By Generation Of Certificate Patents (Class 713/175)
-
Patent number: 8646039Abstract: An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a non-empty set of candidates at authentication time based on one or more of the following dynamic properties: the current geo-location of the user to be authenticated; the current geo-locations of the candidates; the current time; the contents of one or more directories (e.g., a telephone directory, an organizational chart or directory, etc.), the contents of one or more call logs; and the candidates' schedules.Type: GrantFiled: August 1, 2007Date of Patent: February 4, 2014Assignee: Avaya Inc.Inventors: Jon Louis Bentley, Anjur Sundaresan Krishnakumar, David Mandel Weiss
-
Patent number: 8645717Abstract: A mechanism for creating secure storage for firmware for a computing device. A designated secure storage area holding firmware that is executable prior to a loading of an operating system for the computing device is created during a build of a ROM image. The creating marks one or more files as requiring encrypted storage and the one or marked files are combined during the build into the designated secure storage area. The designated secure storage area is located outside the ROM image and includes, during the build of the ROM image, a reference to the designated secure storage area in a build of firmware placed in the ROM image. The reference includes a flag indicating a current encrypted status of the designated secure storage area.Type: GrantFiled: April 18, 2012Date of Patent: February 4, 2014Assignee: Insyde Software Corp.Inventor: Rex A. Flynn
-
Patent number: 8645699Abstract: A mobile communications device having a digital certificate authenticating the device itself is proposed. A server for authenticating the device and a method of authenticating the device are also disclosed. The device comprises a transmitter, a processor, a memory and a computer readable medium. The memory includes a certificate certifying the authenticity of the mobile communications device, the certificate comprising device-specific data and a digital signature signed by an authority having control of the authenticity of the mobile communications device. The computer readable medium has computer readable instructions stored thereon that when executed configure the processor to instruct the transmitter to transmit a copy of the certificate to a service provider in response to a request to authenticate the mobile communications device with the service provider.Type: GrantFiled: March 15, 2010Date of Patent: February 4, 2014Assignee: BlackBerry LimitedInventors: Robert Henderson Wood, Roger Paul Bowman, Christopher Lyle Bender, Ian Michael Robertson, Casey Jonathan Vandeputte
-
Patent number: 8646106Abstract: An optical article for playback in a player includes a first file comprising a first control logic; and a second file comprising a second control logic. The first file is configured to direct the player to play a first content data stored on the optical article, when the first control logic is read by the player. The player is directed to read the second file if the player cannot read the first file. The second file is configured to direct the player to play a second content data stored on the article when the second control logic is read by the player. The optical article includes a mark containing an optical state change material disposed on at least a portion of the first file, wherein the mark is in one of a first optical state or a second optical state, and wherein the first control logic can be read only when the mark is in the second optical state.Type: GrantFiled: September 28, 2007Date of Patent: February 4, 2014Assignee: NBCUniversal Media, LLCInventors: James Mitchell White, Marc Brian Wisnudel, Kasiraman Krishnan, Mark Rogers Johnson
-
Patent number: 8645696Abstract: An apparatus and a method for authenticating a secure communication is described. A server receives a request from a client for an original SSL certificate. The server embeds a message in a common name (CN) of a new SSL certificate directing the client to another server. The client is transparently reconfigured and establishes a secure communication with the other server using the new SSL certificate.Type: GrantFiled: November 26, 2008Date of Patent: February 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8639940Abstract: An embodiment relates generally to a method of assigning roles to a token. The method includes determining a first role for a first participant on a token and providing exclusive access to a first section of the token for the first participant base on the first role. The method also includes determining a second role for a second participant on the token and providing exclusive access to a second section of the token for the second participant based on the second role.Type: GrantFiled: February 28, 2007Date of Patent: January 28, 2014Assignee: Red Hat, Inc.Inventors: Robert Lord, Steven W. Parkinson, Robert Relyea
-
Patent number: 8639939Abstract: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by using the private key to sign data provided to it or signals derived from the data. An identity object may be stored in a non-volatile memory as proof of identity, where the memory is controlled by a controller. Preferably, a housing encloses the memory and the controller.Type: GrantFiled: November 6, 2006Date of Patent: January 28, 2014Assignee: SanDisk Technologies Inc.Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
-
Publication number: 20140019760Abstract: The invention proposes a method for personalizing a first secure element comprised in a first terminal, said method consisting in: Providing the user of the first terminal with a second secure element; Linking the first and second secure elements in or through the first terminal; Personalizing securely the first secure element with data comprised in the second secure element, security being based on certificate verification and asymmetric encryption between the secure elements.Type: ApplicationFiled: December 2, 2011Publication date: January 16, 2014Applicant: GEMALTO SAInventors: Fabrice Vergnes, Frédéric Faria, Franck Imoucha
-
Patent number: 8631240Abstract: An improved compression scheme for compressing an ECDSA signature is provided. The scheme substitutes the integer s in a signature (r, s) by a smaller value c. The value c is derived from s and another value d, d being small enough such that c is smaller than s. The compressed signature (r, c) is verified by computing a value using r and e, e being a hash of a message m, and using this value with a value R recovered from r to derive the value d. The value s can then be recovered and the full signature then recovered and verified.Type: GrantFiled: November 13, 2007Date of Patent: January 14, 2014Assignee: Certicom Corp.Inventor: Scott A. Vanstone
-
Patent number: 8630620Abstract: A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity and a subscriber identity module (SIM). The location sensing entity generates location information of the WTRU and the location information is embedded in a message in an SIM. A trusted processing module in the WTRU verifies integrity of the location information. The trusted processing module may be on the SIM. The location information may be physical location information or contextual location-related information. The trusted processing module is configured to cryptographically secure and bind the location information to the WTRU, and verify trust metrics of an external entity prior to granting an access to the location information or accepting information from the external entity. The trusted processing module may be a trusted computing group (TCG) trusted platform module (TPM) or mobile trusted module (MTM).Type: GrantFiled: January 25, 2008Date of Patent: January 14, 2014Assignee: InterDigital Technology CorporationInventors: Inhyok Cha, Yogendra C. Shah, Chunxuan Ye
-
Publication number: 20140013118Abstract: There is provided an information processing apparatus, including a data generation section generating a specified data stream, and also generating a plurality of segment data sets by segmenting the generated specified data stream and by adding authentication data to each of the segmented data streams, and a data transmission section transmitting the plurality of segment data sets generated by the data generation section to respective apparatuses.Type: ApplicationFiled: June 20, 2013Publication date: January 9, 2014Inventor: Tsutomu Kumai
-
Patent number: 8627422Abstract: A particular method includes storing, at a mobile device, at least one security credential that is specific to the mobile device. The method also includes transmitting the at least one security credential to a secure user plane location (SUPL) location platform (SLP) to authenticate the mobile device as associated with a SUPL user based on a comparison of the device identifier to a stored device identifier.Type: GrantFiled: November 3, 2011Date of Patent: January 7, 2014Assignee: Qualcomm IncorporatedInventors: Philip Michael Hawkes, Andreas Wachter, Adrian Edward Escott, Stephen William Edge
-
Patent number: 8627085Abstract: A public key infrastructure comprises a client side to request and utilize certificates in communication across a network and a server side to administer issuance and maintenance of said certificates. The server side has a portal to receive requests for a certificate from a client. A first policy engine to processes such requests in accordance with a set of predefined protocols. A certification authority is also provided to generate certificates upon receipt of a request from the portal. The CA has a second policy engine to implement a set of predefined policies in the generation of a certificate. Each of the policy engines includes at least one policy configured as a software component e.g. a Java bean, to perform the discreet functions associated with the policy and generate notification in response to a change in state upon completion of the policy.Type: GrantFiled: June 29, 2012Date of Patent: January 7, 2014Assignee: Certicom Corp.Inventor: Amit Kapoor
-
Patent number: 8627439Abstract: A method of communicating over a communications system includes determining that a communication event at a user terminal of the communications system requires use of a feature for processing data, the communication event being over the communications system and determining that the feature required by the communication event is not enabled for use at the user terminal when the communication event is initiated. Following the step of determining that the feature is not enabled, the method further includes retrieving a certificate enabling the use of the feature at the user terminal and using the feature at the user terminal to process data of the communication event.Type: GrantFiled: July 30, 2009Date of Patent: January 7, 2014Assignee: Microsoft CorporationInventor: Marek Laasik
-
Patent number: 8626929Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.Type: GrantFiled: February 14, 2011Date of Patent: January 7, 2014Assignee: Microsoft CorporationInventors: Wei Jiang, Ismail Cem Paya, John D. Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
-
Patent number: 8627437Abstract: The invention relates to a method for reading at least one attribute stored in an ID token, wherein, where the ID token is associated with a user, having the following steps: the user is authenticated to the ID token, a first computer system is authenticated to the ID token, following successful authentication of the user and the first computer system to the ID token, the first computer system effects read access to the at least one attribute stored in the ID token in order to transmit the at least one attribute, when it has been signed, to a second computer system, where the authentication of the first computer system to the ID token is performed because of an attribute specification, which is received by the first computer system from a third computer system.Type: GrantFiled: May 11, 2009Date of Patent: January 7, 2014Assignee: Bundesdruckerei GmbHInventors: Frank Dietrich, Manfred Paeschke
-
Publication number: 20140006788Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages private key storage. An apparatus according to the present disclosure may comprise a first non-volatile storage for storing a private root key for signing digital certificates, an input device for receiving manual input from an operator, a communication interface consisting of a one-way transmitter for transmitting information from the apparatus, and a processor. The processor may be configured to retrieve the private root key from the first non-volatile storage, receive information for a new digital certificate through the input device, generate the new digital certificate according to the received information, sign the new digital certificate using the private root key and transmit the new digital certificate from the apparatus using the transmitter.Type: ApplicationFiled: June 27, 2013Publication date: January 2, 2014Inventor: Sergey IGNATCHENKO
-
Patent number: 8621222Abstract: In various embodiments, a computerized method includes receiving electronic content to be archived. The electronic content comprises a digital signature. The method also includes archiving the digital signature, wherein archiving of the digital signature comprises determining a validity status of the digital signature and storing the validity status in the electronic content. The method includes archiving the electronic content after the validity status has been stored in the electronic content. The method includes storing the archived electronic content and the attestation signature into a machine-readable medium.Type: GrantFiled: May 30, 2008Date of Patent: December 31, 2013Assignee: Adobe Systems IncorporatedInventor: Sujata Das
-
Patent number: 8621639Abstract: A system provides for fuzzy classification in comparisons of scanner responses. A web application test suite performs tests against a web application by sending client requests from a testing computer to the server running the web application and checking how the web application responds. A thorough web application security scan might involve thousands of checks and responses. As a result, some sort of programmatic analysis is needed. One such evaluation involves comparing one response against another. Response matching that compares two HTTP responses might use fuzzy classification processes.Type: GrantFiled: November 30, 2011Date of Patent: December 31, 2013Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Publication number: 20130346754Abstract: A cloud computing system for real-time streaming of drilling data from a drilling rig using satellites, wherein the system includes client devices for transmitting the drilling data. Radio boxes disposed around the drilling rig to form a local area network for connecting with the client devices. A router and switch connected to the local area network for receiving and transmitting the drilling data. A processor and data storage configured to receive the drilling data and form well logging data for transmission to the router and switch. A modem in communication with the router and switch used to send the drilling data to satellite dishes. A server positioned apart from the drilling rig used to receive drilling data and from well logs and executive dashboards. The server can stream the drilling data, well logs, and executive dashboard in real-time to remote client devices.Type: ApplicationFiled: September 21, 2012Publication date: December 26, 2013Applicant: SELMAN AND ASSOCIATES, LTD.Inventors: Thomas H. Selman, Matthew J. Jennings
-
Patent number: 8615660Abstract: A cloud computing system for real-time streaming of drilling data from a drilling rig using satellites, wherein the system includes client devices for transmitting the drilling data. Radio boxes disposed around the drilling rig to form a local area network for connecting with the client devices. A router and switch connected to the local area network for receiving and transmitting the drilling data. A processor and data storage configured to receive the drilling data and form well logging data for transmission to the router and switch. A modem in communication with the router and switch used to send the drilling data to satellite dishes. A server positioned apart from the drilling rig used to receive drilling data and from well logs and executive dashboards. The server can stream the drilling data, well logs, and executive dashboard in real-time to remote client devices.Type: GrantFiled: September 21, 2012Date of Patent: December 24, 2013Assignee: Selman and Associates, Ltd.Inventors: Thomas H. Selman, Matthew J. Jennings
-
Publication number: 20130339740Abstract: Disclosed herein is a certificate authority server configured to provide multi-factor digital certificates. A processor readable medium may include a plurality of instructions configured to enable a certificate authority server of a certificate authority, in response to execution of the instructions by a processor, to receive a request to provide a multi-factor digital security certificate by digitally signing a certificate request having a plurality of factors and a cryptographic key, wherein a first of the plurality of factors is an identifier of a device and a second of the plurality of factors is an identifier of a user of the device. The instructions are also configured to enable the certificate authority server to associate the cryptographic key with the plurality of factors and issue the digital security certificate based on the certificate request. Also disclosed is a method of using a multi-factor digital certificate as part of the authorization process to implicitly bind the plurality of factors.Type: ApplicationFiled: March 8, 2012Publication date: December 19, 2013Inventors: Omer Ben-Shalom, Alex Nayshtut
-
Patent number: 8612751Abstract: In one embodiment, a method for securely transferring entitled data from one or more devices in a customer's network to a vendor's network via a public network is described. The data is obtained from a collection module communicatively coupled to the devices. The obtained data is transformed into a format that is recognized by a backend server present in the vendor's network. The transformed data is then assorted by associating the transformed data with corresponding one or more devices. Finally, the assorted data is then encrypted and sent to the backend server securely via the public network along with entitlement attributes corresponding to the one or more devices.Type: GrantFiled: August 20, 2008Date of Patent: December 17, 2013Assignee: Cisco Technology, Inc.Inventors: Ammar Rayes, Subrata Dasgupta, Tom Deckers, Venkataraman Sivasankaran
-
Patent number: 8612762Abstract: An apparatus in a system which includes at least a high-level apparatus and a plurality of low-level apparatuses, said apparatus being one of the low-level apparatuses. The apparatus includes a storage unit configured to store an individual certificate set and a common certificate set and a communication unit configured to transmit own authentication information to the high level apparatus to allow the high level apparatus to perform decryption to authenticate the validity of the apparatus.Type: GrantFiled: September 4, 2012Date of Patent: December 17, 2013Assignee: Ricoh Company, Ltd.Inventor: Tatsuya Imai
-
Publication number: 20130332740Abstract: Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate during a negotiation of a secure session between a local device and a remote device. The certificate includes security information about a site maintained at the remote device. The security information is displayed to a user of the browsing software in a meaningful fashion to allow the user to make a trust determination about the site. Displaying the security information may include presenting a certificate summary that includes the most relevant information about the certificate, such as the name of the owner of the site and the name of the certificating authority of the certificate.Type: ApplicationFiled: August 13, 2013Publication date: December 12, 2013Applicant: Microsoft CorporationInventors: Aaron J. Sauve, Cornelis K. Van Dok, Marc A. Silbey
-
Patent number: 8607334Abstract: Systems and methods for secure e-mail message processing. A device is configured to receive a secure electronic message. The message may then be processed to determine whether the sender's address provided in the message is indicative of the sender's address provided in a sender's security-related certificate. A message's recipient can be notified based upon the determination.Type: GrantFiled: July 7, 2005Date of Patent: December 10, 2013Assignee: Research In Motion LimitedInventors: Michael K. Brown, Michael S. Brown, Michael G. Kirkup, Neil P. Adams, Herbert A. Little
-
Patent number: 8607055Abstract: A scanned document management system for managing a paper document in a state in which the paper document is scanned and transformed into electronic data, registers an attribute of the document by a manager; when printing out the document, registers identification information of the document with correspondence to the attribute, issues a document authentication representing certificate including the identification information, coding the document authentication representing certificate and prints out the same with including the same in a document image; and, when scanning the document, extracts the coded document authentication representing certificate from the document, obtains the attribute from the identification information included in the document authentication representing certificate to determine whether or not authentication is possible therewith, and allows transfer of the document image thus scanned, when the authentication is possible.Type: GrantFiled: April 16, 2007Date of Patent: December 10, 2013Assignee: Ricoh Company, Ltd.Inventor: Jun Kawada
-
Publication number: 20130326223Abstract: A method for increasing the security of private keys is provided that includes generating transaction data at a device operated by a user and processing the transaction data. Moreover, the method includes determining whether the user permits using a private key that is associated with the user and with a public-private key pair of the user. The private key is stored in a computer system different from the device. Furthermore, the method includes authenticating the user when the user permits using the private key, applying the private key to other data after successfully authenticating the user, and transmitting the other data to the device. The method also includes conducting a transaction with the transaction data.Type: ApplicationFiled: May 31, 2012Publication date: December 5, 2013Inventors: Andrew Supplee Webb, Michael Peirce
-
Patent number: 8600058Abstract: In a first embodiment of the present invention, a method for registering a new device to a control point in a home network is provided, the method comprising: generating a first self-certified identification at the control point, the generation using a pseudo-random generated number and using an identification of the control point; and sending a secure message to the new device containing the first self-certified identification.Type: GrantFiled: March 27, 2009Date of Patent: December 3, 2013Assignee: Samsung Electronics Co., Ltd.Inventor: Sanjeev Verma
-
Patent number: 8601560Abstract: Provided are a method for authenticating a user terminal in an interface server, and an interface server and a user terminal using the same. The method includes receiving authentication request information from an application service providing server in order to request the interface server to authenticate the user terminal receiving an application service provided from the application service providing server, authenticating the user terminal according to the authenticating request information using an authentication method selected by the interface server or a user of the user terminal, and transmitting authentication response information including an authentication result of performing the authentication method to the application service providing server. The interface server provides an interface for a network to the application service providing server.Type: GrantFiled: November 30, 2009Date of Patent: December 3, 2013Assignee: KT CorporationInventors: Soo-Jin Kim, Duc-Key Lee, Jung-Hee Bang
-
Patent number: 8601271Abstract: A method and system that facilitates power management over an IPv6 network connection is described. A first host having an application creates a power management option for managing power management settings of one or more second hosts, which is in network communication with the first host. A neighbor solicitation request is sent with the power management option to the one or more second hosts, wherein the power management option requests the power management settings of the one or more second hosts. A table of the power management settings for each of the one or more second hosts is generated from the responses received from the neighbor solicitation request, and the power management settings are applied to the one or more second hosts.Type: GrantFiled: September 29, 2011Date of Patent: December 3, 2013Assignee: Konica Minolta Laboratory U.S.A., Inc.Inventor: Maria Perez
-
Publication number: 20130318353Abstract: The invention comprises a method of creating a certificate based on the contents of another certificate. The certificate is then automatically installed and configured on the server where it will be used. A further enhancement automatically requests and installs the certificate prior to an existing certificate's expiration.Type: ApplicationFiled: May 24, 2012Publication date: November 28, 2013Applicant: DIGICERT, INC.Inventor: Christopher Skarda
-
Publication number: 20130318354Abstract: The invention relates to a method for generating a certificate for signing electronic documents by means of an ID token (106), having the following steps: —sending (201) a transaction request for a user to carry out a transaction, —as a result of the sending of the transaction request, a check is carried out as to whether the certificate (519) is available and if this is not the case, carrying out the following steps: generating (206) an asymmetrical key pair consisting of a private key and a public key using an ID token, said ID token (106) being assigned to the user; storing (207) the generated asymmetrical key pair on the ID token, wherein at least the private key is stored in a protected memory region of the ID token; transmitting (208; 509) the generated public key (518) to a first computer system, and generating (209) the certificate (519) by means of the first computer system for the public key.Type: ApplicationFiled: June 10, 2011Publication date: November 28, 2013Applicant: BUNDESDRUCKEREI GMBHInventors: Enrico Entschew, Klaus-Dieter Wirth
-
Publication number: 20130318355Abstract: The invention concerns a method for managing content on a secure element connected to an equipment, this content being managed on the secure element from a distant administrative platform. According to the invention, the method consists in: establishing, at the level of the administrative platform a secure channel between the equipment and the administrative platform, thanks to session keys generated by the secure element and transmitted to the equipment; transmitting to the administrative platform a request to manage content of the secure element; and verifying at the level of the administrative platform that this request originates from the same secure element that has generated the session keys and, if positive, authorizing the management and, if negative, forbid this management.Type: ApplicationFiled: December 5, 2011Publication date: November 28, 2013Applicant: GEMALTO SAInventors: Pierre Girard, Philippe Proust
-
Patent number: 8593253Abstract: A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message.Type: GrantFiled: June 9, 2010Date of Patent: November 26, 2013Assignee: GM Global Technology Operations, Inc.Inventors: Aravind V. Iyer, Bhargav R. Bellur
-
Patent number: 8595492Abstract: On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a client for the digital media. The method also includes generating a protected copy of the digital media from the digital media and the intermediary data. The method also includes storing a description of the protected copy in a database and sending the protected copy to the client. The method also includes receiving a request from the client to access the digital media and reading the description from the database based on information in the request. The method also includes sending a response to the client, the response indicating whether the client is authorized to access the digital media, and the response including cryptographic data to decrypt the protected digital media if the client is authorized to access the digital media.Type: GrantFiled: August 19, 2009Date of Patent: November 26, 2013Assignee: Pix System, LLCInventors: Paul McReynolds, Eric B. Dachs, Erik Bielefeldt, Craig Wood
-
Publication number: 20130311779Abstract: A certificate enrolment assistant module may be provided to inject a challenge password into a certificate signing request to be sent, to a Certificate Authority, from a computing device. The certificate enrolment assistant module, thereby, acts as a trusted proxy to assist the computing device in building a valid certificate signing request without the computing device having access to the challenge password.Type: ApplicationFiled: July 29, 2013Publication date: November 21, 2013Applicant: BlackBerry LimitedInventors: Alexander SHERKIN, Michael Anthony CARRARA, Alexander Truskovsky
-
Patent number: 8588766Abstract: The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so.Type: GrantFiled: February 7, 2012Date of Patent: November 19, 2013Assignee: QUALCOMM IncorporatedInventors: Laurence Lundblade, Marc S. Phillips, Brian Minear, Yan Zhuang, Anand Krishnan, Stephen A. Sprigg, Mazen Chmaytelli, Mitchell B. Oliver, Gerald Charles Horel, Karen Crossland
-
Patent number: 8589698Abstract: An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.Type: GrantFiled: May 15, 2009Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Publication number: 20130305050Abstract: Trust is established between a service provider (20) and a client (10) of the service provider (20). The client (10) is associated with a party that is known by an identity provider (50), and the identity provider (50) is trusted by the service provider (20). The identity provider (50) contacts (70) the party (80) via a predetermined medium, and requests the party to identify itself. The identity provider (50) determines whether the identity of the identifying party (80) corresponds to an identity held by the identity provider (50) for the party and shares a secret (100) with the identifying party (80) in the event that the identity provider (50) has determined that the identity of the identifying party (80) is the same as said identity held by the identity provider (50).Type: ApplicationFiled: January 25, 2013Publication date: November 14, 2013Applicant: VISA EUROPE LIMITEDInventors: Matthew Johnson, Malcolm Lewis, Boris Taratine
-
Publication number: 20130305051Abstract: Systems and methods for generating credentials are described. A subject private key that has been encrypted with a session key and a subject public key are received. A storage session key is generated and the subject private key is encrypted with the storage session key. A storage private key is retrieved and the storage session key is encrypted with the storage private key. The subject private key encrypted with the storage session key and the encrypted storage session key are stored in a memory.Type: ApplicationFiled: July 22, 2013Publication date: November 14, 2013Inventors: Christina Fu, Steven W. Parkinson, Nang Kon Kwan
-
Patent number: 8584233Abstract: Providing malware-free web content to a user is disclosed. The web content is any type of web content that may potentially be infected by any type of malware. Upon receiving a request for a piece of web content from the user, the requested piece of web content is obtained from the appropriate source, and a dynamic template for the piece of web content is retrieved. The dynamic template indicates whether the requested piece of web content includes any malware and what actions are to be performed if any malware is included in the piece of web content. The requested piece of web content is cleaned up by performing the actions indicated in the dynamic template. Thereafter, the piece of web content is provided to the user. The dynamic template is updated from time to time based on the currently available information regarding the piece of web content.Type: GrantFiled: May 5, 2008Date of Patent: November 12, 2013Assignee: Trend Micro Inc.Inventors: Liulin Yang, Kun Lu, Shiyu Xie
-
Patent number: 8584218Abstract: One or more user service tickets are obtained (i.e. pre-fetched) from an authentication server and stored in a ticket cache. The user service tickets facilitate a login device communicating with one or more users or group members associated with the login device. Login credentials for the users or group members may be subsequently authenticated against the user service tickets within the ticket cache thereby eliminating the need for immediate access to the authentication server or a previous login session by the users or group members. The user service tickets within the ticket cache may be refreshed as needed. In one embodiment, the user service tickets are refreshed daily and also in response to login attempts if the authentication service is readily accessible.Type: GrantFiled: December 21, 2011Date of Patent: November 12, 2013Assignee: Quest Software, Inc.Inventors: Matthew T. Peterson, Jeff Marsden Webb
-
Patent number: 8584253Abstract: Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.Type: GrantFiled: August 29, 2011Date of Patent: November 12, 2013Assignee: Time Warner Inc.Inventors: Steven M. Blumenfeld, William J. Raduchel
-
Patent number: 8583932Abstract: [Problem] Provided is an anonymous authentication system which can issue an anonymous authentication certificate that can hold any number of attributes.Type: GrantFiled: May 13, 2010Date of Patent: November 12, 2013Assignee: NEC CorporationInventor: Jun Furukawa
-
Patent number: 8578167Abstract: Object To provide a technique for authenticating a communication partner using an electronic certificate containing personal information. Solving Means When a client apparatus receives a request for an electronic certificate from a server apparatus, the server apparatus reads a client certificate containing personal information and a server public key of the server apparatus from a storage unit and encrypts the client certificate using the server public key. The client apparatus also creates a temporary electronic certificate by setting, in a basic field of an electronic certificate, a predetermined item indicating that the electronic certificate is a temporary electronic certificate and by setting the client certificate having been encrypted in an extension field of the electronic certificate. Then, the client apparatus sends the temporary electronic certificate to the server apparatus.Type: GrantFiled: April 26, 2012Date of Patent: November 5, 2013Assignee: International Business Machines CorporationInventors: Takashi Miyamoto, Kohsuke Okamoto
-
Patent number: 8578151Abstract: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied.Type: GrantFiled: March 29, 2011Date of Patent: November 5, 2013Assignee: Intertrust Technologies CorporationInventors: Stephen P. Weeks, Xavier Serret-Avila
-
Patent number: 8578166Abstract: Methods and systems for secure electronic data communication over public communication networks. A secure data communication component may be utilized to implement a communication protocol. New versions of the data communication component may be generated, with each version containing a different communication protocol. Source code of the data communication component may be modified using a polymorph engine to create a functionally-equivalent component having a different code structure. An anti-phishing component may intercept a link in an electronic communication activated by a user, analyze the link and the electronic communication, determine a phishing risk to the user posed by the link, and direct the user to a location indicated by the link or redirect the user to a valid location. A server authentication component may detect and prevent DNS attacks, injections, and defacing activities.Type: GrantFiled: August 6, 2008Date of Patent: November 5, 2013Assignee: Morgamon SAInventors: Bernard De Monseignat, Stéphane Moreau
-
Patent number: 8572373Abstract: An embodiment relates generally to a method of selecting certificates. The method includes invoking a send option for an email client and displaying a send mail user interface for the email client. The method also includes displaying a default certificate in a graphical user element in the send mail user interface.Type: GrantFiled: November 30, 2006Date of Patent: October 29, 2013Assignee: Red Hat, Inc.Inventor: Robert B. Lord
-
Patent number: 8572715Abstract: In a method for use in a data storage system which applies high safety requirements for the storage of data on a server in a telecommunications network and for the retrieval of the files by the local computers linked with the server via the network, the applicant is provided with a user certificate and public and secret keys, preferably on a chip card. Once the server is dialed up via the Internet, a client program is forwarded to the user which controls authentication of the user and the transmission of additional safety-relevant features of proof such as biometrical systems, geographical positioning, time-dependent data, network and computer data, etc., to the server. The storage system on the server is provided with a locker-type characteristic by establishing folders comprising a specific file for the safety requirements related thereto. The lockers are distinguished by their specific function and are only displayed to the user when the safety requirements are met.Type: GrantFiled: June 17, 2004Date of Patent: October 29, 2013Assignee: Deutsche Telekom AGInventors: Siegfried Koeppen, Stefan Loewe