By Generation Of Certificate Patents (Class 713/175)
-
Patent number: 8370908Abstract: Systems, methods, and computer-storage media for decreasing web service login latency are provided. Upon a user's initial login to the web service from a web browser, the location of user information is identified. A cookie containing information identifying the location of the user information is generated and stored in association with the web browser. Upon a subsequent login to the web service by the same user, the location information included in the cookie is utilized to direct the user request directly to the correct location, without having to repeat the act of identifying the location, thus providing the user with the desired information more quickly.Type: GrantFiled: June 10, 2009Date of Patent: February 5, 2013Assignee: Microsoft CorporationInventors: Eliot C. Gillum, Aladdin A. Nassar, John P. Walpole, Hans Matthew Endresen
-
Patent number: 8370626Abstract: A method and apparatus are provided for generating identity data to be provisioned in product devices that are a part of a project. The method includes establishing a template associated with each CA in a hierarchical chain of CAs having a root CA at a highest level in the chain and a signing CA at a lowest level in the chain. The template associated with the signing CA inherits mandatory attribute fields specified in the root CA and any intermediate CA in the hierarchical chain. The mandatory attribute fields are user-specifiable fields to be populated with PKI data. A configuration file is generated upon receipt of an order for digital certificates using PKI data provided by a user to populate the mandatory attribute fields of the template associated with the signing CA. The digital certificates requested in the order are generated using the PKI data in the configuration file.Type: GrantFiled: August 12, 2010Date of Patent: February 5, 2013Assignee: General Instrument CorporationInventors: Jiajing Liu, Thomas J. Barbour, Liqiang Chen, Ying Chen, Wei Lin Chou, Christopher P. Gardner, Stuart P. Moskovics, Xin Qiu, Chia Ling Tsai, Ting Yao
-
Patent number: 8364954Abstract: A method of provisioning a first digital certificate and a second digital certificate based on an existing digital certificate includes receiving information related to the existing digital certificate. The existing digital certificate includes a first name listed in a Subject field and a second name listed in a SubjectAltName extension. The method also includes receiving an indication from a user to split the existing digital certificate and extracting the first name from the Subject field and the second name from the SubjectAltName extension of the existing digital certificate. The method further includes extracting the public key from the existing digital certificate, provisioning the first digital certificate with the first name listed in a Subject field of the first digital certificate and the public key, and provisioning the second digital certificate with the second name listed in a Subject field of the second digital certificate and the public key.Type: GrantFiled: December 16, 2009Date of Patent: January 29, 2013Assignee: Symantec CorporationInventors: Quentin Liu, Marc Williams, Richard F. Andrews
-
Patent number: 8364947Abstract: A method for securing encryption keys includes providing two device, each including secure and insecure hardware, generating in each secure hardware at least two period keys stored in the secure hardware, generating in each secure hardware a plurality of session keys stored in either secure or insecure hardware on the generating device, for each secure hardware, encrypting at least one of the generated plurality of session keys according to a first of the two period keys included in each secure hardware, encrypting at least one of the plurality of session keys generated in each device according to a second of the two period keys included in each secure hardware, when a session is established between the two devices, decrypting one encrypted session key in each device, and establishing an encrypted session between both devices, where the period keys included in both devices are periodically regenerated.Type: GrantFiled: January 22, 2007Date of Patent: January 29, 2013Assignee: NDS LimitedInventor: Yaacov Belenky
-
Patent number: 8364964Abstract: In a method of registering a plurality of client devices with a device registration server for secure data communications, a unique symmetric key is generated for each of the client devices using a cryptographic function on a private key of the device registration server and a respective public key of each of the client devices, and a broadcast message containing the public key of the device registration server is sent to the client devices, in which the client devices are configured to generate a respective unique symmetric key from the public key of the device registration server and its own private key using a cryptographic function, and in which the unique symmetric key generated by each client device matches the respective unique symmetric key generated by the device registration server for the respective client device.Type: GrantFiled: December 29, 2009Date of Patent: January 29, 2013Assignee: General Instrument CorporationInventors: Alexander Medvinsky, Paul Moroney, Jiang Zhang
-
Patent number: 8364772Abstract: An Instant Messaging security system that encrypts Instant Messages sent by a Instant Messaging user to an Instant Messaging server by intercepting the messages, negotiating a preferred security algorithm and forwarding the encrypted messages to the server. The security system intercepts and decrypts encrypted messages sent by the server to the user. The security system is able to determine whether a receiving user is equipped with a similar security system without prior knowledge of network addresses, configuration or capability. The security system is transparent to the Instant Message service provider and may provide one or more indicators to users that messages are encrypted during forwarding.Type: GrantFiled: January 18, 2012Date of Patent: January 29, 2013Assignee: McAfee, Inc.Inventors: Saroop Mathur, Rajamadam C. Venkatraman, Charlie Kim, Ashish Warty, Yih-Ming Liao
-
Publication number: 20130024695Abstract: A mechanism and method for managing credentials on an electronic device configured with an iOS based operating system. The iOS based device includes a “keychain” configured in device memory. According to an embodiment, the electronic device comprises an application configured to generate a public certificate object in the keychain and a password object in the keychain. The public certificate object is configured to store a public certificate, and the password object is configured to store a private key. The password object further includes a label or thumbprint for associating the private key with the corresponding public certificate. According to an embodiment, the application stores the private key in an encrypted container in the password object to provide an additional layer of security. The application is configured to unlock the encrypted container utilizing a password provided the user. According to a further aspect, the user password is not stored in memory on the device.Type: ApplicationFiled: July 18, 2011Publication date: January 24, 2013Inventors: Yauheni KANDRASHEU, Sarah HAPPE, Christian PEEL
-
Patent number: 8359465Abstract: A platform of Trust Management software which is a single, customizable, complete distributed computing security solution designed to be integrated into an enterprise computing environment. Digital Network Authentication (DNA) is the centerpiece of the system of the present invention. It is a unique means to authenticate the identity of a communicating party and authorize its activity. The whole mechanism can be thought of as a trusted third party providing assurances to both clients and servers that each communicating entity is a discrete, authenticated entity with clearly defined privileges and supporting data. Furthermore, the level of trust to be placed in the authorization of every entity communicating within the system is communicated to every entity within a distributed computing environment.Type: GrantFiled: August 31, 2010Date of Patent: January 22, 2013Inventors: Richard M. Feezel, Gerard A. Gagliano
-
Patent number: 8356351Abstract: A method for pre-verification of a code module when the code module is installed or updated in a virtual machine, comprising: loading codes in the installed or updated code module; performing code verification on the codes in the code module; if the code verification is passed, generating a certificate of the code module; and storing the code module passing the code verification and its certificate. The present invention also discloses a method for verification of a code module at runtime of the code module in a virtual machine, comprising loading codes in the code module; generating a certificate of the code module based on the loaded codes; if the generated certificate of the code module and a pre-stored certificate of the code module are identical, verifying the code module to be valid; otherwise performing a pre-verification on the code module.Type: GrantFiled: January 18, 2008Date of Patent: January 15, 2013Assignee: International Business Machines CorporationInventors: Rong Yao Fu, Hai Tao Long, William J. Tracey, David Alvra Wood, III
-
Patent number: 8356172Abstract: A system that incorporates teachings of the present disclosure may include, for example, a set-top-box (STB) having a controller to transmit a request to a remote management server for status information associated with a x.509 certificate intended for the STB, wherein at least one of the STB and the remote management server operate in an interactive television (iTV) network, and receive the status information associated with the x.509 certificate from the remote management server, wherein events associated with the status information are received by the remote management server from at least one of the STB, a certificates proxy, an external certificate web service, and a certificate authority, and wherein the status information comprises at least a portion of the received events. Other embodiments are disclosed.Type: GrantFiled: October 8, 2009Date of Patent: January 15, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Jerry Howcroft, Benjamin Jahner
-
SYSTEM AND METHOD FOR COMPRESSING SECURE E-MAIL FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE
Publication number: 20130007459Abstract: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device: the message is processed so as to modify the message with respect to encryption and/or authentication aspect. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a remote system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the remote system to one or more receivers.Type: ApplicationFiled: September 12, 2012Publication date: January 3, 2013Applicant: RESEARCH IN MOTION LIMITEDInventors: James A. Godfrey, Herbert A. Little, Michael K. Brown, Neil P. Adams, Carl L. Cherry, Timothy R. Tyhurst, Michael S. Brown -
Publication number: 20130007458Abstract: A method is provided for authenticating characteristics of electrical energy. The method comprises acquiring a key, acquiring an amount of electrical energy, and generating a digital signature based on the amount and the key. The method further comprises generating a certificate comprising the signature and the amount.Type: ApplicationFiled: January 20, 2011Publication date: January 3, 2013Inventors: Yoshihiro Wakita, Jun Nakano, Masaru Kuramoto, Yutaka Imai
-
Publication number: 20130007460Abstract: A method for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.Type: ApplicationFiled: September 12, 2012Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Roy DARE, John OWLETT, Imran Faiz TYABJI
-
Publication number: 20130007461Abstract: A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent and received between a first party and a verifying party, the method comprising the steps of receiving a proof message from the first party, the proof message being derived from at least a first public key based on a secret owned by the first party and wherein the secret is associated with at least the secret of a further public key of the first party and an electronic receipt that has been issued by electronically signing a request message with a second public key, determining whether or not the proof message was derived from the second public key.Type: ApplicationFiled: September 12, 2012Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elsie van Herrewegen, Jan Camenisch
-
Patent number: 8343235Abstract: Systems and methods of theft prevention of communication devices are provided. In one embodiment, the method may include, for example, one or more of the following: registering a communication device being used at a home, where the device is connected to a communication network; entering validation information relating to the communication device; and analyzing the validation information to determine whether the communication device is authorized for use in the communication network.Type: GrantFiled: September 26, 2003Date of Patent: January 1, 2013Assignee: Broadcom CorporationInventors: Jeyhan Karaoguz, James D. Bennett
-
Patent number: 8347372Abstract: A system and method for generating a digital certificate is provided wherein a new digital record is received and is assigned a sequence value. A first composite digital value is generated by applying a first deterministic function to the digital records stored in a repository. The sequence value and first composite digital value are included in a first certificate. After the digital record is added to the repository, a second composite digital value is generated by applying a second deterministic function to the digital records in the repository. This second composite digital value, and a composite sequence value, are published. An interval digital value which is based upon the first and second composite digital values, and the sequence value, are included in a second certificate which thus verifies the authenticity and sequence value of the digital record.Type: GrantFiled: January 29, 2010Date of Patent: January 1, 2013Assignee: Guardtime IP Holdings LimitedInventors: Mart Saarepera, Ahto Buldas
-
Patent number: 8347090Abstract: A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.Type: GrantFiled: September 21, 2007Date of Patent: January 1, 2013Assignee: Nokia CorporationInventors: Silke Holtmanns, Dan Forsberg
-
Patent number: 8347080Abstract: Operations or functions on a device may require an operational certificate to ensure that the user of the device or the device itself is permitted to carry out the operations or functions. A system and a method are provided for providing an operational certificate to a device, whereby the operational certificate is associated with one or more operations of the device. A manufacturing certificate authority, during the manufacture of the device, obtains identity information associated with the device and provides a manufacturing certificate to the device. An operational certificate authority obtains and authenticates at least a portion of the identity information associated with the device from the manufacturing certificate and, if at least the portion of the identity information is authenticated, the operational certificate is provided to the device.Type: GrantFiled: May 10, 2010Date of Patent: January 1, 2013Assignee: Research In Motion LimitedInventors: Christopher Lyle Bender, Roger Paul Bowman
-
Publication number: 20120331299Abstract: An apparatus in a system which includes at least a high-level apparatus and a plurality of low-level apparatuses, said apparatus being one of the low-level apparatuses. The apparatus includes a storage unit configured to store an individual certificate set and a common certificate set and a communication unit configured to transmit own authentication information to the high level apparatus to allow the high level apparatus to perform decryption to authenticate the validity of the apparatus.Type: ApplicationFiled: September 4, 2012Publication date: December 27, 2012Inventor: Tatsuya IMAI
-
Patent number: 8341716Abstract: The information processing device includes, a communication portion that communicates with a certification device which performs certification of whether or not a user has usage permission, a reception portion that receives input identification information for identifying the user, a storage portion that stores previously registered identification information, a certification portion that performs user certification, when the reception portion receives the input identification information and the communication portion requests certification of a user by sending the identification information to the certification device, based on result information, when result information is obtained from the certification device indicating a certification result, and based on whether or not the identification information is stored in the storage portion, when the result information is not obtained, and a registration portion that registers the certified identification information in the storage portion, when certification thType: GrantFiled: June 13, 2008Date of Patent: December 25, 2012Assignee: Fuji Xerox Co., Ltd.Inventors: Takashi Sakayama, Shinji Akahira, Daigo Yamagishi
-
Patent number: 8340298Abstract: Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized quantum key certificate authority (QKCA) to each network user via respective secure quantum links or “Q-links” that encrypt and decrypt data based on quantum keys (“Q-keys”). When two users (Alice and Bob) wish to communicate, the QKCA sends a set of true random bits (R) to each user over the respective Q-links. They then use R as a key to encode and decode data they send to each other over the TC-link.Type: GrantFiled: April 16, 2007Date of Patent: December 25, 2012Assignee: MagiQ Technologies, Inc.Inventors: Robert Gelfond, Audrius Berzanskis
-
Patent number: 8341393Abstract: An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed.Type: GrantFiled: December 17, 2009Date of Patent: December 25, 2012Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Randall S. Springfield, Howard J. Locker, David Rivera, Joseph M. Pennisi, Rod D. Waltermann
-
Patent number: 8341398Abstract: There is provided a communication system in which a network device and an information processing device are communicatably connected to each other through a network. The network device comprises a certificate providing unit to transmit an electronic certificate to the information processing device through the network; and a printing unit configured to print an image of a public key corresponding to the electronic certificate. The information processing device comprises: a certificate reception unit to receive the electronic certificate from the certificate providing unit through the network; an image output unit to generate and output an image of the public key described in the received electronic certificate; and an installation unit configured to install the electronic certificate onto the information processing device in response to a fact that the generated image of the public key is output by the image output unit and a command for installation of an electronic certificate is received.Type: GrantFiled: March 29, 2007Date of Patent: December 25, 2012Assignee: Brother Kogyo Kabushiki KaishaInventors: Kiyotaka Ohara, Masafumi Miyazawa
-
Patent number: 8341718Abstract: An integrated authentication service is described which may receive a bundled request from one or more clients. One or more of the described techniques may be utilized to provide, in response to a single bundled request, a token for proof of identity and a certificate for establishing secure communications.Type: GrantFiled: December 10, 2010Date of Patent: December 25, 2012Assignee: Microsoft CorporationInventors: Trevin M Chow, Pui-Yin Winfred Wong, Yordan I Rouskov, Kok Wai Chan, Wei Jiang, Colin Chow, Sanjeev M Nagvekar, Matt Sullivan, Kalyan Sayyaparaju, Dilip K. Pai, Avinash Belur
-
Patent number: 8341399Abstract: A system and method for retrieving certificates and/or verifying the revocation status of certificates. In one embodiment, when a user opens a digitally signed message, a certificate that is required to verify the digital signature on the message may be automatically retrieved if it is not stored on the user's computing device (e.g. a mobile device), eliminating the need for users to initiate the task manually. Verification of the digital signature may also be automatically performed by the application after the certificate is retrieved. Verification of the revocation status of a certificate may also be automatically performed if it is determined that the time that has elapsed since the status was last updated exceeds a pre-specified limit.Type: GrantFiled: December 30, 2010Date of Patent: December 25, 2012Assignee: Research In Motion LimitedInventors: Michael Stephen Brown, Herbert Anthony Little, Neil Patrick Adams, Michael Grant Kirkup, Michael Kenneth Brown
-
Patent number: 8341717Abstract: A dynamic network policies system based on device classification is provided. The system comprises a computer system, a configuration database, and a dynamic network policies application based on device classification that receives a message from a virtual local area network access component containing a device identity certificate. The application parses the device identity certificate to discover a device classification, references the configuration database to determine a network policy associated with the device classification, and associates the network policy with a virtual local area network definition. The application also sends a reply containing the virtual local area network definition to the virtual local area network access component in response to the request, wherein access to network services is made available by association with a virtual local area network, and wherein association with a virtual local network is specific to the device classification and the network policy.Type: GrantFiled: November 13, 2008Date of Patent: December 25, 2012Assignee: Sprint Communications Company L.P.Inventors: Jason R. Delker, John M. Everson, James W. Norris, Carol A. Ross, Jason K. Whitney
-
Patent number: 8341708Abstract: A method and system for authenticating credentials for management of a client is disclosed. The credentials are provided to a verification application. The credentials are authenticated to an authentication application. A connection between the authentication application and a security server is established. An authenticator is invoked. Administrative rights associated with the credentials are verified. An authentication certificate indicating the administrative rights is sent to the client.Type: GrantFiled: August 29, 2006Date of Patent: December 25, 2012Assignee: Crimson CorporationInventors: David A. Eatough, Alan B. Butt
-
Patent number: 8336100Abstract: A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3) obtaining community-based reputation data for the file, 4) determining, by analyzing the reputation data, that instances of the file have been encountered infrequently (or have never been encountered) within the community, and then 5) performing a security operation on the file (by, for example, quarantining or deleting the file).Type: GrantFiled: August 21, 2009Date of Patent: December 18, 2012Assignee: Symantec CorporationInventors: Adam Glick, Nicholas Graf, Spencer Smith
-
Patent number: 8332649Abstract: A signature generating device generating digital signature data for certifying authenticity of information of a person, and obfuscating the information. The signature generating device includes a storage unit storing attribute information concerning the person and a private key corresponding to the attribute information, an obfuscated information generating unit selecting one or more pieces of dummy information in relation to the attribute information, and generating the obfuscated information including the attribute information and the dummy information; and a public key obtaining unit obtaining a public key corresponding to the attribute information and public keys respectively corresponding to the dummy information.Type: GrantFiled: October 26, 2006Date of Patent: December 11, 2012Assignee: Panasonic CorporationInventors: Kaoru Yokota, Natsume Matsuzaki, Masao Nonaka
-
Patent number: 8331568Abstract: In Transport Layer Security (TLS) or other communication protocols, the load on the server may be lowered by reducing the number of expensive decryption operations that the server has to perform. When a client contacts a server, the client sends the server the client's public key. The server chooses a secret value, encrypts the value with the client's public key, and sends the encrypted value to the client. When the client decrypts the secret, the server and client share a secret value, which may be used to derive an encryption key for further messages. In many key agreement schemes, the client chooses and encrypts the secret value, and the server recovers the value with an expensive decryption operation. By instead having the server choose the value and send it to the client, an expensive decryption operation is redistributed from the server to the client, thereby freeing server resources.Type: GrantFiled: May 28, 2009Date of Patent: December 11, 2012Assignee: Microsoft CorporationInventor: Niels Thomas Ferguson
-
Patent number: 8327131Abstract: A target machine can be verified prior to being granted access to a resource on a network by interrogating and analyzing digests of various elements of the target machine. The digests can be collected into an integrity report and provided to a Trust Scoring Service. The Trust Scoring Service receives the integrity report and compares the digests with signatures stored in a signature database. A trust score certificate can then be issued to the target machine. The Trust Scoring Service can include a Score Evaluation Server which can interact with a Kerberos Authentication Server and a Ticket Granting Server to embed a trust score within a Kerberos Ticket to enforce a richer set of access policies. The integrity of a web server can be verified and a Trust Score Certificate Logo can be displayed on a corresponding home page of a merchant. By clicking on the Trust Score Certificate Logo, a user can verify the integrity of the merchant's web servers prior to completing a transaction with the merchant.Type: GrantFiled: July 11, 2007Date of Patent: December 4, 2012Assignee: Harris CorporationInventors: Thomas Parasu Hardjono, David Maurits Bleckmann, William Wyatt Starnes, Bradley Douglas Andersen
-
Patent number: 8327146Abstract: A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a digital signature and only a portion of the data used in generating the signature. The remaining certificate data is pre-stored on one or more wireless devices for which secure communication is desired. Upon receiving a compact certificate, the wireless device authenticates the certificate using its digital signature along with both the data contained in the certificate and the data pre-stored on the wireless device. This approach permits secure connections to be established between wireless devices using relatively small digital certificates.Type: GrantFiled: March 31, 2008Date of Patent: December 4, 2012Assignee: General Motors LLCInventors: Sethu K. Madhavan, Kenneth L. Peirce, Ki Hak Yi, Elizabeth Chesnutt, Ansaf I. Alrabady
-
Patent number: 8327134Abstract: A system, method and program product for checking the revocation status of a biometric reference template. The method includes creating a revocation object for a reference template generated for an individual, where the revocation object contains first plaintext data providing a location for checking revocation status of the reference template and containing ciphertext data identifying the unique reference template identifier and a hash of the reference template. The method further includes providing the revocation object to a relying party requesting revocation status and sending a request to an issuer of the reference template for checking the revocation status of the reference template, without revealing identity of the individual. The method further includes returning results of the revocation status check to the relying party. In an embodiment, a random value is added to the ciphertext data for preserving privacy of the reference template holder.Type: GrantFiled: February 12, 2009Date of Patent: December 4, 2012Assignee: International Business Machines CorporationInventor: Phillip H. Griffin
-
Patent number: 8327423Abstract: A method and apparatus for distributed authorization by anonymous flexible credential are provided. Pseudonym authority issues a root pseudonym to a user. The user may generate large amount of derived pseudonym from the root pseudonym. The user may obtain resource credentials from resource protectors by using derived pseudonyms. The user may select a set of resource credentials, generate a flexible credential from this set of resource credentials and request access to the resource corresponding to the set of resource credentials to a resource protector by using the flexible credential and a derived pseudonym. Revocation list for each resource may be maintained in the system such that any one of resource credentials of any user may be revoked without affecting other resource credentials of that user.Type: GrantFiled: June 26, 2008Date of Patent: December 4, 2012Assignee: NEC (China) Co., Ltd.Inventor: Ke Zeng
-
Patent number: 8327147Abstract: The present invention relates electronic receipts. There is provided a method for generating an electronic receipt in a communication system providing a public key infrastructure, the method comprising the steps of receiving by a second party a request message from a first party, the request message comprising a transaction request and a first public key based on a secret owned by the first party and wherein the secret is associated with at least the secret of a further public key of the first party, electronically signing at least part of the request message with a second public key assigned to the second party to issue the electronic receipt, and providing the electronic receipt to the first party.Type: GrantFiled: August 20, 2009Date of Patent: December 4, 2012Assignee: International Business Machines CorporationInventors: Elsie van Herrewegen, Jan Camenisch
-
Patent number: 8321680Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.Type: GrantFiled: December 9, 2010Date of Patent: November 27, 2012Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
-
Patent number: 8316229Abstract: According to one embodiment of the invention, a method is deployed for loading a user CA certificate into the trusted certificate storage of a network device. The method comprises a number of operations. A first operation involves a downloading of addressing information. Thereafter, a communication session is established using the addressing information for retrieval of a bootstrapping digital certificate that can be digitally verified by the network device using its factory settings. Keying information is extracted from the bootstrapping digital certificate and the keying information can be used to verify that the communication session is between the network device and a certificate server being different than a source for the addressing information. Upon verification that the network device is in communication with the certificate server, the user CA certificate is downloaded from the certificate server using a secure channel that is established based on the bootstrapping digital certificate.Type: GrantFiled: December 17, 2007Date of Patent: November 20, 2012Assignee: Avaya Inc.Inventors: Tao Wan, Jay Taugher, David Ward
-
Patent number: 8312263Abstract: According to one embodiment of the present invention, a method of updating a certificate trust list on a first endpoint includes receiving an initial certificate trust list at the first endpoint. The initial certificate trust list includes authentication data for at least a second endpoint. Digitally signed information is received at the first endpoint and authentication is initiated against the authentication data for the at least a second endpoint. The authentication occurs only if the digital signature is complementary to the authentication data for the at least a second endpoint. After successful authentication, the initial certificate trust list is updated with the information to yield an updated certificate trust list.Type: GrantFiled: January 25, 2005Date of Patent: November 13, 2012Assignee: Cisco Technology, Inc.Inventors: Robert T. Bell, Douglas Q. Dexter
-
Patent number: 8312528Abstract: A system and method for generating a digital certificate is provided wherein a new digital record is received and is assigned a sequence value. A first composite digital value is generated by applying a first deterministic function to the digital records stored in a repository. The sequence value and first composite digital value are included in a first certificate. After the digital record is added to the repository, a second composite digital value is generated by applying a second deterministic function to the digital records in the repository. This second composite digital value, and a composite sequence value, are published. An interval digital value which is based upon the first and second composite digital values, and the sequence value, are included in a second certificate which thus verifies the authenticity and sequence value of the digital record.Type: GrantFiled: January 29, 2010Date of Patent: November 13, 2012Assignee: Guardtime IP Holdings LimitedInventors: Mart Saarepera, Ahto Buldas
-
Patent number: 8307211Abstract: A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme.Type: GrantFiled: September 28, 2010Date of Patent: November 6, 2012Assignee: Certicom Corp.Inventor: Scott Alexander Vanstone
-
Patent number: 8307218Abstract: A system for securely vaulting, auditing, controlling and transferring electronic transferable records (TRs) with unique ownership, including at least one registry for registering the electronic transferable record with unique ownership in a TR registry record; at least one secure storage manager (SSM) associated with the registry, the SSM storing the transferable record registered in the registry as an authoritative copy, the secure storage manager being distinct from said registry. The transferable record can be transferred in a transaction between an originating party and a receiving party with a transaction descriptor including information about the parties involved in the transaction and an identification of the TR being transferred. The transaction descriptor is initially signed by the originating party with the TR, subsequently verified and countersigned by the registry and signed by said accepting party.Type: GrantFiled: February 6, 2008Date of Patent: November 6, 2012Assignee: Silanis Technology Inc.Inventors: Michael Laurie, Robert Al-Jaar, Alexei Savchenko
-
Publication number: 20120278625Abstract: A user device generates a social graph-based user certificate that conveys a trust level to other users of the social network. A user certificate for a user is obtained, the user having a user public key and corresponding user private key. A plurality of potential signers is identified within one or more social networks. The certificate is then sent to the identified plurality of potential signers. One or more signed versions of the user certificate may be received from at least some of the plurality of potential signers. The user device may assign a signer weight to each signed version of the user certificate, each corresponding signer weight associated with the signer of each signed version of the certificate. The user certificate, the user signature, one or more signed versions of the user certificate, and the user-assigned signer weights are distributed to one or more recipients.Type: ApplicationFiled: March 13, 2012Publication date: November 1, 2012Applicant: QUALCOMM IncorporatedInventors: Vidya NARAYANAN, Greg Rose, Lakshminath Reddy Dondeti
-
Patent number: 8301906Abstract: An apparatus for writing checksum information on a data content on a storage medium. The apparatus has a provider for providing checksum information based on the data content and a writer for writing the data content and the checksum information on the storage medium such that a baseline reader and an enhanced reader can read the data content, the enhanced reader can read and process the checksum information, and the baseline reader ignores, skips or does not read the checksum information.Type: GrantFiled: July 27, 2007Date of Patent: October 30, 2012Assignee: Nero AGInventors: Andreas Eckleder, Richard Lesser, Reiner Kopf
-
Patent number: 8301892Abstract: A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user's certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient's certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients.Type: GrantFiled: April 30, 2010Date of Patent: October 30, 2012Assignee: Marathon Solutions LLCInventors: Robert B. Lord, Terry N. Hayes, Justin Uberti
-
Patent number: 8301877Abstract: A method and system for configuring a valid duration period for a digital certificate. The method includes assigning a positive numeric value for each certificate term. The positive numeric value assigned to each certificate term is representative of the valid duration period. The method continues by prompting a user of the client device to request one certificate term. The method may include transmitting the requested certificate term to a server. The certificate term requested is sent via a certificate request. The server is configured to convert the positive numeric value associated with the requested certificate term into a duration counter. The method may also include a certificate server receiving from the server, the certificate request including the duration counter. The certificate server is configured to digitally sign the certificate request.Type: GrantFiled: March 10, 2008Date of Patent: October 30, 2012Assignee: SecureAuth CorporationInventors: Garret Grajek, Craig Lund, Steven Moore, Mark Lambiase
-
Publication number: 20120272066Abstract: Object To provide a technique for authenticating a communication partner using an electronic certificate containing personal information. Solving Means When a client apparatus receives a request for an electronic certificate from a server apparatus, the server apparatus reads a client certificate containing personal information and a server public key of the server apparatus from a storage unit and encrypts the client certificate using the server public key. The client apparatus also creates a temporary electronic certificate by setting, in a basic field of an electronic certificate, a predetermined item indicating that the electronic certificate is a temporary electronic certificate and by setting the client certificate having been encrypted in an extension field of the electronic certificate. Then, the client apparatus sends the temporary electronic certificate to the server apparatus.Type: ApplicationFiled: April 26, 2012Publication date: October 25, 2012Applicant: International Business Machines CorporationInventors: Takashi Miyamoto, Kohsuke Okamoto
-
Patent number: 8296237Abstract: An information service system works to record or print out, at a fee, information contents downloaded from Web servers, information received from facsimiles and information carried on portable storage mediums. The system includes a recording part which records, duplicates and prints out the image of digitized information, an information accumulating part which accumulates information by making relation with users, a user authenticating part which receives user authentication information and authenticates the legitimacy of the user, a fee calculating part which calculates the fee for information recording, a payment reception part which receives the payment of fee by the user, and a management part which manages the charging data and payment data. The recording part records the supplied information only after authentication of user legitimacy and payment of fee by the user.Type: GrantFiled: December 31, 2007Date of Patent: October 23, 2012Assignee: Fuji Xerox Co., Ltd.Inventors: Toshiki Okiyama, Akira Akiyama, Tadamitsu Miyawaki, Hiroshi Oshino, Shinji Akahira, Hiroaki Anraku
-
Patent number: 8296829Abstract: A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one broad aspect, certificate identification data that uniquely identifies a certificate associated with a message is generated. The certificate identification data can then be used to determine whether the certificate is stored on a computing device. Only the certificate identification data is needed to facilitate the determination alleviating the need for a user to download the entire message to the computing device in order to make the determination.Type: GrantFiled: March 17, 2009Date of Patent: October 23, 2012Assignee: Research In Motion LimitedInventors: Neil P. Adams, Michael S. Brown, Herbert A. Little
-
Patent number: 8291224Abstract: An administrator installs a key management agent on a previously approved client machine. The agent is started on the client machine, which posts requests for keys to a central key management service. The central key management service logs requests posted to it by clients, and checks for existing pre-approval records. If none are found, a message is typically sent to an approver for the requesting client machine. When a request is verified as approved, the request is flagged for further processing. The supported systems continuously or periodically look for records flagged for processing, use requests to generate keys and other appropriate elements for the requesting client machine, and post keys and other elements to the key management database. The key management agent polls the central key management service periodically until finding the expected key file, which it downloads and installs into a protected file location on the client machine.Type: GrantFiled: November 8, 2005Date of Patent: October 16, 2012Assignee: Wells Fargo Bank, N.A.Inventors: Douglas Pelton, Waeed Sherzai, Catherine Li, Ruven Schwartz
-
Patent number: 8291225Abstract: An apparatus in a system which includes at least a high-level apparatus and a plurality of low-level apparatuses, said apparatus being one of the low-level apparatuses. The apparatus includes a storage unit configured to store an individual certificate set and a common certificate set and a communication unit configured to transmit own authentication information to the high level apparatus to allow the high level apparatus to perform decryption to authenticate the validity of the apparatus.Type: GrantFiled: December 3, 2009Date of Patent: October 16, 2012Assignee: Ricoh Company, Ltd.Inventor: Tatsuya Imai