer compares the obtained current...
8954742 Method and apparatus for digital authentication of valuable goods  
A method for digital certification of authenticity of a physical object, and corresponding computer program and storage device, as well as to the use of the method for digital certification of...
8955119 Behavior-based traffic profiling based on access control information  
A method includes receiving one or more of user information, role information, or authorization information associated with a user accessing a network, selecting a traffic flow to monitor that is...
8953787 Strengthened public key protocol  
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private...
8955062 Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain  
A method including: assigning identifiers to respective domains, where each of the domains is allocated a corresponding set of resources, and where the resources in the sets of resources are...
8949597 Managing certificates on a mobile device  
A system or method of remotely managing security certificates on a mobile device is provided. Certificates on a mobile device may be added to, deleted from, or updated by a server that manages...
8949609 Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor  
The user device includes: a recording unit which stores system parameters as respective parameters given in advance, a disclosure public key, a user public key, a user private key, a member...
8949598 Method and apparatus for secured embedded device communication  
In a computing device that includes a host operating system and a management engine separate from the host operating system, if the primary operating system is not operating, a management engine...
8948382 Secure protocol for peer-to-peer network  
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the...
8949599 Device management apparatus, method for device management, and computer program product  
According to an embodiment, provided is a device management apparatus that issues a digital certificate to a device. The device management apparatus includes: a storage unit that stores therein...
8943311 System and methods for online authentication  
A method of establishing a communication channel between a network client and a computer server over a network is described. The network client may be configured to communicate with the computer...
8943310 System and method for obtaining a digital certificate for an endpoint  
According to one embodiment of the present invention, a method of establishing a digital certificate on an endpoint includes establishing a connection between a proxy function module and the...
8943574 Tokenizing sensitive data  
Included are systems and methods for tokenizing sensitive data. Some of the systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and...
8942433 System for scheduling, recordation and biometric validation of interpersonal interactions  
A system for scheduling and recording interpersonal interactions using biometric validation to verify user identity and assure user conformance with preselected criteria upon which approval of an...
8943549 Methods and systems for online fraud protection  
This disclosure describes, generally, methods and systems for certifying user identities (IDs). The method includes receiving, from a customer, a certification request for a user ID. The method...
8943551 Cloud-based device information storage  
Device information for each of multiple devices associated with a user account is maintained by a cloud service. The device information can include credential information allowing the device to be...
8943312 Method of and system for authenticating online read digital content  
A method of authenticating an online read right of a digital content includes: receiving an online read first request from a terminal, the first request including first user information, obtaining...
8943565 Recovery of information from commercial web portals  
Novel tools and techniques for automated recovery of information from commercial web portals, including commercial web portals requiring credentials for access. In some instances images are...
8943323 System and method for provisioning device certificates  
A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established...
8943156 System and method for handling electronic mail mismatches  
A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed....
8938614 Motor vehicle electronics device, motor vehicle, method for displaying data on a motor vehicle display apparatus, and computer program product  
The invention relates to a motor vehicle electronics device comprising a first interface (116) for establishing a first connection to a first ID token (134) in order to read data from the first ID...
8938789 Information processing system, method for controlling information processing system, and storage medium  
An information processing system stores key information for determining an authentication device and information about the authentication device by associating these information pieces with each...
8935747 Access right management system, access right management method, and access right management program  
An authentication includes a unit that issues right transfer information that is to be transmitted to a service providing device and a token that corresponds to the right transfer information and...
8935532 Content distribution and aggregation  
In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a...
8935524 Systems and methods for managing certificates  
Systems and methods for managing certificates are described. A system comprises modules to receive requests related to a digital certificate, receive responses related to authorization of the...
8924307 Document authentication using electronic signature  
Embodiments of authenticating an electronic document are disclosed. A document authentication system is operatively connected with a professional system, a license management system and a...
8924709 Print release with end to end encryption and print tracking  
A method for encrypting print jobs that includes receiving output data, encrypting the output data with a randomly-generated symmetric session key, generating a session key header by encrypting...
8924716 Communication device and communication method  
A communication device for performing communication by employing first and second communication units, includes: a reception unit for receiving a communication packet including a random number...
8924715 Methods and apparatus for storage and execution of access control clients  
Disclosed herein is a technique for securely provisioning access control entities (e.g., electronic Subscriber Identity Module (eSIM) components) to a user equipment (UE) device. In one...
8924717 Information processing apparatus, information processing method, and computer program  
An information processing apparatus and method that prior to using a digital certification considers a validity expiration date of the digital certificate as well as a usable deadline of an...
8924727 Technologies labeling diverse content  
Technologies for labeling diverse content are described. In some embodiments, a content creation device generates a data structure that may include encrypted diverse content and metadata including...
8924714 Authentication with an untrusted root  
Techniques and systems for authentication with an untrusted root between a client and a server are disclosed. In some aspects, a client may connect to a server. The server and client may initiate...
8918638 Mobile-device-based trust computing  
In one embodiment, a method includes receiving access data from an application on a mobile device of a particular user. The access data includes authentication data associated with a shared device...
8918639 Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid  
A secure communications and location authorization system using a power line or a portion thereof as a side-channel that mitigates man-in-the-middle attacks on communications networks and devices...
8918848 Method and system for third party client authentication  
Methods and systems for third party client authentication of a client. A method includes displaying a user interface on a display of the client, the user interface including an option to select a...
8914859 Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages  
Obfuscating a message, in one aspect, may include detecting sensitive information in a message to be broadcast into public or quasi-public computer network environment; replacing the sensitive...