Match Document Document Title
8627064 Flexible system and method to manage digital certificates in a wireless network  
An infrastructure is provided for managing the distribution of digital certificates for network security in wireless backhaul networks. In embodiments, a root certificate management system (root...
8627063 Systems and methods for flash crowd control and batching OCSP requests via online certificate status protocol  
The present invention is directed towards systems and methods for batching OCSP requests and caching corresponding responses. An intermediary between a plurality of clients and one or more servers...
8627085 Customizable public key infrastructure and development tool for same  
A public key infrastructure comprises a client side to request and utilize certificates in communication across a network and a server side to administer issuance and maintenance of said...
8625803 Updating shared keys  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for updating shared keys. In one aspect, a method includes generating, at a first server and...
8627410 Dynamic radius  
A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the...
8627420 Apparatus for associating a client device or service with a wireless network  
A network association apparatus includes identification information and an authorization credential associated with a specific client device or service to be connected to a wireless network. The...
8627493 Single sign-on for network applications  
A method may include authenticating a device to a first server, where the device includes an agent; receiving a request, in the first server from a second server, to verify the authenticity of the...
8626647 Electronic mortgage document certification  
Electronic documents corresponding to executed paper documents are certified. A certifying agent receives an electronic document and a corresponding paper document that had been executed pursuant...
8627060 Trusted network interface  
Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet,...
8621204 Systems and methods for evaluating and prioritizing responses from multiple OCSP responders  
The present invention is directed towards systems and methods for determining a status of a client certificate from a plurality of responses for an Online Certificate Status Protocol (OCSP)...
8621569 Intercluster relationship management  
Data storage and management systems can be interconnected as clustered systems to distribute data and operational loading. Further, independent clustered storage systems can be associated to form...
8621653 Secure location collection and analysis service  
A location collection system is described herein that provides a uniform facility for reporting location data to a cloud-based service from a variety of devices, and that provides a uniform...
8621561 Selective authorization based on authentication input attributes  
Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an...
8621595 System and method for authenticating a network gateway  
A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an...
8621591 Software signing certificate reputation model  
A request from a software developer is received to digitally sign software included in the request. A security policy associated with the software developer is accessed where the security policy...
8621205 Certificate remoting and recovery  
Certificate remoting and recovery may be provided. A computer may identify required security certificates and determine whether at least one required security certificate is not available. If the...
8621582 Authentication system  
Methods, interface, and a communication network in a 3GPP network are presented. A user is authenticated and application service rules are binded to the user in GGSN filters ensuring that the...
8621615 Behavior-based traffic profiling based on access control information  
A method includes receiving one or more of user information, role information, or authorization information associated with a user accessing a network, selecting a traffic flow to monitor that is...
8621203 Method and apparatus for authenticating a mobile device  
An approach is provided for authenticating a mobile device. A mobile device initiates transmission of a request to an authentication platform for generating a public-key certificate to access a...
8621206 Authority-neutral certification for multiple-authority PKI environments  
A method for facilitating electronic certification, and systems for use therewith, are presented in the context of public key encryption infrastructures. Some aspects of the invention provide...
8621625 Methods and systems for detecting infected files  
A computer-implemented method for detecting infected files may include identifying a set of known-clean files. The method may also include identifying a set of characteristics of an unchecked...
8615743 Adaptive compiled code  
In a managed execution environment, an error may be deferred until execution of the application, program, function, or other assemblage of code reaches a point at which calling the reference to a...
8615653 Methods and systems for dynamic updates of digital certificates via subscription  
Methods and systems of the present invention allow for dynamic updates of digital certificates, such as X.509 SSL certificates. The updates are available via a subscription, where the subscription...
8615788 Method and apparatus for scalable integrity attestation in virtualization environments  
A computer implemented method for logging extensions to platform configuration registers inside a trusted platform module instance is provided. A request to extend the current state of at least...
8615654 Systems and methods for optimizing SSL handshake processing  
A method for enabling efficient SSL handshakes through pre-computing of handshake messages, the method includes: receiving, by an appliance, a server certificate identifying a server; generating,...
8613057 Identity management facilitating minimum disclosure of user data  
A method and apparatus to prove user assertions. A client request to authenticate a user assertion pertaining to user personal data may be received. The requested authentication may be generated...
8610942 Discard certification output device, method for outputting discard certificate and computer readable medium  
A discard certification output device is installed in one of a document generation apparatus generating a document, a document discard apparatus discarding the document, and a server connected to...
8613064 Method and apparatus for providing a secure authentication process  
A method and apparatus for providing a secure authentication process is described. In one embodiment, a method for a method for providing a secure authentication process includes monitoring login...
8612748 Data protection method for e-mail and electronic device having data protection function  
A computerized data protection method prevents data of an electronic device from being compromised through e-mail. A digital certificate is installed in the electronic device, and one or more safe...
8613046 Far-end control method with security mechanism  
The present invention relates to a far-end control method with a security mechanism including a host transmitting an identification code through the PSTN (Public switched telephone network) to the...
8605296 Digital signature system and method  
A digital signature system and method are disclosed. The digital signature system may include a remote certificate server for storing and maintaining at least one digital certificate of a user by...
8607044 Privacy enhanced identity scheme using an un-linkable identifier  
A privacy enhanced identity scheme that may use public and private key cryptography to selectively distribute attributes of a token holder to a relying party. A challenge message {Rnonce, RID},...
8607042 E-mail firewall with stored key encryption/decryption  
An e-mail firewall applies policies to messages between a first site and a plurality of second sites in accordance with administrator selectable policies. The firewall includes an SMTP relay and...
8601555 System and method of providing domain management for content protection and security  
A system and method of providing domain management for content protection and security is disclosed. A secure device domain is generated to allow sharing of content among a plurality of consumer...
8601562 Policy enforcement using ESSO  
A method for enforcing policies used with a computer client, the method including receiving, at policy decision point (PDP) processor, information from a single sign-on (SSO) system indicating an...
8601558 Pushing certificate chains to remote devices  
Rather than managing a certificate chain related to a newly issued identity certificate at a terminal to which a wireless device occasionally connects, a certificate server can act to determine...
8601261 System and method of accessing keys for secure messaging  
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associate with the recipient. The received data is used...
8601270 Method for the preparation of a chip card for electronic signature services  
A method for preparing a chip card for electronic signature services. According to said method, data is exchanged between a chip card user and a signature portal, an asymmetric pair of keys and a...
8595484 Method and device for distributing public key infrastructure (PKI) certificate path data  
A method and device for distributing public key infrastructure (PKI) certificate path data enables relying nodes to efficiently authenticate other nodes in an autonomous ad-hoc network. The method...
8595815 System and method for selectively granting access to digital content  
The present invention relates to a system and method for granting access to digital content delivered via a computer network wherein a suitable digital certificate provides a means for providing...
8594324 Key validation scheme  
A method performed at a computing device for validation of a public key, the public key for use in a communication system. The method includes obtaining the public key, and verifying, by the...
8595492 On-demand protection and authorization of playback of media assets  
On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a...
8595483 Associating a multi-context trusted platform module with distributed platforms  
In one embodiment, the present invention includes a method for creating an instance of a virtual trusted platform module (TPM) in a central platform and associating the instance with a managed...
8595485 Security management method and system for WAPI terminal accessing IMS network  
The present invention discloses a security management method and a security management system for a WAPI terminal accessing an IMS network. The method comprises: an authentication service unit...
8589677 System and method for retrieving related certificates  
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, all certificates related to an identified certificate are...
8589140 System and method for emulating and profiling a frame-based application playing on a mobile device  
A system, method and software product emulate and profile an application playing on a mobile device. The mobile device is emulated using a model based upon characteristics related to performance...
8589674 Revocation list update for devices  
In one embodiment, a method includes receiving a revocation request for revoking a model type of a device. A first computing device determines a list of device unit identifiers (UIDs) that are...
8589676 Communication system and method in public key infrastructure  
In a communication system wherein a device and a client communicate data with each other through a network, the device holds a root certificate including a public key in a pair of the public key...
8590009 Computer system for port forwarding  
A computer system includes multiple computer modules each including at least a calculator and a storing unit. A first computer module of the computer modules includes: a storing unit that stores...
8584249 System for preventing unauthorized use of digital content  
A system for preventing unauthorized use of digital content that can prevent unauthorized use of digital content and can reliably collect a charge for secondary use is provided. The system for...