Matches 1 - 50 out of 73 1 2 >


Match Document Document Title
US20080172338 Information Management System  
An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each...
US20050210241 Method and apparatus for digital rights management using certificate revocation list  
A digital rights management method includes a stage for a device to update a Certificate Revocation List of the device through a connection to a portable storage, a stage to access to the updated...
US20090132813 Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones  
Apparatus and methods perform transactions in a secure environment between an individual and another party, such as a merchant, in various embodiments. The individual possesses a mobile electronic...
US20050204129 Multi-step digital signature method and system  
A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device posesses a share...
US20070113075 SECURE ROUTE OPTIMIZATION FOR MOBILE NETWORK USING MULTI-KEY CRYTOGRAPHICALLY GENERATED ADDRESSES  
A method allows a mobile router that uses the Mobile Internet Protocol version 6 (Mobile IPv6) for mobility management to optimize routing by securely sending binding update messages directly to...
US20100138652 CONTENT CONTROL METHOD USING CERTIFICATE REVOCATION LISTS  
Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own....
US20070174627 Secure compartmented mode knowledge management portal  
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level...
US20080133414 SYSTEM AND METHOD FOR PROVIDING EXTENDED DOMAIN MANAGEMENT WHEN A PRIMARY DEVICE IS UNAVAILABLE  
A system and method for providing extended domain management when a primary device is unavailable. In the absence of a primary domain manager device, an extended device domain is created to allow...
US20110191581 METHOD AND SYSTEM FOR USE IN MANAGING VEHICLE DIGITAL CERTIFICATES  
A system and method is provided for managing digital certificates, the system including one or more a certificate authorities and a vehicle-bound digital certificate manager, the apparatus...
US20060156391 Method and apparatus providing policy-based revocation of network security credentials  
A method for policy-based revocation of network security credentials comprises receiving and storing one or more credential revocation rules, wherein each of the credential revocation rules...
US20050138365 Mobile device and method for providing certificate based cryptography  
A mobile device and method for providing certificate based cryptography includes a receiver (102) operative to receive a wireless transmission (110). Included within the wireless transmission is a...
US20090164776 REVOCATION STATUS CHECKING FOR DIGITAL RIGHTS MANAGMENT  
In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: maintaining information...
US20160119151 METHOD AND SYSTEM FOR DETECTING MISBEHAVIOR FOR VEHICLE-TO-ANYTHING COMMUNICATION  
A method for issuing a reliable certificate to a vehicle for a vehicle-to-anything (V2X) communication in a server on a network comprises receiving a certificate issue request including vehicle...
US20070118739 Certificate issuance server and certification system for certifying operating environment  
It is an object to provide a certification system designed for security patrol, for example, that certifies a patrolled time and a patrolled site in security patrol rounds. It is another object to...
US20110264585 METHOD AND SYSTEM FOR MANAGING EMAIL  
A system is provided for managing email and eliminating spam wherein an email client (112) is configured to receive digitally signed email (117), identify spam email, and allow a user to report...
US20060236098 Multisigning - a protocol for robust multiple party digital signatures  
Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing...
US20150156194 CERTIFICATE STATUS DELIVERY THROUGH A LOCAL ENDPOINT  
Techniques are disclosed for locally distributing online certificate status protocol (OCSP) responses to a client computer. A certificate authority (CA) proactively sends OCSP responses to an...
US20130145158 System and Web Security Agent Method for Certificate Authority Reputation Enforcement  
Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority...
US20120130905 TRANSACTION VERIFICATION ON RFID ENABLED PAYMENT AND TRANSACTION INSTRUMENTS  
A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted...
US20080307223 APPARATUS AND METHOD FOR ISSUER BASED REVOCATION OF DIRECT PROOF AND DIRECT ANONYMOUS ATTESTATION  
In some embodiments, a method and apparatus for issuer based revocation of direct proof and direct anonymous attestation are described. In one embodiment, a trusted hardware device convinces a...
US20070150744 Dual authentications utilizing secure token chains  
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code...
US20100287370 REVOCATION OF CRYPTOGRAPHIC DIGITAL CERTIFICATES  
Different targets (c0, N1) of a digital certificate are mapped into a “super-target” using methods allowing a certificate validity verifier (110) to compute the super-target. The certificate...
US20050021942 Process for updating a revocation list of noncompliant keys appliances or modules in a secure system for broadcasting content  
The process consists in receiving in a reception device a content from a content provider to which is attached a unique identifier of most recent revocation list, the revocation list containing...
US20120166796 SYSTEM AND METHOD OF PROVISIONING OR MANAGING DEVICE CERTIFICATES IN A COMMUNICATION NETWORK  
A certificate manager transmits a certificate service advertisement to a plurality of certificate clients. The certificate service advertisement identifies the certificate manager and includes...
US20070180231 Preventing entitlement management message (EMM) filter attacks  
A system, apparatus, and method are directed towards preventing entitlement/rights filter attacks in a conditional access to secure content over a network. An EMM that is configured to revoke...
US20100318791 CERTIFICATE STATUS INFORMATION PROTOCOL (CSIP) PROXY AND RESPONDER  
Systems and methods are disclosed for providing certificate status information about a certificate includes receiving, at a Certificate Status Information Protocol (CSIP) proxy device the...
US20090210704 SYSTEM AND METHOD FOR WITHDRAWING RIGHTS OBJECT OF THE DIGITAL CONTENTS  
A system in which a source device can withdraw a Rights Object (RO) that a source device requested a target device to move through a Rights Issuer (RI) and operation method thereof are provided....
US20090245520 DIGITAL CONTENT PROTECTION METHODS  
An digital content protection method and device are disclosed. In the method, digital content to be delivered from a content provider to a consumer terminal is retrieved. The digital content is...
US20170093586 TECHNIQUES FOR MANAGING CERTIFICATES ON A COMPUTING DEVICE  
Techniques for managing certificates on a computing device are provided. An example method according to these techniques includes receiving an image file comprising a hash value of a certificate...
US20080010452 Content Control System Using Certificate Revocation Lists  
Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own....
US20050114653 Certificate revocation notification systems  
A revocation notification system for a public key certificate and associated method are provided. At the time of issuance, a CA requests and receives from an independent revocation service...
US20130191633 SYSTEM AND METHOD FOR SUPPORTING MULTIPLE CERTIFICATE STATUS PROVIDERS ON A MOBILE COMMUNICATION DEVICE  
A method and system for supporting multiple digital certificate status information providers are disclosed. An initial service request is prepared at a proxy system client module and sent to as...
US20110154026 SYSTEMS AND METHODS FOR PARALLEL PROCESSING OF OCSP REQUESTS DURING SSL HANDSHAKE  
The present invention is directed towards systems and methods for processing an Online Certificate Status Protocol (OCSP) request in parallel to processing a Secure Socket Layer (SSL) handshake....
US20120246470 INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, SOFTWARE ROUTINE EXECUTION METHOD, AND REMOTE ATTESTATION METHOD  
Techniques for protecting memory locations within a stakeholder's engine according to the Multi-Stakeholder Model, and a protocol for remote attestation to a device supporting the...
US20100153714 USE OF MODULAR ROOTS TO PERFORM AUTHENTICATION INCLUDING, BUT NOT LIMITED TO, AUTHENTICATION OF VALIDITY OF DIGITAL CERTIFICATES  
Authentication of elements (e.g. digital certificates 140) as possessing a pre-specified property (e.g. being valid) or not possessing the property is performed by (1) assigning a distinct integer...
US20060179299 E-mail communication device  
The present invention provides a highly reliable e-mail communication device capable of monitoring validity of a certificate of the e-mail communication device itself. The e-mail communication...
US20060047951 Continuing public key infrastructure operation while regenerating a new certification authority keypair and certificate  
In accordance with one embodiment, continued PKI operation during regenerating a new Certification Authority (CA) keypair and certificate or the like is provided by a root Certification Authority...
US20140101442 SYSTEM AND WEB SECURITY AGENT METHOD FOR CERTIFICATE AUTHORITY REPUTATION ENFORCEMENT  
Network security administrators are enabled to revoke certificates with their customizable certificate authority reputation policy store which is informed by an independent certificate authority...
US20110161663 INTELLIGENT CACHING FOR OCSP SERVICE OPTIMIZATION  
An online certificate status checking protocol (OCSP) system is provided for use with a first device, an end device and a certificate authority. The first device can provide a certificate. The end...
US20070234047 Encryption communications using digital certificates with increased security  
An apparatus for use in implementing encrypted communications using a digital certificate is disclosed. The apparatus is configured to include a memory storing therein the digital certificate; and...
US20070118740 Authentication method and information processor  
In a network made up of a plurality of terminals, each of the terminals in the network includes a digital certificate revocation list. When the digital certificate revocation list of its own is...
US20090037729 AUTHENTICATION FACTORS WITH PUBLIC-KEY INFRASTRUCTURE  
A user access control system comprising a workstation coupled to a computer network and operable to receive a request for an authenticated access to the computer network, and to prompt for and...
US20060282664 CRL last changed extension or attribute  
A method and apparatus for generating a CRL with a last_changed extension. When sequential CRLs are generated there is the potential that there will be no changes in the data associated with the...
US20140068251 METHOD AND DEVICE FOR DYNAMICALLY UPDATING AND MAINTAINING CERTIFICATE PATH DATA ACROSS REMOTE TRUST DOMAINS  
A method and device is provided for dynamically maintaining and updating public key infrastructure (PKI) certificate path data across remote trusted domains to enable relying parties to...
US20080091941 Group Signature System, Member Status Judging Device, Group Signature Method And Member Status Judging Program  
For group signature data capable of keeping anonymity, it is possible to efficiently determine whether the user having created the group signature data is a valid member of the group. When a...
US20070234045 Server Device with Revocation List Acquiring Function  
When a preset activation time is reached, or when a digital MFP is activated manually, a determination is carried out as to whether or not a certificate revocation list is necessary to be...
US20170033935 SHORT-TERM SECURITY CERTIFICATES  
Examples disclosed herein relate to security certificate instructions to receive a request for a security certificate, determine whether the request is valid according to at least one...
US20080034204 Communications Network Security Certificate Revocation  
The distribution of security certificate revocation information on a communications network is disclosed. An issuer node (82) of said network periodically generates data representative of base...
US20120324218 Peer-to-Peer Trusted Network Using Shared Symmetric Keys  
A unique, strong, shared, symmetric network-wide key (or a limited number of group-wide keys) is generated by a central authority and initially provisioned to nodes in a network, which use it for...
US20100077208 CERTIFICATE BASED AUTHENTICATION FOR ONLINE SERVICES  
In one embodiment, a client computer system receives user credentials from a computer user. The client computer system formulates a system identifier that uniquely identifies the system, and sends...

Matches 1 - 50 out of 73 1 2 >