Chain Or Hierarchical Certificates Patents (Class 713/157)
-
Patent number: 8695088Abstract: Proposed is a Capability Management System (CMS) in a distributed computing environment that controls access to multiple objects by multiple subjects based upon a specified access order. A capability is dynamically constructed when the capability is needed. After the capability is used to access an object, a new capability is generated. In the alternative, multiple capabilities for enforcing an access order are generated independently of each other. The new capability is then employed by the same or another subject to access the object according to a prescribed access sequence. In this manner, at any particular time there is one capability valid to access the object by the appropriate subject. In addition, the capability includes information for verifying the authenticity of the capability and for specifying an expiration time associated with the capability. The technology may also be enhanced by providing a linkage between capabilities intended for use in a sequence.Type: GrantFiled: May 8, 2012Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventor: I-Lung Kao
-
Patent number: 8683197Abstract: Video data files are provided to a user for playback. Once playback begins, the methods and apparatus of the present invention enable a user to interrupt the video playback function and quickly resume playback prior to reloading the selected video file. The techniques of the present invention can store video data in a cache memory and, upon interruption, capture a frame of video data at approximately the time of the interruption. The captured frame and cache data can be used to provide the user with a unique menu option for resumption of the video playback at the moment of interruption.Type: GrantFiled: March 10, 2008Date of Patent: March 25, 2014Assignee: Apple Inc.Inventors: William Bull, Kourtny Minh Hicks, Aram Lindahl
-
Patent number: 8683198Abstract: A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key.Type: GrantFiled: April 27, 2012Date of Patent: March 25, 2014Assignee: Facebook, Inc.Inventor: James A. Roskind
-
Patent number: 8683580Abstract: An image forming apparatus includes: an authentication unit that can execute a login process and a logout process; an operation unit that receives an instruction for the logout process from the user; a user attribute storage unit that stores the identification information of a non-logged-out user; a determination unit that determines whether a logged-in user, who is a user for whom the login process is executed by the authentication unit, is the non-logged-out user, based on the identification information stored in the user attribute storage unit; and a forced logout processing unit that, in a case in which the logged-in user is determined to be the non-logged-out user by the determination unit, instructs the authentication unit to execute the logout process when a predefined particular process among the plurality of processes is executed and completed by the processing unit.Type: GrantFiled: August 18, 2011Date of Patent: March 25, 2014Assignee: Kyocera Document Solutions Inc.Inventor: Takeo Shimizu
-
Publication number: 20140082352Abstract: A certification provenance tree (CPT) structure may provide information concerning a layered certification of a device that comprises a hierarchy of components. The CPT structure may include a hierarchy of secure certification provenance document (SCPD) structures. Each SCPD structure in the hierarchy may represent a given component at a given level of the hierarchy of components of the device. Each SCPD structure may include a field that stores a certification proof indicating that security properties of the given component have been certified by a certification authority. An SCPD structure may further include accreditation information fields that store a pointer to an SCPD structure of a component at a next layer of the hierarchy of components of the device. The pointer may provide an indication of assurance that the component at that next layer will perform securely within this component at said given layer.Type: ApplicationFiled: September 19, 2013Publication date: March 20, 2014Inventors: Dolores F. Howry, Yogendra C. Shah, Alec Brusilovsky, Joseph Gredone
-
Patent number: 8676998Abstract: A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection, the client transmits a request and the server performs or responds accordingly. A network management system and environment where this protocol can be used is also described and claimed.Type: GrantFiled: November 29, 2007Date of Patent: March 18, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8671274Abstract: Systems and methods for authenticating a media device or other information handling system so as to be able to receive content from one or more media content providers. Authenticating the device includes determining what authentication information the media content providers require for access and then to generating and providing to the media device an authentication token that includes the required information. In some embodiments this may be accomplished by a service center, which removes the need for additional authentication steps to be performed by the media device or the media content providers. In addition, the service center may also determine when changes are made to the authentication information and may then ensure that the authentication token is changed or updated to reflect these changes. This ensures that the media device is at least partially immune to changes to authentication.Type: GrantFiled: October 28, 2008Date of Patent: March 11, 2014Assignee: Dell Products L.P.Inventors: Mark Andrew Ross, Timothy Bucher
-
Patent number: 8656165Abstract: A method of displaying electronic documents on a vehicle display screen is described. The vehicle includes a display screen embedded in a window of the vehicle in a manner visible from outside the vehicle. The method includes storing the digital certificate in a memory unit of the control module. The method includes displaying information on the display screen by retrieving the digital certificate. Also, upon validating the digital certificate, the information associated with the digital certificate is displayed on the display screen, wherein the information includes an electronic document that indicates at least one of compliance with a local law, valid insurance, validation of payment of taxes associated with the vehicle, and a parking receipt for parking the vehicle, wherein the display screen comprises at least one button, manipulable by a user outside of said vehicle, to select a display mode of said display screen.Type: GrantFiled: July 5, 2012Date of Patent: February 18, 2014Assignee: International Business Machines CorporationInventors: Giuseppe Longobardi, Scot MacLellan
-
Patent number: 8650623Abstract: Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.Type: GrantFiled: January 17, 2007Date of Patent: February 11, 2014Assignee: International Business Machines CorporationInventors: Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R. Rao
-
Publication number: 20140040611Abstract: Systems and methods are presented for distributed validation of a digitally signed electronic document. A computing device accesses both a representation of the electronic document and a digital signature for the electronic document that includes a digest generated by the digital signature's creator by applying a one-way function to the electronic document. The computing device applies the same one-way function to the accessed representation of the electronic document to generate a new digest, and includes both the digital signature and the new digest in a request sent to a separate validation server. The request does not include the electronic document. The validation server generates validation results that depend on comparing the digest from the digital signature with the new digest, and that do not depend on having the electronic document available to the validation server. The computing device receives the validation results from the separate validation server.Type: ApplicationFiled: July 31, 2012Publication date: February 6, 2014Inventors: Isak Tenenboym, Philip G. Levy, Marc T. Kaufman, John T. Landwehr
-
Patent number: 8645696Abstract: An apparatus and a method for authenticating a secure communication is described. A server receives a request from a client for an original SSL certificate. The server embeds a message in a common name (CN) of a new SSL certificate directing the client to another server. The client is transparently reconfigured and establishes a secure communication with the other server using the new SSL certificate.Type: GrantFiled: November 26, 2008Date of Patent: February 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8646093Abstract: A software license engine allows an enterprise to model software license contracts and evaluate deployment of software for compliance with the software license contracts. Deployment of software products in the enterprise is modeled in a configuration management database. The software license engine maintains a license database for connecting software license contracts with software deployment modeled by the configuration management database. Users of the software license engine may use license types that are predefined in the software license engine or may define custom license types. The software license engine may indicate compliance or non-compliance with the software license contracts.Type: GrantFiled: December 9, 2009Date of Patent: February 4, 2014Assignee: BMC Software, Inc.Inventors: Anthony George Myers, Thomas Louis Adrian
-
Patent number: 8630955Abstract: Disclosed herein is a financial card system. The system includes a communications device on which a non-contact integrated circuit chip is installed; and an authentication terminal having a reader/writer allowing reading/writing information on the communications device and capable of transmission and reception of information with the communications device through the reader/writer. The communications device has a storage block, a common area information transmission block, and an individual area information transmission block. The reader/writer of the authentication terminal has a storage block, a common area information reception block, and an individual area information reception block.Type: GrantFiled: December 14, 2010Date of Patent: January 14, 2014Assignee: Felica Networks, Inc.Inventors: Toshiya Kurasaki, Hideaki Kihara
-
Patent number: 8627066Abstract: A method begins by a processing module receiving a dispersed storage network (DSN) access request that includes a requester identifier (ID), wherein the requester ID is associated with a certificate chain. When the certificate chain is valid, the method continues with the processing module accessing registry information for the DSN. The method continues with the processing module identifying one of a plurality of access control lists based on at least one of information associated with the requester ID and information associated with the certificate chain, identifying one or more entries of the one of the plurality of access control lists based on the information associated with the certificate chain to produce one or more identified entries, and generating, for the DSN access request, permissions from one or more sets of permissions associated with the one or more identified entries.Type: GrantFiled: November 3, 2011Date of Patent: January 7, 2014Assignee: Cleversafe, Inc.Inventors: Jason K. Resch, Wesley Leggette, Bart Cilfone
-
Patent number: 8627064Abstract: An infrastructure is provided for managing the distribution of digital certificates for network security in wireless backhaul networks. In embodiments, a root certificate management system (root CMS) processes requests for digital certificates, issues root certificates, automatically authenticates surrogate certificate management systems (sur-CMSs), and automatically processes certificate requests and issues certificate bundles to sur-CMSs that are successfully authenticated. The infrastructure includes sur-CMSs to which are assigned base stations within respective regions. Each sur-CMS automatically authenticates its own base stations and automatically processes certificate requests and issues certificate bundles to base stations that are successfully authenticated. A certificate bundle issued to a base station includes a digital certificate, signed by the issuing sur-CMS, of a public key of such base station, and at least one further digital certificate, including a self-signed certificate of the root CMS.Type: GrantFiled: June 8, 2011Date of Patent: January 7, 2014Assignee: Alcatel LucentInventors: Alexandro F. Salvarani, Fred Davant
-
Patent number: 8627410Abstract: A system includes a remote authentication dial in user service (RADIUS) server in communication with a network access server. The network access server provides an authentication request to the RADIUS server. The authentication request includes at least a user identifier and a device identifier. The RADIUS server determines an authentication format utilized by the network access server based on the received authentication request. The system may also determine an authorization level to provide with an authentication response.Type: GrantFiled: December 19, 2007Date of Patent: January 7, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Jeffrey W. Hughes, Andrew L. Bates, Jared M. Allison
-
Patent number: 8627065Abstract: A method begins by a processing module receiving a certificate chain and determining whether at least one of one or more signed certificates of the chain has a valid signature. When the at least one of the one or more signed certificates has a valid signature, the method continues with the processing module identifying one or more certificate authorities (CA) to produce identified CAs, accessing registry information that includes one or more realm identifiers (IDs) and a plurality of trusted CA IDs, determining whether one or more of the identified CAs is a trusted CA, and when the one or more of the identified CAs is a trusted CA, indicating that the certificate chain is valid, identifying a realm ID based on a trusted CA ID, and generating certificate chain validation information to include the realm ID, trusted CAs, and the indication of the validity of the certificate chain.Type: GrantFiled: November 3, 2011Date of Patent: January 7, 2014Assignee: Cleversafe, Inc.Inventors: Wesley Leggette, Jason K. Resch, Bart Cilfone
-
Patent number: 8627063Abstract: The present invention is directed towards systems and methods for batching OCSP requests and caching corresponding responses. An intermediary between a plurality of clients and one or more servers receives a first client certificate during a first SSL handshake with a first client and a second client certificate during a second SSL handshake with a second client. The intermediary may identify that the statuses of the client certificates are not in a cache of the intermediary. An OCSP responder of the intermediary may transmit a single request to an OCSP server to determine the statuses. The intermediary may determine, from a single response received from the OCSP server, whether to establish SSL connections with the clients based on the statuses. The intermediary may store the statuses to the cache for determining whether to establish a SSL connection in response to receiving a client certificate from the first client.Type: GrantFiled: December 23, 2009Date of Patent: January 7, 2014Assignee: Citrix Systems, Inc.Inventors: Christofer Edstrom, Tushar Kanekar
-
Patent number: 8621569Abstract: Data storage and management systems can be interconnected as clustered systems to distribute data and operational loading. Further, independent clustered storage systems can be associated to form peered clusters. As provided herein, methods and systems for creating and managing intercluster relationships between independent clustered storage systems, allowing the respective independent clustered storage systems to exchange data and distribute management operations between each other while mitigating administrator involvement. Cluster introduction information is provided on a network interface of one or more nodes in a cluster, and intercluster relationships are created between peer clusters. A relationship can be created by initiating contact with a peer using a logical interface, and respective peers retrieving the introduction information provided on the network interface.Type: GrantFiled: April 1, 2009Date of Patent: December 31, 2013Assignee: NetApp Inc.Inventor: Steven M. Ewing
-
Patent number: 8621204Abstract: The present invention is directed towards systems and methods for determining a status of a client certificate from a plurality of responses for an Online Certificate Status Protocol (OCSP) request. An intermediary device between a plurality of clients and one or more servers identifies a plurality of OCSP responders for determining a status of a client certificate responsive to receiving the client certificate from a client during a Secure Socket Layer (SSL) handshake. Each of the plurality of OCSP responders may transmit a request for the status of the client certificate to a uniform resource locator corresponding to each OCSP responder. The intermediary device may determine a single status for the client certificate from a plurality of statuses of the client certificate received via responses from each uniform resource locator.Type: GrantFiled: December 23, 2009Date of Patent: December 31, 2013Assignee: Citrix Systems, Inc.Inventors: Christofer Edstrom, Tushar Kanekar
-
Patent number: 8615663Abstract: Systems and methods for secure remote biometric authentication are provided. A network-based biometric authentication platform stores biometric templates for individuals which have been securely enrolled with the authentication platform. A plurality of sensor platforms separately establishes secure communications with the biometric authentication platform. The sensor platform can perform a biometric scan of an individual and generate a biometric authentication template. The sensor platform then requests biometric authentication of the individual by the biometric authentication platform via the established secure communications. The biometric authentication platform compares the generated biometric template to one or more of the enrolled biometric templates stored in memory at the biometric authentication platform. The result of the authentication is then communicated to the requesting sensor platform via the established secure communications.Type: GrantFiled: April 17, 2007Date of Patent: December 24, 2013Assignee: Broadcom CorporationInventor: Mark Buer
-
Patent number: 8613064Abstract: A method and apparatus for providing a secure authentication process is described. In one embodiment, a method for a method for providing a secure authentication process includes monitoring login activity of at least one authentication process associated with a computer resource and analyzing the login activity to identify suspicious login activity associated with user credentials.Type: GrantFiled: September 30, 2008Date of Patent: December 17, 2013Assignee: Symantec CorporationInventor: Jayanta Roy
-
Patent number: 8613057Abstract: A method and apparatus to prove user assertions. A client request to authenticate a user assertion pertaining to user personal data may be received. The requested authentication may be generated for the client, the authentication proving the user assertion without revealing other information about the user. The requested authentication may be sent to the client.Type: GrantFiled: November 27, 2006Date of Patent: December 17, 2013Assignee: Red Hat, Inc.Inventor: Peter A. Rowley
-
Patent number: 8613046Abstract: The present invention relates to a far-end control method with a security mechanism including a host transmitting an identification code through the PSTN (Public switched telephone network) to the I/O control device of the far-end. The I/O control device has a CPU to receive the identification code and judge whether the identification code matches with the predetermined value stored therein; if the identification code matches with the predetermined value, the mobile internet connection between the host and the I/O control device is activated to enable the host to mutually transmit information or signals with a far-end control device from the I/O control device through the mobile internet, and the connection will be disabled after the information or signal transmission is completed.Type: GrantFiled: December 29, 2008Date of Patent: December 17, 2013Assignee: Moxa Inc.Inventor: Hsu-Cheng Wang
-
Patent number: 8601558Abstract: Rather than managing a certificate chain related to a newly issued identity certificate at a terminal to which a wireless device occasionally connects, a certificate server can act to determine the identity certificates in a certificate chain related to the newly issued identity certificate. The certificate server can also act to obtain the identity certificates and transmit the identity certificates towards the device that requested the newly issued identity certificate. A mail server may receive the newly issued identity certificate and the identity certificates in the certificate chain and manage the timing of the transmittal of the identity certificates. By transmitting the identity certificates in the certificate chain before transmitting the newly issued identity certificate, the mail server allows the user device to verify the authenticity of the newly issued identity certificate.Type: GrantFiled: November 15, 2012Date of Patent: December 3, 2013Assignee: Blackberry LimitedInventors: Cheryl Wing-Yee Mok, Van Quy Tu
-
Publication number: 20130318343Abstract: A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes communicating the initial information package to a signing authority, receiving an authorization token from the signing authority, and sending the authorization token to the unconfigured device, where the unconfigured device validates the authorization token based on a credential in the unconfigured device. In more specific embodiments, the initial information package includes a unique device identifier of the unconfigured device and a domain identifier of the domain. In further embodiments, the signing authority creates the authorization token by applying an authorization signature to the unique device identifier and the domain identifier. In other embodiments, the method includes receiving an audit history report of the unconfigured device and applying a policy to the device based on the audit history report.Type: ApplicationFiled: May 22, 2012Publication date: November 28, 2013Inventors: Steinthor Bjarnason, Michael H. Behringer, Yves Francis Eugene Hertoghs, Max Pritikin
-
Patent number: 8595484Abstract: A method and device for distributing public key infrastructure (PKI) certificate path data enables relying nodes to efficiently authenticate other nodes in an autonomous ad-hoc network. The method includes compiling, at a certificate path management unit (CPMU), the PKI certificate path data (step 405). One or more available certificate paths are then determined at the CPMU for at least one relying node (step 410). Next, the PKI certificate path data are distributed by transmitting a certificate path data message from the CPMU to the at least one relying node (step 415). The certificate path data message includes information identifying one or more trusted certification authorities associated with the one or more available certificate paths.Type: GrantFiled: July 29, 2008Date of Patent: November 26, 2013Assignee: Motorola Solutions, Inc.Inventors: Shanthi E. Thomas, Erwin Himawan, Ananth Ignaci, Anthony R. Metke
-
Patent number: 8595815Abstract: The present invention relates to a system and method for granting access to digital content delivered via a computer network wherein a suitable digital certificate provides a means for providing authorization to access the requested digital content.Type: GrantFiled: July 26, 2007Date of Patent: November 26, 2013Inventors: Gregory Alan Bolcer, Clay H. Cover
-
Patent number: 8595492Abstract: On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a client for the digital media. The method also includes generating a protected copy of the digital media from the digital media and the intermediary data. The method also includes storing a description of the protected copy in a database and sending the protected copy to the client. The method also includes receiving a request from the client to access the digital media and reading the description from the database based on information in the request. The method also includes sending a response to the client, the response indicating whether the client is authorized to access the digital media, and the response including cryptographic data to decrypt the protected digital media if the client is authorized to access the digital media.Type: GrantFiled: August 19, 2009Date of Patent: November 26, 2013Assignee: Pix System, LLCInventors: Paul McReynolds, Eric B. Dachs, Erik Bielefeldt, Craig Wood
-
Patent number: 8589677Abstract: A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, all certificates related to an identified certificate are retrieved from the certificate servers automatically by the certificate synchronization application, where the related certificates comprise at least one of one or more CA certificates and one or more cross-certificates. Embodiments described herein facilitate at least partial automation of the downloading and establishment of certificate chains, thereby minimizing the need for users to manually search for individual certificates.Type: GrantFiled: December 13, 2011Date of Patent: November 19, 2013Assignee: BlackBerry LimitedInventors: Michael Stephen Brown, Herbert Anthony Little, Neil Patrick Adams, Michael Grant Kirkup, Michael Kenneth Brown
-
Patent number: 8584249Abstract: A system for preventing unauthorized use of digital content that can prevent unauthorized use of digital content and can reliably collect a charge for secondary use is provided. The system for preventing unauthorized use may include: a distributing recording medium ? on which a content file having header information “A” and a data body “B” is recorded in a state of lacking play information “A1” indispensable for playing the data body “B” included in the header information a; a management center managing use of the content file on the distributing recording medium ? and which can deliver the prepared play information “A1” of the header information “A” as piece data via a communication line ?; and a digital content playing device which is a device used for playing the content file on the distributing recording medium ? and has a function of communicating via the communication line ? with the management center.Type: GrantFiled: January 30, 2004Date of Patent: November 12, 2013Assignee: Phu Sang Ltd., LLCInventors: Akiyoshi Okamoto, Masataka Ishida
-
Patent number: 8584218Abstract: One or more user service tickets are obtained (i.e. pre-fetched) from an authentication server and stored in a ticket cache. The user service tickets facilitate a login device communicating with one or more users or group members associated with the login device. Login credentials for the users or group members may be subsequently authenticated against the user service tickets within the ticket cache thereby eliminating the need for immediate access to the authentication server or a previous login session by the users or group members. The user service tickets within the ticket cache may be refreshed as needed. In one embodiment, the user service tickets are refreshed daily and also in response to login attempts if the authentication service is readily accessible.Type: GrantFiled: December 21, 2011Date of Patent: November 12, 2013Assignee: Quest Software, Inc.Inventors: Matthew T. Peterson, Jeff Marsden Webb
-
Patent number: 8578460Abstract: Technologies are generally described for automatically reconnecting a security principal to cloud services through correlation of security principal identifier attributes. A new security principal for a user may be detected and automatically reconnected to the user's cloud based services. An administrator for the security domains may specify a value of a unique security principal metadata attribute for the original security principal in a customizable security principal metadata attribute in the new security principal in the same or new security domain. A secondary verification metadata attribute may optionally be specified to ensure the correct security principal is reconnected to the user's cloud based resources. The correlation between the original security principal for the user and the new security principal may be used to reconnect the user's cloud resources.Type: GrantFiled: August 8, 2011Date of Patent: November 5, 2013Assignee: Microsoft CorporationInventors: John B. Cucco, Veniamin Rybalka, Ulric Dihle, Larry Draper, Kanika Agrawal, Tony Chan, Guruprakash Rao, Ashwin Chandra
-
Patent number: 8578471Abstract: According to one embodiment, an information processing apparatus includes an input to input a password, a biological authentication device including a storage unit for storing biological information and identification information, and an authentication controller. The authentication controller sets and holds identification information to be stored in the storage unit of the biological authentication device, and permits a password input using the input to be substituted by authentication using the biological authentication device when the identification information held by itself and the identification information stored in the storage unit of the biological authentication device match.Type: GrantFiled: October 5, 2011Date of Patent: November 5, 2013Assignee: Kabushiki Kaisha ToshibaInventor: Ken Hatano
-
Patent number: 8578159Abstract: A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication, authorization, and accounting (AAA)-based authentication), and a “light-weight” step that reuses key material generated during first contact. A mesh authenticator within the network provides two roles. The first role is to implement an 802.1X port access entity (PAE), derive transient keys used for encryption with a supplicant mesh point via a four-way handshake and take care of back end communications with a key distributor. The second role is as a key distributor that implements a AAA-client and derives keys used to authenticate a mesh point during first contact or fast security association. The key distributor and the on-line authentication server can communicate to one another without these messages being transported over mesh links.Type: GrantFiled: September 7, 2006Date of Patent: November 5, 2013Assignee: Motorola Solutions, Inc.Inventors: Stephen P. Emeott, Anthony J. Braskich
-
Patent number: 8572696Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing contextual data aided security protection. In one aspect, a method includes automatically parsing an electronic message associated with a user that includes location information, and extracting the location information from the electronic message. The location information can be added to a database (e.g., white list) associated with the user. The location information in the database can be used to authenticate the user's request for access to electronic mail.Type: GrantFiled: November 23, 2011Date of Patent: October 29, 2013Assignee: Google Inc.Inventor: Michael Wiacek
-
Patent number: 8572367Abstract: There are disclosed systems and methods for reducing the number of computations performed by a computing device constructing a public key from an implicit certificate associated with a certificate authority in an implicit certificate scheme. In one embodiment, the device first operates on the implicit certificate to derive an integer e. The device then derives a pair of integers (e1, e2) from the integer e, such that each of the pair of integers (e1, e2) has a bit length less than the bit length of the integer e, and such that the ratio of the pair of integers (e1, e2) corresponds to the integer e. The device then computes the public key by combining the integers e1 and e2 with public key contribution data derived from the implicit certificate and a public key of the certificate authority.Type: GrantFiled: February 28, 2011Date of Patent: October 29, 2013Assignee: Certicom Corp.Inventor: Marinus Struik
-
Patent number: 8572727Abstract: Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions.Type: GrantFiled: November 23, 2009Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: Paolina Centonze, Yinnon Avraham Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Omer Tripp
-
Patent number: 8566581Abstract: Securing inter-process communications includes receiving, from a device that supports a first process that is an instantiation of a first application being executed, a request to initiate inter-process communications. Securing inter-process communications also includes replying to the device with a request for information of a first digital certificate that uniquely authenticates an identity of the first process. An identity of a second process that is a distinct instantiation of the first application is authenticated using a second digital certificate distinct from the first digital certificate.Type: GrantFiled: December 8, 2010Date of Patent: October 22, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Brian M. Novack, Joe M. Jimerson, Denis L. Bagsby, Brian M. Thomas, Hari K. Simhadri
-
Patent number: 8560848Abstract: A system including a temporal key module, a nonce module, a security module, and an encryption module. The temporal key module generates a first temporal key used to encrypt a plurality of packets. The nonce module generates a nonce for each packet encrypted based on the first temporal key. Each nonce includes a packet number that is different than packet numbers associated with other nonces generated by the nonce module. The packet number is greater than N bits in length, where N is an integer greater than 40. The security module determines when the packet number included in the nonce generated by the nonce module is greater than or equal to a predetermined threshold. The encryption module encrypts more than 2(N?1) packets using the first temporal key and the nonces without reusing a value of the packet number.Type: GrantFiled: August 18, 2010Date of Patent: October 15, 2013Assignee: Marvell World Trade Ltd.Inventors: Yong Liu, Paul A. Lambert, Raja Banerjea
-
Patent number: 8561142Abstract: A plurality of computing devices used to access backend computing resources of an enterprise by a specific user are identified, and geo-locations of the devices at specific times are tracked. A trusted authentication is received from a specific one of the devices. Responsive to the trusted authentication, the specific device is classified as the primary node of a trusted cluster, and the current geo-location of the user is defined as the geo-location of the specific device, as of the time of the trusted authentication. Devices are assigned to a logical trusted device cluster or to a logical non-trusted device cluster, based on distances between the device geo-locations and the current geo-location of the user, and based on differences between establishment times of the device geo-locations and the establishment time of the user's geo-location.Type: GrantFiled: June 1, 2012Date of Patent: October 15, 2013Assignee: Symantec CorporationInventor: William E. Sobel
-
Patent number: 8555055Abstract: Role-based security architecture that facilitates delegated role assignments where role functionality is monotonically decreasing. In furtherance thereof decreasing monotonicity roles are arranged in a hierarchy. Moreover, delegated roles can be obtained by creating a derived role (from a parent role) and removing entries from the derived role to decrease the permissions for the derived role. Delegated role assignments are scoped (bounded), which automatically applies a given scope to the assignment created by the user receiving the delegation.Type: GrantFiled: June 2, 2009Date of Patent: October 8, 2013Assignee: Microsoft CorporationInventors: Vladimir V. Grebenik, Pretish Abraham
-
Patent number: 8555346Abstract: Generation of user and avatar specific content in a virtual world may include generating a local attribute object. The local attribute object may comprise attributes identifying at least one of the user's real world location and the user's avatar's virtual world location. Access to the local attribute object by virtual world operators may be controlled by the user and/or user's avatar. Specific content, based on the local attribute object, is presented to the user's avatar.Type: GrantFiled: August 19, 2008Date of Patent: October 8, 2013Assignee: International Business Machines CorporationInventors: Brian Ronald Bokor, Peter Frederick Haggar, Daniel Edward House, William Bruce Nicol, II, Andrew Bryan Smith
-
Patent number: 8555049Abstract: A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit.Type: GrantFiled: September 30, 2008Date of Patent: October 8, 2013Assignee: Panasonic CorporationInventors: Hisashi Takayama, Hideki Matsushima, Takayuki Ito, Tomoyuki Haga, Kenneth Alexander Nicolson
-
Patent number: 8549594Abstract: A method of identity authentication and fraudulent phone call verification uses an identification code of a communication device and a dynamic password. The “dynamic password” is directly sent to an Internet user via a dynamic web-page of a specific website instead of by means of a traditional telephone short message. Thus, the “dynamic password” cannot be copied from the spyware infected communication device of the Internet user. Furthermore, even if the “dynamic password” is intercepted or otherwise discovered by a hacker or intruder, authentication is still secure because the dynamic password must be sent back to the specific website via a short message or the like from the same communication device having the corresponding identification code that was initially input by the Internet user in order to generate the dynamic password.Type: GrantFiled: September 17, 2010Date of Patent: October 1, 2013Inventor: Chung-Yu Lin
-
Patent number: 8548170Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, a plurality of stored signatures are maintained in a signature database, each signature being associated with one of a plurality of registered documents. In one embodiment, the signature database is maintained by de-registering documents by removing the signatures associated with de-registered documents. In one embodiment, the database is maintained by removing redundant and high detection rate signatures. In one embodiment, the signature database is maintained by removing signatures based on the source text used to generate the signature.Type: GrantFiled: May 25, 2004Date of Patent: October 1, 2013Assignee: McAfee, Inc.Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
-
Patent number: 8549613Abstract: A system and method for enabling access to a computer server operating within a private network, in which the computer server is isolated by access restrictions that prevent incoming connections from a public network. In one embodiment, the method includes identifying a remote client operating in a public network outside the private network, initiating a secure communication channel with the remote client, and instructing the remote client to initiate a Point-to-Point Protocol (PPP) session with the computer server via the secure communication channel.Type: GrantFiled: May 28, 2008Date of Patent: October 1, 2013Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8549606Abstract: There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and an encrypting section that encrypts the security information, using a key acquired from a Digital Right Management system of an electronic ticket system.Type: GrantFiled: October 26, 2005Date of Patent: October 1, 2013Assignee: Fuji Xerox Co., Ltd.Inventor: Kazuo Saito
-
Patent number: 8544070Abstract: Techniques for non-repudiation of storage in cloud or shared storage environments are provided. A unique signature is generated within a cloud or shared storage environment for each file of the storage tenant that accesses the cloud or shared storage environment. Each signature is stored as part of the file system and every time a file is accessed that signature is verified. When a file is updated, the signature is updated as well to reflect the file update.Type: GrantFiled: May 16, 2011Date of Patent: September 24, 2013Assignee: Novell, Inc.Inventors: Prakash Umasankar Mukkara, Lloyd Leon Burch, Douglas Garry Earl
-
Patent number: 8539226Abstract: A method and system for Certificate management and transfer between messaging clients are disclosed. When communications are established between a first messaging client and a second messaging client, one or more Certificates stored on the first messaging client may be selected and transferred to the second messaging client. Messaging clients may thereby share Certificates. Certificate management functions such as Certificate deletions, Certificate updates and Certificate status checks may also be provided.Type: GrantFiled: September 1, 2011Date of Patent: September 17, 2013Assignee: BlackBerry LimitedInventors: Herbert Anthony Little, Neil Patrick Adams, David Francis Tapuska, Michael Stephen Brown, James Andrew Godfrey, Michael Grant Kirkup