Match Document Document Title
8683195 System and method for reducing fraud  
Pirated certificates may be published or become available in an environment which includes computer networks and websites. An information appliance connected to the environment searches for...
8681993 Local area network  
A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating, distributing and controlling its own keys...
8683580 Image forming apparatus, image forming system, and authentication device  
An image forming apparatus includes: an authentication unit that can execute a login process and a logout process; an operation unit that receives an instruction for the logout process from the...
8683196 Token renewal  
A method and system for renewing certificates stored on tokens is described.
8683571 System and method for authentication of users in a secure computer system  
A system and method for authenticating a user in a secure computer system. A client computer transmits a request for a sign-on page, the secure computer system responds by transmitting a prompt...
8683605 Long-term validation of a digital signature status indicator  
Long-Term Validation (LTV) of a digital signature status indicator is disclosed. In some embodiments, the Long-Term Validation of a digital signature status indicator includes automatically...
8676998 Reverse network authentication for nonstandard threat profiles  
A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection,...
8676878 Domain managing method, domain extending method and reference point controller electing method  
A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request...
8677466 Verification of digital certificates used for encrypted computer communications  
A digital certificate may be extracted from communications between a web browser and a web server computer. The digital certificate may be verified independent of the web browser by comparing the...
8676691 System, report, and method for generating natural language news-based stories  
The present invention generally relates to a system, report, and method for automatically generating a series of natural language news-based stories to be presented via a digital interface or...
8671274 Delivery of multiple third-party services to networked devices  
Systems and methods for authenticating a media device or other information handling system so as to be able to receive content from one or more media content providers. Authenticating the device...
8671080 System and method for managing data loss due to policy violations in temporary files  
A method and apparatus for managing data loss due to policy violations in temporary files is described. In one embodiment, the method includes monitoring, by a client agent, information content on...
8671273 Method of performance-aware security of unicast communication in hybrid satellite networks  
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For...
8667154 Authentication of unknown parties in secure computer communications  
Authentication of an unknown party in a secure computer communication may be performed even without consulting a public whitelist of trusted parties. A digital certificate from an unknown party...
8667266 System and method for sending encrypted messages to a distribution list  
A system and method for sending encrypted messages to a distribution list. In one embodiment, the method comprises: identifying a distribution list address in a message; determining one or more...
8667269 Efficient, secure, cloud-based identity services  
An Identity Ecosystem Cloud (IEC) provides global, scalable, cloud-based, cryptographic identity services as an identity assurance mechanism for other services, such as data storage, web services,...
8667274 System and method for WORM data storage  
A system and method for Write Once, Read Many (WORM) compliant storage is disclosed. A storage administrator in user space is employed as an interface between the kernel space WORM VFS and the...
8667270 Securely upgrading or downgrading platform components  
A method for securely altering a platform component is provided, comprising: assigning certificates for public encryption and signature verification keys for the device; assigning certificates for...
8667573 Validating the origin of web content  
Described herein is a technique of protecting users against certain types of Internet attacks. The technique involves obtaining certificates from visited web sites and qualifying communications...
8661246 System and method for protecting certificate applications using a hardened proxy  
A system for preventing computer software from communicating from a user computer in a network to untrusted remote computers. A host-based credential management agent is operably connected to a...
8661245 Systems and methods for empowering IP practitioners  
A browser application has at least two web browser objects for browsing Private PAIR while hiding multi-page navigation from a user. The browser application is configured to automatically download...
8661252 Secure network address provisioning  
A network in which a client receives a network credential, such as a valid network address, following an exchange of messages with a credential server that includes security information. The...
8661525 Implementation method and system of virtual private network  
An implementation method and system of a virtual private network (VPN) are provided in the invention, wherein, the VPN dedicated mapping table of the VPN is stored in the mapping plane in the...
8661021 Virtual private supply chain  
A generic Internet based system for viewing supply chain data is provided. The system includes an Internet based data viewing engine and a data store that holds both viewable data and metadata...
8656505 Compliance validator for restricted network access control  
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation...
8656155 Dynamic generation and processing of certificate public information directories  
Digital certificate public information is extracted using a processor from at least one digital certificate stored within at least one digital certificate storage repository. The extracted digital...
8656183 Federated digital rights management scheme including trusted systems  
Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a...
8656165 Electronic vehicle document display  
A method of displaying electronic documents on a vehicle display screen is described. The vehicle includes a display screen embedded in a window of the vehicle in a manner visible from outside the...
8656490 Safe and secure access to dynamic domain name systems  
A method and apparatus for safe and secure access to dynamic domain name systems. In one embodiment a method comprises transmitting a DNS query to a dynamic DNS server. The DNS query comprises a...
8650392 Ticket authorization  
A method for issuing tickets in a communication system comprising a plurality of nodes that are capable of establishing a communication connection between two or more clients, the method...
8650394 Certifying the identity of a network device  
According to one aspect, a method for certifying the identity of a network device. The method includes an initial step of coupling the network device to a provisioning device via a physically...
8645697 Message authorization  
In some embodiments, a technique for authorizing a subsequent message comprises receiving a request to authorize a subsequent message, determining whether the request is valid, and authorizing the...
8645684 Synchronizing certificates between a device and server  
Systems and methods for processing messages within a wireless communications system are disclosed. A server within the wireless communications system maintains a list of certificates contained in...
8645696 Notifying users of server changes via SSL  
An apparatus and a method for authenticating a secure communication is described. A server receives a request from a client for an original SSL certificate. The server embeds a message in a common...
8646062 Remote authentication based on challenge-response using digital certificates  
Embodiments of the invention provide for authenticating users of web-based applications by presenting a previously acquired signed digital signature. Examples establish secure user sessions...
8645699 Use of certificate authority to control a device's access to services  
A mobile communications device having a digital certificate authenticating the device itself is proposed. A server for authenticating the device and a method of authenticating the device are also...
8646093 Method and system for configuration management database software license compliance  
A software license engine allows an enterprise to model software license contracts and evaluate deployment of software for compliance with the software license contracts. Deployment of software...
8640102 Removal of program licensed to user  
An image forming apparatus includes a program storing unit, a function introducing unit to obtain a program licensed to an individual user and license information about the program from an...
8639922 System, method, and apparata for secure communications using an electrical grid network  
A secure communications and location authorization system using a power line or a potion thereof as a side-channel that mitigates man-in-the-middle attacks on communications networks and devices...
8640185 Personal-information managing apparatus and personal-information handling apparatus  
A personal-information managing apparatus includes: a usage permission policy managing unit to manage usage permission policy in which a boundary between usage permission and usage prohibition of...
8639295 Method for unlocking screen, mobile electronic device using the same and storage medium thereof  
A method for unlocking screen, a mobile electronic device using the same and a storage medium thereof are disclosed. First, at least two signal input areas on a touch screen of the mobile...
8639823 Switching between connectivity types to maintain connectivity  
Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity...
8635669 Method and system for execution monitor-based trusted computing  
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service...
8635447 Managing certificates between software environments  
A method is used in managing certificates between software environments. In a Flex operating environment, a certificate store is maintained that is accessible to a Java operating environment. In...
8635442 System and method for long-term digital signature verification utilizing light weight digital signatures  
Various embodiments of a system and method for long-term digital signature verification utilizing light weight digital signatures are described. Embodiments may include a verifying entity system...
8635448 Secure prefix authorization with untrusted mapping services  
In one embodiment, a first router associated with a first network node sends a first map lookup that includes a particular device identifier associated with a second network node to a mapping...
8635445 Method for digital identity authentication  
In a preferred embodiment of the invention, an authenticating device (22) receives a first digital identity (43) and a second digital identity (63). The authenticating device (22) uses the second...
8630955 Financial card system, communications device, authentication terminal, authentication method, and program  
Disclosed herein is a financial card system. The system includes a communications device on which a non-contact integrated circuit chip is installed; and an authentication terminal having a...
8631462 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Trusted network management method of trusted network connections based on tri-element peer authentication
 
A trusted network management method of trusted network connections based on tri-element peer authentication. A trusted management proxy and a trusted management system are respectively installed...
8626929 Scalable session management using an encrypted session key  
Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key...