Match
|
Document |
Document Title |
|
US20080172338 |
Information Management System
An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each... |
|
US20050210241 |
Method and apparatus for digital rights management using certificate revocation list
A digital rights management method includes a stage for a device to update a Certificate Revocation List of the device through a connection to a portable storage, a stage to access to the updated... |
|
US20090132813 |
Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones
Apparatus and methods perform transactions in a secure environment between an individual and another party, such as a merchant, in various embodiments. The individual possesses a mobile electronic... |
|
US20050204129 |
Multi-step digital signature method and system
A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device posesses a share... |
|
US20070113075 |
SECURE ROUTE OPTIMIZATION FOR MOBILE NETWORK USING MULTI-KEY CRYTOGRAPHICALLY GENERATED ADDRESSES
A method allows a mobile router that uses the Mobile Internet Protocol version 6 (Mobile IPv6) for mobility management to optimize routing by securely sending binding update messages directly to... |
|
US20100138652 |
CONTENT CONTROL METHOD USING CERTIFICATE REVOCATION LISTS
Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own.... |
|
US20070174627 |
Secure compartmented mode knowledge management portal
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level... |
|
US20080133414 |
SYSTEM AND METHOD FOR PROVIDING EXTENDED DOMAIN MANAGEMENT WHEN A PRIMARY DEVICE IS UNAVAILABLE
A system and method for providing extended domain management when a primary device is unavailable. In the absence of a primary domain manager device, an extended device domain is created to allow... |
|
US20110191581 |
METHOD AND SYSTEM FOR USE IN MANAGING VEHICLE DIGITAL CERTIFICATES
A system and method is provided for managing digital certificates, the system including one or more a certificate authorities and a vehicle-bound digital certificate manager, the apparatus... |
|
US20060156391 |
Method and apparatus providing policy-based revocation of network security credentials
A method for policy-based revocation of network security credentials comprises receiving and storing one or more credential revocation rules, wherein each of the credential revocation rules... |
|
US20050138365 |
Mobile device and method for providing certificate based cryptography
A mobile device and method for providing certificate based cryptography includes a receiver (102) operative to receive a wireless transmission (110). Included within the wireless transmission is a... |
|
US20090164776 |
REVOCATION STATUS CHECKING FOR DIGITAL RIGHTS MANAGMENT
In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: maintaining information... |
|
US20160119151 |
METHOD AND SYSTEM FOR DETECTING MISBEHAVIOR FOR VEHICLE-TO-ANYTHING COMMUNICATION
A method for issuing a reliable certificate to a vehicle for a vehicle-to-anything (V2X) communication in a server on a network comprises receiving a certificate issue request including vehicle... |
|
US20070118739 |
Certificate issuance server and certification system for certifying operating environment
It is an object to provide a certification system designed for security patrol, for example, that certifies a patrolled time and a patrolled site in security patrol rounds. It is another object to... |
|
US20110264585 |
METHOD AND SYSTEM FOR MANAGING EMAIL
A system is provided for managing email and eliminating spam wherein an email client (112) is configured to receive digitally signed email (117), identify spam email, and allow a user to report... |
|
US20060236098 |
Multisigning - a protocol for robust multiple party digital signatures
Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing... |
|
US20150156194 |
CERTIFICATE STATUS DELIVERY THROUGH A LOCAL ENDPOINT
Techniques are disclosed for locally distributing online certificate status protocol (OCSP) responses to a client computer. A certificate authority (CA) proactively sends OCSP responses to an... |
|
US20130145158 |
System and Web Security Agent Method for Certificate Authority Reputation Enforcement
Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority... |
|
US20120130905 |
TRANSACTION VERIFICATION ON RFID ENABLED PAYMENT AND TRANSACTION INSTRUMENTS
A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted... |
|
US20080307223 |
APPARATUS AND METHOD FOR ISSUER BASED REVOCATION OF DIRECT PROOF AND DIRECT ANONYMOUS ATTESTATION
In some embodiments, a method and apparatus for issuer based revocation of direct proof and direct anonymous attestation are described. In one embodiment, a trusted hardware device convinces a... |
|
US20070150744 |
Dual authentications utilizing secure token chains
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code... |
|
US20100287370 |
REVOCATION OF CRYPTOGRAPHIC DIGITAL CERTIFICATES
Different targets (c0, N1) of a digital certificate are mapped into a “super-target” using methods allowing a certificate validity verifier (110) to compute the super-target. The certificate... |
|
US20050021942 |
Process for updating a revocation list of noncompliant keys appliances or modules in a secure system for broadcasting content
The process consists in receiving in a reception device a content from a content provider to which is attached a unique identifier of most recent revocation list, the revocation list containing... |
|
US20120166796 |
SYSTEM AND METHOD OF PROVISIONING OR MANAGING DEVICE CERTIFICATES IN A COMMUNICATION NETWORK
A certificate manager transmits a certificate service advertisement to a plurality of certificate clients. The certificate service advertisement identifies the certificate manager and includes... |
|
US20070180231 |
Preventing entitlement management message (EMM) filter attacks
A system, apparatus, and method are directed towards preventing entitlement/rights filter attacks in a conditional access to secure content over a network. An EMM that is configured to revoke... |
|
US20100318791 |
CERTIFICATE STATUS INFORMATION PROTOCOL (CSIP) PROXY AND RESPONDER
Systems and methods are disclosed for providing certificate status information about a certificate includes receiving, at a Certificate Status Information Protocol (CSIP) proxy device the... |
|
US20090210704 |
SYSTEM AND METHOD FOR WITHDRAWING RIGHTS OBJECT OF THE DIGITAL CONTENTS
A system in which a source device can withdraw a Rights Object (RO) that a source device requested a target device to move through a Rights Issuer (RI) and operation method thereof are provided.... |
|
US20090245520 |
DIGITAL CONTENT PROTECTION METHODS
An digital content protection method and device are disclosed. In the method, digital content to be delivered from a content provider to a consumer terminal is retrieved. The digital content is... |
|
US20170093586 |
TECHNIQUES FOR MANAGING CERTIFICATES ON A COMPUTING DEVICE
Techniques for managing certificates on a computing device are provided. An example method according to these techniques includes receiving an image file comprising a hash value of a certificate... |
|
US20080010452 |
Content Control System Using Certificate Revocation Lists
Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own.... |
|
US20050114653 |
Certificate revocation notification systems
A revocation notification system for a public key certificate and associated method are provided. At the time of issuance, a CA requests and receives from an independent revocation service... |
|
US20130191633 |
SYSTEM AND METHOD FOR SUPPORTING MULTIPLE CERTIFICATE STATUS PROVIDERS ON A MOBILE COMMUNICATION DEVICE
A method and system for supporting multiple digital certificate status information providers are disclosed. An initial service request is prepared at a proxy system client module and sent to as... |
|
US20110154026 |
SYSTEMS AND METHODS FOR PARALLEL PROCESSING OF OCSP REQUESTS DURING SSL HANDSHAKE
The present invention is directed towards systems and methods for processing an Online Certificate Status Protocol (OCSP) request in parallel to processing a Secure Socket Layer (SSL) handshake.... |
|
US20120246470 |
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, SOFTWARE ROUTINE EXECUTION METHOD, AND REMOTE ATTESTATION METHOD
Techniques for protecting memory locations within a stakeholder's engine according to the Multi-Stakeholder Model, and a protocol for remote attestation to a device supporting the... |
|
US20100153714 |
USE OF MODULAR ROOTS TO PERFORM AUTHENTICATION INCLUDING, BUT NOT LIMITED TO, AUTHENTICATION OF VALIDITY OF DIGITAL CERTIFICATES
Authentication of elements (e.g. digital certificates 140) as possessing a pre-specified property (e.g. being valid) or not possessing the property is performed by (1) assigning a distinct integer... |
|
US20060179299 |
E-mail communication device
The present invention provides a highly reliable e-mail communication device capable of monitoring validity of a certificate of the e-mail communication device itself. The e-mail communication... |
|
US20060047951 |
Continuing public key infrastructure operation while regenerating a new certification authority keypair and certificate
In accordance with one embodiment, continued PKI operation during regenerating a new Certification Authority (CA) keypair and certificate or the like is provided by a root Certification Authority... |
|
US20140101442 |
SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT
Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority... |
|
US20110161663 |
INTELLIGENT CACHING FOR OCSP SERVICE OPTIMIZATION
An online certificate status checking protocol (OCSP) system is provided for use with a first device, an end device and a certificate authority. The first device can provide a certificate. The end... |
|
US20070234047 |
Encryption communications using digital certificates with increased security
An apparatus for use in implementing encrypted communications using a digital certificate is disclosed. The apparatus is configured to include a memory storing therein the digital certificate; and... |
|
US20070118740 |
Authentication method and information processor
In a network made up of a plurality of terminals, each of the terminals in the network includes a digital certificate revocation list. When the digital certificate revocation list of its own is... |
|
US20090037729 |
AUTHENTICATION FACTORS WITH PUBLIC-KEY INFRASTRUCTURE
A user access control system comprising a workstation coupled to a computer network and operable to receive a request for an authenticated access to the computer network, and to prompt for and... |
|
US20060282664 |
CRL last changed extension or attribute
A method and apparatus for generating a CRL with a last_changed extension. When sequential CRLs are generated there is the potential that there will be no changes in the data associated with the... |
|
US20140068251 |
METHOD AND DEVICE FOR DYNAMICALLY UPDATING AND MAINTAINING CERTIFICATE PATH DATA ACROSS REMOTE TRUST DOMAINS
A method and device is provided for dynamically maintaining and updating public key infrastructure (PKI) certificate path data across remote trusted domains to enable relying parties to... |
|
US20080091941 |
Group Signature System, Member Status Judging Device, Group Signature Method And Member Status Judging Program
For group signature data capable of keeping anonymity, it is possible to efficiently determine whether the user having created the group signature data is a valid member of the group. When a... |
|
US20070234045 |
Server Device with Revocation List Acquiring Function
When a preset activation time is reached, or when a digital MFP is activated manually, a determination is carried out as to whether or not a certificate revocation list is necessary to be... |
|
US20170033935 |
SHORT-TERM SECURITY CERTIFICATES
Examples disclosed herein relate to security certificate instructions to receive a request for a security certificate, determine whether the request is valid according to at least one... |
|
US20080034204 |
Communications Network Security Certificate Revocation
The distribution of security certificate revocation information on a communications network is disclosed. An issuer node (82) of said network periodically generates data representative of base... |
|
US20120324218 |
Peer-to-Peer Trusted Network Using Shared Symmetric Keys
A unique, strong, shared, symmetric network-wide key (or a limited number of group-wide keys) is generated by a central authority and initially provisioned to nodes in a network, which use it for... |
|
US20100077208 |
CERTIFICATE BASED AUTHENTICATION FOR ONLINE SERVICES
In one embodiment, a client computer system receives user credentials from a computer user. The client computer system formulates a system identifier that uniquely identifies the system, and sends... |