Revocation Or Expiration Patents (Class 713/158)
  • Patent number: 7600129
    Abstract: Determining access includes determining if particular credentials/proofs indicate that access is allowed, determining if there is additional data associated with the credentials/proofs, wherein the additional data is separate from the credentials/proofs, and, if the particular credentials/proofs indicate that access is allowed and if there is additional data associated with the particular credentials/proofs, then deciding whether to deny access according to information provided by the additional data. The credentials/proofs may be in one part or in separate parts. There may be a first administration entity that generates the credentials and other administration entities that generate proofs. The first administration entity may also generate proofs or may not generate proofs. The credentials may correspond to a digital certificate that includes a final value that is a result of applying a one way function to a first one of the proofs.
    Type: Grant
    Filed: July 16, 2004
    Date of Patent: October 6, 2009
    Assignee: CoreStreet, Ltd.
    Inventors: Phil Libin, Silvio Micali, David Engberg, Alex Sinelnikov
  • Publication number: 20090249062
    Abstract: A method and apparatus for distributing Certificate Revocation List (CRL) information in an ad hoc network are provided. Ad hoc nodes in an ad hoc network can each transmit one or more certificate revocation list advertisement message(s) (CRLAM(s)). Each CRLAM includes an issuer certification authority (CA) field that identifies a certification authority (CA) that issued a particular certificate revocation list (CRL), a certificate revocation list (CRL) sequence number field that specifies a number that specifies the version of the particular certificate revocation list (CRL) that was issued by the issuer certification authority (CA). Nodes that receive the CRLAMs can then use the CRL information provided in the CRLAM to determine whether to retrieve the particular certificate revocation list (CRL).
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Applicant: MOTOROLA, INC.
    Inventors: Shanthi E. Thomas, Erwin Himawan, Ananth Ignaci, Anthony R. Metke
  • Publication number: 20090245520
    Abstract: An digital content protection method and device are disclosed. In the method, digital content to be delivered from a content provider to a consumer terminal is retrieved. The digital content is encoded to prevent unauthorized playback. The encoded digital content and a key for decoding the content are separately transmitted from the content provider to the consumer terminal, playback of the encoded digital content requires decoding with the key.
    Type: Application
    Filed: March 27, 2008
    Publication date: October 1, 2009
    Applicant: MEDIATEK INC.
    Inventors: Andrew C. Chang, Ing-Shry Kuo
  • Patent number: 7594274
    Abstract: By using a unique ID generated by considering the hardware characteristic of PC in PDA where an application program, etc. distributed based on PC is installed, it makes possible to generate and authenticate a virtual unique ID in PDA so as to authenticate drive of the application in PDA. As such, the file size of a distributed edition is small in its characteristic and it is difficult to have a protecting means such as security, etc. in view of the characteristic of device. Hence, illegal distribution is easy and a more certain solution is provided so as to prevent illegal copy of the application in PDA having a feasible characteristic in protecting copyright.
    Type: Grant
    Filed: February 25, 2003
    Date of Patent: September 22, 2009
    Assignee: Markany, Inc.
    Inventors: Jong-Won Kim, Jong-Uk Choi, Byung-Keun Jeon
  • Publication number: 20090235071
    Abstract: A system and method for assigning certificates and reducing the size of the certificate revocation lists in a PKI based architecture for a vehicle wireless communications system that includes separating a country, or other area, into geographic regions and assigning region-specific certificates to the vehicles. Therefore, a vehicle need only process certificates and certificate revocation lists for the particular region that it is traveling in. Vehicles can be assigned multiple certificates corresponding to more than one region in the vehicles vicinity as advance preparation for possible travel or transmission into nearby regions. Further, the expiration time of certificates assigned to vehicles corresponding to a given geographic region can be tailored to be inversely proportional to the distance from a registered home region of the vehicle. A scalable design for a back-end certifying authority with region-based certificates can also be provided.
    Type: Application
    Filed: March 13, 2008
    Publication date: September 17, 2009
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS, INC.
    Inventors: Bhargav Ramchandra Bellur, Anitha Varghese, Rajeev Shorey, Srinivasan Rajavelu, Aditya R. Karnik
  • Patent number: 7590841
    Abstract: The present automatic update mechanism provides a method for periodically checking for updates to support a trusted environment. During the periodic check, an indication from an update service is received if there is a recommended update. Upon receiving the indication, a new revocation list is downloaded from the update service and saved as a pending revocation list. The pending revocation list is then available for on-demand update when protected content requests a higher level of protection on a computing device than the protection provided by a current level of protection on the computing device.
    Type: Grant
    Filed: July 19, 2005
    Date of Patent: September 15, 2009
    Assignee: Microsoft Corporation
    Inventors: Adil A. Sherwani, Pranavakumar Punniamoorthy, Rajesh A Deshpande, Avni H. Rambhia, Reid J. Kuhn, Clifford P. Van Dyke
  • Publication number: 20090228705
    Abstract: Provided is a method and apparatus for managing authentication information in a home network, the method includes the operation of receiving Product Identification Number (PIN) information that is externally input and is an identifier allocated to a control device or a controlled device at the time of manufacture; and transmitting authentication information to the control device or the controlled device via a Secure Authenticated Channel (SAC) generated by using a Transport Layer Security Pre-Shared Key ciphersuites (TLS-PSK) protocol implemented by using the PIN information, wherein the authentication information is necessary for a user to control the controlled device via the control device.
    Type: Application
    Filed: December 19, 2008
    Publication date: September 10, 2009
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Seong-ho Cho, Hyoung-shick Kim
  • Publication number: 20090210705
    Abstract: Direct Anonymous Attestation involves a Signer using a credential supplied by an Issuer to anonymously prove to a Verifier, on the basis of a public key of the Issuer, the Issuer's attestation to the Signer's membership of a particular group. To facilitate membership revocation, the Issuer updates the public key at intervals, and also effects a complementary updating to the Signer's credential unless the Signer has ceased to be a legitimate group member. A non-updated credential is inadequate to enable the Signer to prove its Issuer attested group membership to a Verifier on the basis of the updated Issuer public key.
    Type: Application
    Filed: February 19, 2009
    Publication date: August 20, 2009
    Inventor: Liqun Chen
  • Publication number: 20090210704
    Abstract: A system in which a source device can withdraw a Rights Object (RO) that a source device requested a target device to move through a Rights Issuer (RI) and operation method thereof are provided. The method includes transmitting a rights object withdrawal request message to a rights issuing server by a device, transmitting a rights object withdrawal response message to the device by the rights issuing server in response to the rights object withdrawal request message, and withdrawing and installing a corresponding rights object when receiving the rights object withdrawal response message by the device.
    Type: Application
    Filed: February 17, 2009
    Publication date: August 20, 2009
    Applicant: SAMSUNG ELECTRONICS CO. LTD.
    Inventors: Kyu Hui HAN, Kyung Keun LEE, Byung Rae LEE
  • Patent number: 7574607
    Abstract: Methods and apparatus for secure transmission of data in pipeline fashion. A pair of transaction certificates can be used to verify the authenticity and integrity of data transmitted in more than one block.
    Type: Grant
    Filed: October 29, 2002
    Date of Patent: August 11, 2009
    Assignee: Zix Corporation
    Inventors: Gary G. Liu, David P. Cook
  • Patent number: 7571315
    Abstract: A method includes determining whether a key is traceable to one of a set of keys associated with a trusted source and determining whether the key is identified in a list of compromised keys. If the key is not identified as compromised and is traceable to one of the keys in the set, the key is assigned a trusted status.
    Type: Grant
    Filed: September 16, 1999
    Date of Patent: August 4, 2009
    Assignee: Intel Corporation
    Inventor: Ned M. Smith
  • Patent number: 7565528
    Abstract: A method in which a user first receives from a Trust Center a generated, personalized, and certified key pair as well as components for producing encryption pairs. The user at any time himself produces an encryption key pair, marks the public part of this pair using the secret signature key relinquished to him, and transmits the result to the Trust Center, where the result is assigned to the user using the certified public part of the signature key pair.
    Type: Grant
    Filed: December 9, 1998
    Date of Patent: July 21, 2009
    Assignee: Deutsche Telekom AG
    Inventors: Paul Mertes, Werner Mettken
  • Publication number: 20090177881
    Abstract: A system for proactive forced renewal of content protection implementations in devices includes a key generation facility to generate and allocate keys for the devices, and to generate revocation data corresponding to revoked keys in response to at least one of a security compromise and on a periodic basis independent of a security compromise; and a device manufacturer to receive the keys from the key generation facility, to embed the keys in content protection implementations for the devices, to distribute the devices, and to renew the content protection implementations in devices after the devices are distributed, in response to at least one of a security compromise and on a periodic basis independent of a security compromise.
    Type: Application
    Filed: May 14, 2008
    Publication date: July 9, 2009
    Inventors: C. Brendan S. Traw, Michael S. Ripley
  • Patent number: 7558952
    Abstract: A validation authority for certificates searches for and verifies paths and certificate revocation lists periodically, and classifies the paths into valid paths and invalid paths in accordance with the results of the validations, so as to register the paths in databases beforehand. Besides, in a case where a request for authenticating the validity of a certificate has been received from an end entity, the validation authority judges the validity of the public key certificate by checking in which of the valid-path database and the invalid-path database a path corresponding to the request is registered. On the other hand, in a case where the path corresponding to the validity authentication request is not registered in either of the databases, the validity of the public key certificate is authenticated by performing path search and validation anew.
    Type: Grant
    Filed: March 1, 2004
    Date of Patent: July 7, 2009
    Assignee: Hitachi, Ltd.
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Hitoshi Shimonosono
  • Publication number: 20090164776
    Abstract: In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: maintaining information identifying a plurality of devices with which interaction has occurred; transmitting the information identifying the plurality of devices to a remote trusted party; receiving from the trusted party status information pertaining to a trustworthiness of the identified devices based on the transmitted information; and controlling subsequent interaction relating to transfer or exchange of access rights for electronic content with one or more devices based on the received status information corresponding to the one or more devices.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Applicant: NOKIA CORPORATION
    Inventor: Samuli Tuoriniemi
  • Patent number: 7552321
    Abstract: One embodiment of the present invention is a hybrid authentication system (10) for securing communication. In this embodiment, the system (10) includes a distributed authentication infrastructure (12) with a series of nodes (16) in communication with each other. These nodes (16) are intended to perform a series of functions, one of these functions being the authentication of other nodes. The system further includes a centralized authentication infrastructure (14), which is later integrated into the distributed authentication infrastructure (12) after the distributed authentication infrastructure (12) has been established. The centralized authentication infrastructure (14) includes a central server (22) coupled to the nodes (16) for verifying the identification of the nodes (16) and/or granting permission to those nodes (16).
    Type: Grant
    Filed: November 20, 2003
    Date of Patent: June 23, 2009
    Assignee: The Boeing Company
    Inventors: Troy Rockwood, Bong Kyu Ryu
  • Publication number: 20090150666
    Abstract: There are provided an information processing apparatus and a license distribution system including the information processing apparatus in which the reproduction or duplication of a content can be limited to the interior of a domain and a benefit based on the fact that an external device has participated in the domain can be made available at the time of reissuing a license. A reproducing device 1 transmits a request for reissuing the license for permitting the reproduction of the content in the domain, and participation information (S201). A server 2 receives the request for reissuing the license and the participation information (S202), and confirms validity of the transmitted participation information (S203). When the validity of the participation information is confirmed, the server 2 determines information on a specific privilege related to the license, transmits the information to the external device (S206), and reissues the license (S210).
    Type: Application
    Filed: December 4, 2008
    Publication date: June 11, 2009
    Applicant: FUJITSU LIMITED
    Inventors: Hironori SAKAKIHARA, Fumio Honda, Shuichi Matsumura
  • Patent number: 7546453
    Abstract: A method and system for Certificate management and transfer between messaging clients are disclosed. When communications are established between a first messaging client and a second messaging client, one or more Certificates stored on the first messaging client may be selected and transferred to the second messaging client. Messaging clients may thereby share Certificates. Certificate management functions such as Certificate deletions, Certificate updates and Certificate status checks may also be provided.
    Type: Grant
    Filed: June 12, 2002
    Date of Patent: June 9, 2009
    Assignee: Research In Motion Limited
    Inventors: Herbert A. Little, Neil P. Adams, David F. Tapuska, Michael S. Brown, Michael G. Kirkup, James A. Godfrey
  • Patent number: 7543141
    Abstract: A method and apparatus for user authentication using infrared communication of a mobile terminal is disclosed. The user authentication system, which is for identifying a user who requests service from an automated machine, comprises a mobile terminal for transmitting electronic signature data for the user in the form of an infrared signal, automated information providing means for providing the requested service after verifying the validity of the electronic signature data, and certificate providing means for registering an authorization certificate in response to a request from the mobile terminal and transmitting the certificate to the automated information providing means for verifying the user authentication.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: June 2, 2009
    Assignee: SK Telecom Co., Ltd.
    Inventors: Jae Sic Jeon, Eun Su Jung
  • Patent number: 7543140
    Abstract: A digital certificate identifies an entity as having authority over the certificate to revoke same as delegated by the issuer. The certificate also has at least one revocation condition relating to possible revocation of the certificate. To authenticate the certificate, the identification of the delegated revocation authority, a location from which a revocation list is to be obtained, and any freshness requirement to be applied to the revocation list are determined from the certificate. It is then ensured that the revocation list from the location is present and that the present revocation list satisfies the freshness requirement, that the revocation list is promulgated by the delegated revocation authority identified in the certificate, and that the certificate is not identified in the revocation list as being revoked.
    Type: Grant
    Filed: February 26, 2003
    Date of Patent: June 2, 2009
    Assignee: Microsoft Corporation
    Inventors: Blair Brewster Dillaway, Philip Lafornara, Brian A. LaMacchia, Rushmi U. Malaviarachchi, John L. Manferdelli, Charles F. Rose, III
  • Patent number: 7542568
    Abstract: An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device including: a CRL memory unit memorizing a CRL, a device key ring memory unit memorizing a specific device key KD_A in every IC card used in a decrypting device, a content key memory unit memorizing a content key Kc, which is a secret key for decrypting content, and a hashing function processing unit calculating a hashing value of the CRL memorized in the CRL memory unit. The devices further including an Ex-OR unit carrying out an exclusive OR between the hashing value and the device key KD_A memorized in the device key ring memory unit, and an Enc unit encrypting the content key Kc memorized in the content key memory unit using an output value of an Ex-OR unit.
    Type: Grant
    Filed: September 11, 2002
    Date of Patent: June 2, 2009
    Assignee: Panasonic Corporation
    Inventors: Motoji Ohmori, Makoto Tatebayashi, Takahiro Nagai, Hideshi Ishihara
  • Publication number: 20090138704
    Abstract: A first entity (1) includes a secret encryption key (g1, ?) of an encryption diagram which can accept a plurality of encryption keys. A plurality of decoders have respective encryption keys, each incorporating a respective key index. The method comprises an encryption operation, wherein a value is taken as a variable element (s) and a ciphertext (C?) is calculated from the data to be transmitted (K) and at least from the value taken as the variable element and the secret encryption key. An operation for revoking a decryption key is integrated into an encryption operation performed with a value of the variable element (s) based on the index key (x?) of one of the decryption keys, which will be used during an operation for tracking illegitimate decoders.
    Type: Application
    Filed: May 4, 2007
    Publication date: May 28, 2009
    Inventor: Cecile Delerablee
  • Patent number: 7539310
    Abstract: A version number is associated with an encrypted key executable to allow real time updating of keys for a system which facilitates users signing on to multiple websites on different domains using an encrypted ticket. Two keys may be used at each site during updating of keys, each having an associated one digit Hex version tag. When a key is to be updated with a new key, the existing or old key is provided an expiration time. A second key is provided from the system in a secure manner with a new version number and made the current key which provides decryption of the encrypted ticket. The system tracks both keys while they are concurrent. After the existing key expires, only the second, or updated key is used to provide login services for users. The system periodically flushes old keys.
    Type: Grant
    Filed: May 24, 2005
    Date of Patent: May 26, 2009
    Assignee: Microsoft Corporation
    Inventors: Christopher E. Mitchell, Jeff C. Kunins, Max E. Metral
  • Publication number: 20090132813
    Abstract: Apparatus and methods perform transactions in a secure environment between an individual and another party, such as a merchant, in various embodiments. The individual possesses a mobile electronic device, such as a smartphone, that can encrypt data according to a public key infrastructure. The individual authenticates the individual's identity to the device, thereby unlocking credentials that may be used in a secure transaction. The individual causes the device to communicate the credentials, in a secure fashion, to an electronic system of a relying party, in order to obtain the relying party's authorization to enter the transaction. The relying party system determines whether to grant the authorization, and communicates the grant and the outcome of the transaction to the device using encryption according to the public key infrastructure.
    Type: Application
    Filed: November 7, 2008
    Publication date: May 21, 2009
    Applicant: SURIDX, INC.
    Inventor: Norman Schibuk
  • Patent number: 7536544
    Abstract: A unique TIO based trust information delivery scheme is disclosed that allows clients to verify received certificates and to control Java and Javascript access efficiently. This scheme fits into the certificate verification process in SSL to provide a secure connection between a client and a Web server. In particular, the scheme is well suited for incorporation into consumer devices that have a limited footprint, such as set-top boxes, cell phones, and handheld computers. Furthermore, the TIO update scheme disclosed herein allows clients to update certificates securely and dynamically.
    Type: Grant
    Filed: January 25, 2002
    Date of Patent: May 19, 2009
    Assignee: TVWorks, LLP
    Inventor: Sihai Xiao
  • Patent number: 7533257
    Abstract: A server certificate verification method in a terminal during. Extensible Authentication Protocol authentication for Internet access is provided, the method including (a) receiving a server certificate from a wireless LAN authentication server, and transmitting a server certificate verification request message of the server certificate to a wireless LAN authentication server via a wireless LAN access server; (b) transmitting by the wireless LAN authentication server an On-line Certificate Status Protocol request message to an On-line Certificate Status Protocol server to verify the server certificate; (c) receiving a result of the server certificate verification performed by the OCSP server using an Extensible Authentication Protocol packet from the wireless LAN authentication server; and (d) determining whether the result of the server certificate verification is valid.
    Type: Grant
    Filed: August 24, 2004
    Date of Patent: May 12, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sok Joon Lee, Byung Ho Chung, Kyo Il Chung
  • Patent number: 7529926
    Abstract: A host communicates with a gateway, a DHCP server or a PPP peer of ISP to determine an IPv6 address, also receives a public key certificate from the gateway, the DHCP server or the PPP peer of ISP, and sends a public key certificate including an IPv6 address to a communication counterpart. The host receives a new public key certificate from the gateway, the DHCP server or the PPP peer of ISP when necessary.
    Type: Grant
    Filed: April 16, 2003
    Date of Patent: May 5, 2009
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kazuomi Oishi
  • Patent number: 7529928
    Abstract: A method of managing certificates in a communication system having a certifying authority and a directory. Preferably, the method begins by having the certifying authority generate certificates by digitally signing a given piece of data. At a later point time, the certifying authority may produce a string that proves whether a particular certificate is currently valid without also proving the validity of at least some other certificates. The technique obviates use of certification revocation lists communicated between the certifying authority and the directory.
    Type: Grant
    Filed: May 13, 2004
    Date of Patent: May 5, 2009
    Assignee: Corestreet, Ltd.
    Inventor: Silvio Micali
  • Publication number: 20090110200
    Abstract: Systems and methods for providing Kerberos pre-authentication are presented. According to a method embodiment, a request for authentication is received from a principal of an authentication service. The principal in the authentication service is authenticated. A key associated with the authenticated principal in the authentication service is provided to a Kerberos Key Distribution Center (KDC).
    Type: Application
    Filed: January 18, 2008
    Publication date: April 30, 2009
    Inventor: Rahul Srinivas
  • Publication number: 20090113206
    Abstract: A method for enforcing use of certificate revocation lists in validating certificates, the lists being associated with a series of list generation indices such that each list is assigned one index which advances according to a time of generation of the list, the lists and the indices being cryptographically signed, the method including receiving one of the lists and an associated index as an identifier of the one list, checking the certificates against the list, associating each of the certificates, which have been checked against the list, with the index, receiving an enforcement generation index (EGI) associated with a latest list in use, storing the EGI as a last known EGI, and refusing performance of an action associated with a certificate if the one index of the one certificate is earlier in the series than the last known EGI. Related apparatus and methods are also included.
    Type: Application
    Filed: October 3, 2006
    Publication date: April 30, 2009
    Applicant: NDS Limited
    Inventors: Chaim Shen-Orr, Yaacov (Jordan) Levy, Yaacov Belenky
  • Patent number: 7526644
    Abstract: Methods and apparatuses for providing cryptographic assurance based on ranges as to whether a particular data item is on a list. According to one computer-implemented method, the items on the list are sorted and ranges are derived from adjacent pairs of data items on the list. Next, cryptographically manipulated data is generated from the plurality of ranges. At least parts of the cryptographically manipulated data is transmitted onto a network for use in cryptographically demonstrating whether any given data item is on the list. According to another computer-implemented method, a request message is received requesting whether a given data item is on a list of data items. In response, a range is selected that is derived from the pair of data items on the list that define the smallest range that includes the given data item. A response message is transmitted that cryptographically demonstrates whether the first data item is on the list using cryptographically manipulated data derived from the range.
    Type: Grant
    Filed: March 1, 2005
    Date of Patent: April 28, 2009
    Assignee: Axway Inc.
    Inventor: Paul Carl Kocher
  • Publication number: 20090106551
    Abstract: A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by encrypting the session key with unique distributed private keys that are associated with the respective source and destination computers by unique private key identifiers The destination computer then decrypts the encrypted session key using it's distributed private key and then decrypts the communication using the decrypted session key.
    Type: Application
    Filed: April 25, 2007
    Publication date: April 23, 2009
    Inventors: Stephen Laurence Boren, Andre Jacques Brisson
  • Patent number: 7523304
    Abstract: In a broadcast encryption scheme, an optimal or near-optimal set covering CV(f,P) is computed for a set P of privileged users and at most a predefined number f of revoked users (“free riders”). The covering consists of elements of a predefined set cover CC(U) for the set of all users U. The covering is computed by finding optimal or near-optimal coverings for privileged users for CC(U) elements that are proper subsets of U. More particularly, possible assignments of free riders to the subsets are examined, and an assignment is selected to fit an optimality criterion for the total set covering. In some embodiments, only “meeting point” elements of CC(U) are fully examined. A meeting point is an element containing at least two “immediate child” elements each of which contains a revoked user. An immediate child of a “parent” element is a proper subset of the parent with no intermediate elements (no elements containing the child as a proper subset and itself being a proper subset of the parent).
    Type: Grant
    Filed: November 17, 2006
    Date of Patent: April 21, 2009
    Assignee: NTT DoCoMo, Inc.
    Inventors: Craig B. Gentry, Zulfikar Amin Ramzan, David P. Woodruff
  • Patent number: 7516482
    Abstract: A method and data structure are provided that enables name resolution via a hierarchical or chained lookup of delegated authorities independent of requiring IP addresses of the delegated authorities. In an embodiment, the method provides for lookups by first generating cryptographic keys associated with a namespace. An authority is created using one of the cryptographic keys. Next, the method provides for enabling namespaces to refer to the authority via requesting authorities associated with the namespaces to issue a peer-to-peer type resolution so that names of the namespaces resolve to the authority. For other desired namespaces, the method provides for issuing a resolution that names the authority and names associated with the other namespaces to resolve to the other authorities. For services, the authority and a service name are published to receive and end result such as arbitrary data, an IP address, a protocol name or a port.
    Type: Grant
    Filed: July 21, 2003
    Date of Patent: April 7, 2009
    Assignee: Microsoft Corporation
    Inventor: Graham A. Wheeler
  • Patent number: 7512974
    Abstract: System and computer program product for updating an SSL certificate for a server. First program instructions detect when a change has been made to a name, domain or IP address of the server and detect that the server is using an SSL certificate based on a name, domain or IP address applicable before the change. In response, the first program instructions notify an administrator that a change is required to the SSL certificate to reflect the change to the name, domain or IP address. Second program instructions respond to a request by the administrator, to automatically create a new SSL certificate signing request. The new SSL certificate signing request is a form which can be sent to an SSL certificate authority. Third program instructions respond to another request by the administrator, to send the new SSL certificate signing request to the SSL certificate authority.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Patrick Joseph Callaghan, James Patrick Hennessy, Stephen Richard Nichols, Kurt Norman Schroeder
  • Patent number: 7512240
    Abstract: Security keys for the provision of a secure service such as content provision are generated in an ancestral hierarchy, so that invalidation of a key in the hierarchy results in a need to reconfigure all other keys in the hierarchy to the extent they share common ancestry. When a user subscription to the service lapses, a decision on invalidation of their key is based in a determination of whether it's more costly to the subscriber to invalidate the key, or continue providing an unpaid-for service. Keys can be allocated to users from domains of the hierarchy on the basis of their economic value to the provider, with higher value users being allocated keys from domains which share fewer common ancestors with other users of other domains than those users share with each other, to minimise inconvenience to high value users of key reconfiguration.
    Type: Grant
    Filed: October 29, 2003
    Date of Patent: March 31, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Antonio Lain, Richard Taylor, Christopher Tofts
  • Patent number: 7512814
    Abstract: A system and method for securely storing electronic documents is provided. The system includes a client portion and a server portion and the client portion is located at a trusted location. The client portion encrypts each electronic document and produces a list of terms of interest relating to the document, which terms are also encrypted. The encrypted document and the encrypted terms are transferred to a server portion which need not be located at a trusted location. The document is stored at the server portion in a manner which allows for locating the document again via the encrypted terms and returning the encrypted document to the trusted client portion, where it can be decrypted. Attachments to documents can also be encrypted and stored at the server, as can copies of dynamic documents, such as web pages. The server portion can also have a retention manager and encryptor which is used to implement document retention and destruction policies defined by the user of the system.
    Type: Grant
    Filed: November 9, 2004
    Date of Patent: March 31, 2009
    Assignee: Fortiva Inc.
    Inventors: Paul Chen, Christopher Tebo
  • Patent number: 7512785
    Abstract: A server registering a first party as a party relying upon a second party's certificate, revoking the second party's certificate after registering the first party, and initiating communication with the first party to indicate that the second party's certificate has been revoked.
    Type: Grant
    Filed: July 18, 2003
    Date of Patent: March 31, 2009
    Assignee: Intel Corporation
    Inventor: Ernie F. Brickell
  • Patent number: 7502842
    Abstract: Methods and systems for auto-configuration of an internal network interface are disclosed. Embodiments may install an internal VLAN manager in a logically partitioned computer system along with network agents in each of the partitions in the logically partitioned system to facilitate configuring an internal communications network and the corresponding internal network interfaces in each participating partition. In particular, an administrator accesses internal VLAN manager, selects an internal VLAN ID, selects each of the participating partitions, and configures the communications network with global parameters and ranges. The internal VLAN manager then generates partition parameters and incorporates them into messages for each of the partitions selected to participate in the internal network.
    Type: Grant
    Filed: September 25, 2003
    Date of Patent: March 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Charles S. Graham, Harvey G. Kiel, Chetan Mehta, Lee A. Sendelbach, Jaya Srikrishnan
  • Publication number: 20090063854
    Abstract: A method and apparatus for revoking a digital signature using a signature revocation list. In one embodiment, the method includes generating the signature revocation list to indicate revocation status of a signature. The signature is created from an encryption key and a document. The method also includes computing an identifier of the signature in the signature revocation list based on contents of the signature. The method further includes publishing the signature revocation list for access by users of the document.
    Type: Application
    Filed: August 30, 2007
    Publication date: March 5, 2009
    Inventor: Steven W. Parkinson
  • Publication number: 20090063855
    Abstract: A method and apparatus for propagating certificate revocation information. A first query is received regarding a revocation status of a first digital certificate. One or more additional queries are received regarding revocation statuses of one or more additional digital certificates. A response to the first query and the one or more additional queries is generated, the response including the revocation status of the first digital certificate and the revocation statuses of the one or more additional digital certificates.
    Type: Application
    Filed: August 30, 2007
    Publication date: March 5, 2009
    Inventor: Steven W. Parkinson
  • Patent number: 7500100
    Abstract: A method and apparatus for verifying revocation status of a digital certificate is provided. The invention operates in part by a receiver verifying a security certificate for a sender. In various embodiments the steps to accomplish this include receiving a first security certificate associated with the sender and storing the security certificate in a location accessible to the receiver; updating the first security certificate in the location accessible to the receiver if the first security certificate is changed or revoked; receiving a second security certificate from the sender when identity of the sender needs to be verified; comparing the second security certificate to the first security certificate; and confirming the sender's identity only if the second security certificate matches the first security certificate for the sender.
    Type: Grant
    Filed: September 10, 2003
    Date of Patent: March 3, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Alexey Kobozev, Arthur Zavalkovsky, Ilan Frenkel
  • Publication number: 20090037729
    Abstract: A user access control system comprising a workstation coupled to a computer network and operable to receive a request for an authenticated access to the computer network, and to prompt for and receive one or more credentials associated with the request, a gating authentication server coupled to the computer network and operable to receive the one or more credentials and to provide as a gating factor an authenticated credential, and a public key infrastructure server coupled to the computer network and operable to generate private/public key pairs associated with the authenticated credential, wherein the private/public key pairs are either generated after a request for access to the computer system has been received at the workstation and the gating authentication server has authenticated the one or more credentials provided through the workstation, or the private/public key pairs are retrieved from a previously generated virtual smart card based on the authentication credential.
    Type: Application
    Filed: August 3, 2007
    Publication date: February 5, 2009
    Inventors: Lawrence Smith, Ian MacDonald, Alex Zeltser
  • Publication number: 20090031127
    Abstract: A digital certificate is provided to a customer having an electronic account linked to the customer's physical address. Using the digital certificate, the customer performs electronic transactions with a third party. A proofing workstation receives a request from a third party to validate the digital certificate. The proofing workstation communicates with a proofing server that maintains a list of valid certificates and a list of revoked certificates. The proofing server sends a response to the proofing workstation, where it is received by the third party.
    Type: Application
    Filed: July 18, 2008
    Publication date: January 29, 2009
    Inventors: Leo J. Campbell, Jon L. Cook
  • Patent number: 7484090
    Abstract: An encryption apparatus 100a including: a CRL storage unit 111 storing a CRL; a device key ring storage unit 112 storing a device key KD_A specific to each copyright protection module 210a used by a decryption apparatus 200a; a content key storage unit 113 storing a content key Kc that is a secret key for encrypting a content; a hashing function processing unit 114 calculating a hash value of the CRL stored in the CRL storage unit 111 according to a hashing function; and an Ex-OR unit 115 obtaining an exclusive OR value between the hash value and the device key KD_A. The encryption apparatus also includes an Enc unit 116 encrypting the content key Kc using an output value from the Ex-OR unit, and storing the hash value, the encrypted content key and the encrypted content in a DVD2a.
    Type: Grant
    Filed: October 6, 2004
    Date of Patent: January 27, 2009
    Assignee: Panasonic Corporation
    Inventors: Motoji Ohmori, Makoto Tatebayashi, Hideshi Ishihara, Toshihisa Nakano
  • Patent number: 7484089
    Abstract: A method and system for combining multiple access points and utilizing certificates as an access method to a system from multiple access points enables use of a certificate that is stored within a smart card to access a host system through a browser, such that when the user accesses the application on the server, the application requires that the card and certificate be present for authentication of the individual user, and concurrently allows an external system to access applications on a host server using a certificate stored on the external system for authenticating itself to the host server. A certificate for certificate-based authentication is created and distributed to a choice of storage methods, such as a microcomputer of an integrated chip card, a computer disk of a computing device disposed in a secure environment, or a Hardware Security Module (HSM) associated with the computing device.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: January 27, 2009
    Assignee: Citicorp Developmemt Center, Inc.
    Inventors: Mark Kogen, Herve Garcia, Fred Pinn, Elton Lin, Warren Tan
  • Patent number: 7480939
    Abstract: A method and system for using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed is described. In one embodiment, the primary authentication protocol comprises a strong, secure, computationally complex authentication protocol. Moreover, the secondary authentication protocol comprises a less complex (compared to the primary authentication protocol) and less secure (compared to the primary authentication protocol) authentication protocol which can be performed in a length of time that is shorter than a length of time required to perform the primary authentication protocol. In an embodiment, the key lease includes context information.
    Type: Grant
    Filed: July 6, 2001
    Date of Patent: January 20, 2009
    Assignee: 3Com Corporation
    Inventors: Danny M. Nessett, Albert Young
  • Publication number: 20090019280
    Abstract: A method of validating a digital certificate comprises retrieving from a first data store a digital certificate, retrieving from a second data store a plurality of certificate revocation lists (CRLs), and selecting one of the plurality of CRLs to validate the digital certificate as of a date which is before the current date.
    Type: Application
    Filed: July 13, 2007
    Publication date: January 15, 2009
    Inventors: Andrew R. Blaikie, Gene R. Franklin, Peter J. Hendsbee, Jane A.S. Hunter, Jeewhoon Park
  • Publication number: 20090013177
    Abstract: A license-management system and method is provided. A method of issuing a proxy certificate includes transmitting a proxy-certificate-issuance-request message to a license server in order for the local license manager to acquire an authority to issue a license by a local license manager; enabling the license server to verify the proxy-certificate-issuance-request message; if the proxy-certificate-issuance-request message is valid, transmitting a proxy certificate to the local license manager by the license server, the proxy certificate including information regarding the authority to issue a license; and verifying the proxy certificate by the local license manager.
    Type: Application
    Filed: July 2, 2008
    Publication date: January 8, 2009
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Jae-Won Lee`, Hee-Youl Kim, Hyun-Soo Yoon, Byung-Chun Chung, Youn-Ho Lee
  • Publication number: 20080320301
    Abstract: A method of restricting operation of a device is provided. Based on a revocation list, which is a list regarding revoked devices, the method determines whether the device is the revoked device, based on the determination, decides whether to operate a Digital Rights Management (DRM) module of the device, and based on the decision, selectively restricts the operation of the device.
    Type: Application
    Filed: May 19, 2008
    Publication date: December 25, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Jun-bum SHIN, Yang-Iim CHOI