Matches 1 - 50 out of 71 1 2 >


Match Document Document Title
US20130007448 SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS  
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an...
US20150006888 METHOD FOR ASSEMBLING AUTHORIZATION CERTIFICATE CHAINS  
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first...
US20130073846 PUSHING CERTIFICATE CHAINS TO REMOTE DEVICES  
Rather than managing a certificate chain related to a newly issued identity certificate at a terminal to which a wireless device occasionally connects, a certificate server can act to determine...
US20120303951 METHOD AND SYSTEM FOR REGISTERING A DRM CLIENT  
A client, method and system for registering a DRM client is disclosed. The method (100) includes the steps of: initiating (110) a registration request via a DRM client with an encrypted...
US20070250705 Integrated Marketing Portal for Businesses  
A system supports creation of design and tangible and intangible commodities related to them such as logos, printed materials, handbooks, web sites, etc. Among various features described are a...
US20070192590 Mobile Presentable Certificate (MPC)  
The present invention teaches systems and methods for validating a user's identity to a validating agent. The system includes a verifiable digital certificate (MPCs—Mobile Presentable...
US20140281502 METHOD AND APPARATUS FOR EMBEDDING SECRET INFORMATION IN DIGITAL CERTIFICATES  
A method and system is provided for embedding cryptographically modified versions of secret in digital certificates for use in authenticating devices and in providing services subject to...
US20110296173 METHOD AND APPARATUS FOR ACHIEVING NONCONFORMANT PUBLIC KEY INFRASTRUCTURES  
Method and apparatus are described wherein, in one example embodiment, a public key certificate issued by a certificate authority includes at least one characteristic that conforms to at least one...
US20110099371 AERONAUTICAL SECURITY MANAGEMENT OVER BROADBAND AIR/GROUND NETWORK  
A method to facilitate securing of air-to-ground communications for an aircraft is provided. The method includes receiving security management information at the aircraft via at least one...
US20130198512 INTERCEPTING ENCRYPTED NETWORK TRAFFIC FOR INTERNET USAGE MONITORING  
An example method disclosed herein to monitor Internet usage comprises intercepting, using a kernel extension executing in an operating system kernel of a device, a first request to be sent to a...
US20120173874 Method And Apparatus For Protecting Against A Rogue Certificate  
Disclosed is a method for protecting against a rogue certificate. In the method, a web client receives a first certificate from a server during an initial session. The first certificate has a...
US20120216035 VALIDATING A CERTIFICATE CHAIN IN A DISPERSED STORAGE NETWORK  
A method begins by a processing module receiving a certificate chain and determining whether at least one of one or more signed certificates of the chain has a valid signature. When the at least...
US20140040611 Distributed Validation of Digitally Signed Electronic Documents  
Systems and methods are presented for distributed validation of a digitally signed electronic document. A computing device accesses both a representation of the electronic document and a digital...
US20100100731 PUSHING CERTIFICATE CHAINS TO REMOTE DEVICES  
Rather than managing a certificate chain related to a newly issued identity certificate at a terminal to which a wireless device occasionally connects, a certificate server can act to determine...
US20140337619 Derived Certificate based on Changing Identity  
A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed...
US20100030805 PROPAGATING INFORMATION FROM A TRUST CHAIN PROCESSING  
A method, system, and computer usable program product for propagating information in a trust chain processing are provided in the illustrative embodiments. Upon a trust client invoking the trust...
US20140281503 CERTIFICATE GRANT LIST AT NETWORK DEVICE  
A certificate grant list is provided. The certificate grant list may be stored in a memory, at the network device. The certificate grant list may store information associated with a client-device...
US20080288775 EMBEDDED HISTORIANS WITH DATA AGGREGATOR  
Systems and methods that aggregate history data collected via embedded historians with additional data that is supplied by third parties. Triggering events can be defined for initiating...
US20130117560 PROCESSING A DISPERSED STORAGE NETWORK ACCESS REQUEST UTILIZING CERTIFICATE CHAIN VALIDATION INFORMATION  
A method begins by a processing module receiving a dispersed storage network (DSN) access request that includes a requester identifier (ID), wherein the requester ID is associated with a...
US20050154879 Batch OCSP and batch distributed OCSP  
Providing information about digital certificate validity includes obtaining a plurality of signing key/verification key pairs, where each signing key provides a digital signature and a...
US20050154878 Signature-efficient real time credentials for OCSP and distributed OCSP  
Providing information about digital certificate validity includes ascertaining digital certificate validity status for each of a plurality of digital certificates in a set of digital certificates,...
US20060107040 Setting up a security access system  
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured...
US20120265985 APPLICATION EXECUTING DEVICE, MANAGING METHOD, AND PROGRAM  
A playback device reads an application and a digital stream from a recording medium to execute the application with playback of the digital stream. The playback device includes a management unit...
US20140082352 LAYERED CERTIFICATION  
A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components. The CPT structure may include a...
US20150172063 Content Protection Continuity Through Authorized Chains of Components  
Provided are techniques for the distribution and control of digital content such that Quality of Experience (QoE) is maintained. Content is protected from when the content is encrypted to when it...
US20150100780 INTERCEPTING ENCRYPTED NETWORK TRAFFIC FOR INTERNET USAGE MONITORING  
Example methods disclosed herein include intercepting, with a meter executing on a computing device, a request sent by a client application to establish a secure communication session with a...
US20070255945 FACILITATING THE DELIVERY OF SECURITY CREDENTIALS TO A NETWORK DEVICE  
A method and system for enabling devices to join secure networks without requiring the devices to be aware of any particular security credential delivery mechanism or to implement multiple...
US20080091940 Public Key Infrastructure  
The invention provides methods, apparatus, systems, and software for cross-certification in Public Key Infrastructure (PKI) systems. A Public Key Infrastructure is provided having a hierarchy of...
US20090235070 Creation of User Digital Certificate For Portable Consumer Payment Device  
A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate...
US20130219173 DESIGNATION OF CLASSES FOR CERTIFICATES AND KEYS  
Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By using a “class” designation...
US20060020784 Certificate based authorized domains  
The present invention relates to a method, a system and a central device for secure content distribution among devices in a network. The invention is based on the idea that an authorized domain is...
US20080072037 Robust peer-to-peer networks and methods of use thereof  
A method of authentication of peers of a peer-to-peer network includes a certificate issuer tracking at most a predetermined number of node IDs for each peer on the peer-to-peer network, a...
US20140250298 METHOD AND DEVICE FOR ENSURING INFORMATION INTEGRITY AND NON-REPUDIATION OVER TIME  
The present invention relates to a method and a device for ensuring information integrity and non-repudiation over time. At least one example embodiment provides a mechanism for secure...
US20050240760 Broker-based interworking using hierarhical certificates  
A method for authentication authorization and accounting (AAA) in an interworking between at least two networks. The at least two networks are capable of communicating with a broker and include a...
US20100217975 METHOD AND SYSTEM FOR SECURE ONLINE TRANSACTIONS WITH MESSAGE-LEVEL VALIDATION  
A method and system for authenticating a client and a server is disclosed. In one contemplated embodiment, the client has a client certificate and the server have a server certificate. The client...
US20090210703 Binding a digital certificate to multiple trust domains  
A public key infrastructure comprising a participant that issues digital certificates. Each digital certificate can be relied upon in at least two different trust domains. The public key...
US20130318343 SYSTEM AND METHOD FOR ENABLING UNCONFIGURED DEVICES TO JOIN AN AUTONOMIC NETWORK IN A SECURE MANNER  
A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes...
US20080022091 Secure Communications  
There are disclosed processes and systems for establishing secure, communication channels between computing devices. The computing devices include respective agents which verify the relative...
US20050198496 Method, electronic device, computer program product of determining a protection domain  
A java implementation on an electronic device determines into which protection domain a downloaded java application belongs based on a root certificate to which the application was authenticated....
US20090187762 TERMINAL DEVICE, SERVER DEVICE, AND CONTENT DISTRIBUTION SYSTEM  
To provide a content distribution system which can prevent use of content which has been temporarily stored after the valid period. A content distribution system (1) including a license server...
US20100115269 Revoking Malware in a Computing Device  
A computing device is operated in a manner which provides improved checking to determine whether or not an authentication certificate for a software application being loaded onto the device has...
US20070033395 Method and system for hierarchical license servers  
A method and system for hierarchical license servers is disclosed. According to one embodiment, a computer implemented method comprises receiving license requests from a plurality of clients. The...
US20080046721 Dynamic multiprovider  
A selection of a plurality of data sources which characterize characteristics and key figures are received. Thereafter, a multiprovider is dynamically generated that is based on the selection and...
US20070094494 Defending against sybil attacks in sensor networks  
A node B of a communication network receives a partial certificate from each of a plurality of nodes Ai in the communication network, constructs an identity certificate based on the partial...
US20100275014 METHOD AND APPARATUS TO CREATE A SECURE WEB-BROWSING ENVIRONMENT WITH PRIVILEGE SIGNING  
Devices and methods use digital certificates and digital signatures to enable computing devices, such as mobile devices, to trust a server attempting to access a resource on the computing device....
US20080010449 Content Control System Using Certificate Chains  
Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be...
US20050177389 Paperless process for mortgage closings and other applications  
According to the present invention, there is provided an electronic document processing system and method including an electronic document generation mechanism, an encrypted digital certificate...
US20100070748 Device and methods for simulating controller area network signals  
The invention relates to a device of generating simulation signals for Controller Area Network (CAN). The device in this invention simulates CAN data streams normally generated by electronic...
US20070094495 Statically Verifiable Inter-Process-Communicative Isolated Processes  
Described herein are one or more implementations of an operating system that provides for statically verifiable inter-process communication between isolated processes. Also, described herein are...
US20070101127 Method of digitally signing data and a data repository storing digitally signed data  
A hierarchical digital signature method is provided by which different levels of data elements of a data entry are processed in turn to derive function values (for example hash function values)...

Matches 1 - 50 out of 71 1 2 >