Match Document Document Title
8732472 System and method for verification of digital certificates  
Analysis of authenticity digital certificates includes. Initial information pertaining to digital certificates is collected from diverse information sources. For each of the digital certificates...
8726334 Model based systems management in virtualized and non-virtualized environments  
Architecture that provides model-based systems management in virtualized and non-virtualized environments. A security component provides security models which define security requirements for...
8726015 Methods and apparatus for secure content routing  
Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier embedded in or associated with the...
8726403 Secure video content provisioning using digital rights management  
A method that includes receiving a first request for video content from a user of a user device; retrieving an identifier for the user device using an application programming interface; sending a...
8724812 Methods for establishing a secure point-to-point call on a trunked network  
Methods for establishing secure point-to-point communications in a trunked radio system include receiving, at a trunking controller, a request from a source endpoint for a traffic channel for...
8726011 Systems and methods for managing digital certificates  
A method of managing a digital certificate by a computer system can include the steps of receiving, the at the computer system, a business request for a digital certificate from a requester and...
8726023 Authentication using GAA functionality for unidirectional network connections  
Methods, a client entity, network entities, a system, and a computer program product perform authentication between a client entity and a network. The network includes at least a bootstrapping...
8726032 System and method for protecting secrets file  
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The...
8726010 Secure content distribution  
In an example, a method of securing content is described. The method may include instantiating a content server on a client device. The method may also include operating the content server to...
8726347 Authentication based on previous authentications  
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a...
8726022 Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely  
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication via wireless link, which, combining...
8726012 Method and apparatus for external organization path length validation within a public key infrastructure (PKI)  
A method for external organization path length (EOPL) validation is provided. A relying party node of an organization receives an authentication request from a subject node of an external...
8719908 Digital certificate management  
This disclosure relates to a digital certificate management system configured to consolidate information related to digital certificates across enterprise systems. In some implementations, the...
8719912 Enabling private data feed  
A method of generating a pre-authenticated link to access a private feed and providing access to the private feed using the pre-authenticated link. A request to access the private feed is received...
8719577 System and method for multi-certificate and certificate authority strategy  
Operations or functions on a device may require an operational certificate to ensure that the user of the device or the device itself is permitted to carry out the operations or functions. A...
8719907 Computerized authorization system and method  
A computerized authorization system configured to authorize electronically-made requests to an electronic entity. The computerized authorization system comprises a store configured to store an...
8719565 System and method for processing certificates located in a certificate search  
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to...
8719575 Method of secure broadcasting of digital data to an authorized third party  
The invention relates to a method of secure broadcasting of encrypted digital data of a proprietary entity, these data being stored in a storage module (6) of a server (5), comprising: the...
8713309 System and method for distributed security  
A security architecture in which a security module is integrated in a client machine, wherein the client machine includes a local host that is untrusted. The security module performs encryption...
8712042 Implicit certificate scheme  
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity...
8710952 RFID reader revocation checking using low power attached displays  
A method of authenticating a radio frequency identification (RFID) reader to efficiently and timely check of revocation status of the RFID reader includes the steps of checking whether a given...
8713308 Gaming machine certificate creation and management  
Methods and systems for creating and managing certificates for gaming machines in a gaming network using a portable memory device. A gaming machine creates a certificate signing request which is...
8706642 Apparatus, system, and method for securely authorizing changes to a transaction restriction  
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The...
8707024 Methods and systems for managing identity management security domains  
Embodiments of the present invention provide identity management security domains that may be used in an enterprise security system. A security domain provides a centralized registry of services...
8707026 Apparatus for certificate-based cookie security  
A cookie attribute for use during secure HTTP transport sessions. This attribute points to a server-supplied certificate and, in particular, a digital certificate. The cookie attribute includes a...
8707418 System and methods for web-application communication  
A system for providing communication between one or more clients (50) and one or more service providers (70) is disclosed. The system comprises an access gateway (10) for maintaining...
8707416 Bootstrapping kerberos from EAP (BKE)  
The preferred embodiments involve a mechanism to bootstrap Kerberos from EAP in which EAP is used for initial network access authentication and Kerberos is used for provisioning session keys to...
8707028 Certificate-based cookie security  
A cookie attribute for use during secure HTTP transport sessions. This attribute points to a server-supplied certificate and, in particular, a digital certificate. The cookie attribute includes a...
8705735 Implicit certificate scheme  
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity...
8707029 Mobile handset identification and communication authentication  
Disclosed is a system and method for authenticating a communications channel between a mobile handset associated with a user and an application server, for uniquely identifying the mobile handset...
8707390 System and method for secure access control in a wireless network  
Secure access to a wireless network access can be provided in a system where wireless devices access a wireless network through a wireless access point (WAP). For example, a plurality of...
8707027 Automatic configuration and provisioning of SSL server certificates  
A method and apparatus for automatically configuring and provisioning cryptographic certificates is described. A certificate management sensor receives instructions from a first computing device...
8707031 Identity-based certificate management  
Methods for managing digital certificates, including issuance, validation, and revocation are disclosed. Various embodiments involve querying a directory service with entries that correspond to a...
8707025 Communication apparatus mediating communication between instruments  
A communication apparatus makes a request to issue an electronic certificate of a first instrument to a certificate authority and acquires the electronic certificate from the certificate...
8701205 Validation and/or authentication of a device for communication with network  
A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the...
8700903 Streamlined CSR generation, certificate enrollment, and certificate delivery  
The process of acquiring SSL certificates for enterprise SSL customers is improved by reducing the number of steps used to acquire the SSL certificate and streamlining the process. An on-line CSR...
8700893 Key certification in one round trip  
Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client...
8700920 System and method for content protection on a computing device  
Systems and methods for handling user interface field data. A system and method can be configured to receive input which indicates that the mobile device is to enter into a protected mode. Data...
8700898 System and method for multi-layered sensitive data protection in a virtual computing environment  
Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine...
8701169 Using a single certificate request to generate credentials with multiple ECQV certificates  
A method and apparatus are disclosed for using a single credential request (e.g., registered public key or ECQV certificate) to obtain a plurality of credentials in a secure digital communication...
8694773 Method of preventing unauthenticated viewing using unique information of secure micro  
A method of verifying a validity of a Secure Micro (SM) is provided. The method of verifying a validity of an SM, the method including: storing and maintaining a validity verification message used...
8694772 Method and system for managing network identity  
A method and a system for managing network identity are provided. The method and the system realize a management mechanism of temporary identification (ID) and real ID, which simultaneously...
8694774 Method and system for encryption of messages in land mobile radio systems  
A method and system for authentication of sites in a land mobile radio (LMR) system and encryption of messages exchanged by the sites. In some embodiments, the method includes transmitting a...
8695088 Dynamically constructed capability for enforcing object access order  
Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A...
8688975 Certifying a virtual entity in a virtual universe  
An invention for certifying a virtual entity in a virtual universe is disclosed. A virtual business may opt to register with a security certificate administration center to obtain a security...
8688977 Validating a batch of implicit certificates  
Methods, systems, and computer programs for validating a batch of implicit certificates are described. Data for a batch of implicit certificates are received and validated. In some aspect, the...
8688584 Electronic gaming machine security for software stored in nonvolatile media  
An illustrative method provides security of software resident on electronic gaming machines (EGMs) that permit wagering on games. A determination is made if all software files stored on a...
8688976 Method for issuing a digital certificate by a certification authority, arrangement for performing the method, and computer system of a certification authority  
In a method for issuing a digital certificate by a certification authority (B), a device (A) sends a request message to the certification authority (B) for issuing the certificate, the...
8683197 Method and apparatus for providing seamless resumption of video playback  
Video data files are provided to a user for playback. Once playback begins, the methods and apparatus of the present invention enable a user to interrupt the video playback function and quickly...
8683198 Master key trust grants and revocations for minor keys  
A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master...