By Generation Of Certificate Patents (Class 713/175)
-
Patent number: 7877784Abstract: A certificate registry system is configured to issue authentication certificates issued to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates. Each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers. Each one of the authentication certificates is devoid of linkage between the corresponding one of the information providers and domain name information thereof. The authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located.Type: GrantFiled: June 7, 2007Date of Patent: January 25, 2011Assignee: Alcatel LucentInventors: Stanley Chow, Jeff Smith, Christophe Gustave
-
Patent number: 7877813Abstract: A copy protection method and a copy protection system are disclosed. The system includes a private key verifier receiving a media certificate that includes a private key identification of a compliant playing device and searching for an actual private key corresponding to the private key identification, an intermediate key decryptor receiving an encrypted intermediate key and decrypting the intermediate key with the actual private key, a media key decryptor obtaining an original media key by decrypting the decrypted intermediate key with a media identification; and a media data decryptor receiving an encrypted media data set and decrypting the media data set with the original media key. The method and system of the present invention are applicable to all types of digital media data, and it makes no assumption of any specific media properties.Type: GrantFiled: July 26, 2007Date of Patent: January 25, 2011Assignee: LG Electronics Inc.Inventors: Hyung Sun Kim, Alexandre Stechkine, Byung Jin Kim, Soung Hyun Um
-
Publication number: 20110016324Abstract: A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme.Type: ApplicationFiled: September 28, 2010Publication date: January 20, 2011Applicant: Certicom Corp.Inventor: Scott A. Vanstone
-
Patent number: 7873827Abstract: There is provided a communication systems in which a public key certificate is easily updated. The administration PC transmits SSL communication request to the print server which is searched by the print server search broadcast. If the server certificate (public key certificate) received from the print server at the time of SSL handshake is determined to be likely to expire, the CSR create request and the CSR parameters are transmitted to the print server. The print server creates CSR based on the received CSR parameters, and transmits the CSR to the administration PC. The administration PC transmits the received CSR to the CA. The CA generates the server certificate based on the received, and transmits the CSR to the administration PC 20. The administration PC transmits the certificate install request and the server certificate to the print server. The print server updates the server certificate by installing the received server certificate.Type: GrantFiled: June 29, 2006Date of Patent: January 18, 2011Assignee: Brother Kogyo Kabushiki KaishaInventor: Masafumi Miyazawa
-
Publication number: 20110010554Abstract: A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. For example, when the mobile device is being used to decrypt a cryptographically secured electronic message, and a problem is encountered, program logic of the device provides the user with (1) an indication of exactly what problem is preventing opening of the message, for example, a required cryptographic key is not available; (2) an indication of exactly what may be done to overcome the problem, for example, what utilities should be run on the device; and (3) exactly what data, if any, needs to be downloaded to the device, for example, what cryptographic keys should be downloaded.Type: ApplicationFiled: September 20, 2010Publication date: January 13, 2011Applicant: RESEARCH IN MOTION LIMITEDInventors: Neil P. Adams, Michael S. Brown, Herbert A. Little, Michael G. Kirkup, Michael K. Brown
-
Publication number: 20110010553Abstract: A system and method of providing on-line verification of various credentials without requiring second site authentication utilizes protocols and cryptography to assure customers (generally referred to hereinafter as “users”) that they are dealing with a person (or organization) that can present multiple, non-repudiable proof of their identification. The system is launched directly from the user's browser such that certificate verification is performed “locally”, without needing to go out and obtain information from a second web site. The system is based upon the creation of a new MIME (i.e. Multipurpose Internet Mail Extensions) type that is employed by the user's browser and utilizes public keys associated with the credentialing organizations in combination with a public key of the verification organization.Type: ApplicationFiled: July 2, 2010Publication date: January 13, 2011Inventor: Robert S Cahn
-
Patent number: 7870385Abstract: A method of controlling presentation of content on a media storage device is described. The method is comprised of verifying the presence of a media presentation mechanism and a usage compliance mechanism on a computer system operated by a recipient to whom the media storage device is distributed. The usage compliance mechanism includes a file system filter driver for controlling data reads associated with the computer readable media. The media presentation mechanism is communicatively coupled with the usage compliance mechanism. The present method further includes the file system driver performing a first decryption of the computer readable media. The present method further includes the media presentation mechanism performing a second decrypting of the computer readable media concurrent with presenting the computer readable media to the recipient.Type: GrantFiled: February 3, 2004Date of Patent: January 11, 2011Assignee: Music Public Broadcasting, Inc.Inventors: Hank Risan, Edward Vincent Fitzgerald
-
Publication number: 20110004763Abstract: A certificate validation method for causing a certificate validation server to receive a certificate validation request from a given terminal device, build a certification path of from a first certificate authority (CA) to a second CA, perform validation of the certification path, and send a validation result to the terminal which issued the certificate validation request is disclosed. The validation server detects either a key update of any given CA or a compromise of the given CA, acquires a certificate of relevant CA and first certificate status information and second certificate status information, stores the acquired information in a storage unit or, alternatively, updates the information stored in the storage based on the acquired information, and performs the building of a certification path and validation of the certification path by use of the information of the storage unit.Type: ApplicationFiled: June 29, 2010Publication date: January 6, 2011Inventors: Akane SATO, Takahiro Fujishiro, Shingo Hane, Yoko Hashimoto, Masahiko Furuya, Masami Ogawa
-
Publication number: 20110004753Abstract: In a certificate generating/distributing system, an authentication apparatus includes token transmitting means transmitting, to a service mediating apparatus, a certificate generation request token, which is information corresponding to a first certificate valid in the service mediating apparatus, together with the first certificate. The service mediating apparatus includes mediating apparatus token forwarding means forwarding the certificate generation request token to a service providing apparatus. The service providing apparatus includes certificate requesting means transmitting the certificate generation request token to the authentication apparatus when requesting a second certificate valid in the service providing apparatus. The authentication apparatus includes certificate transmitting means transmitting, to the service providing apparatus , the second certificate generated based on the first certificate in response to the request of the second certificate by the certificate requesting means.Type: ApplicationFiled: September 17, 2008Publication date: January 6, 2011Inventors: Hidehito Gomi, Makoto Hatakeyama
-
Patent number: 7865720Abstract: A method and system for supporting multiple digital certificate status information providers are disclosed. An initial service request is prepared at a proxy system client module and sent to a proxy system service module operating at a proxy system. The proxy system prepares multiple service requests and sends the service requests to respective multiple digital certificate status information providers. One of the responses to the service requests received from the status information providers is selected, and a response to the initial service request is prepared and returned to the proxy system client module based on the selected response.Type: GrantFiled: March 20, 2003Date of Patent: January 4, 2011Assignee: Research In Motion LimitedInventors: Herbert A. Little, Stefan E. Janhunen, Dale J. Hobbs
-
Patent number: 7864957Abstract: Methods and apparatus in accordance with the present invention are operable to carry out certain functions including: receiving an encrypted program at a processing apparatus; transmitting a machine ID over a network to an administrator; receiving registration data over the network from the administrator in response to the machine ID; transmitting the registration data over the network to a distributor; receiving an encrypted decryption key and an encrypted virtual ID at the processing apparatus over the network from the distributor in response to the registration data; decrypting the encrypted decryption key using the virtual ID, and decrypting the encrypted program using the decryption key; re-encrypting the program using the virtual ID; and storing the encrypted virtual ID and the re-encrypted program in a first storage device.Type: GrantFiled: December 11, 2002Date of Patent: January 4, 2011Assignee: Sony Computer Entertainment Inc.Inventors: Muneki Shimada, Toyoshi Okada, Yousuke Kimoto, Kazuhiro Kanee, Kenjiro Komaki
-
Publication number: 20100332838Abstract: A method for authenticating a document comprises obtaining the contents of a document, obtaining biometric characteristics from an individual, forming a message based on the contents of the document and the biometric characteristics of the individual, generating a digital signature based on the message and a key, and writing the digital signature to an Radio Frequency Identification (RFID) tag affixed to the document.Type: ApplicationFiled: June 9, 2008Publication date: December 30, 2010Applicant: NEOLOGY, INC.Inventors: Jeffrey Zhu, Jun Liu
-
Publication number: 20100332839Abstract: A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.Type: ApplicationFiled: June 25, 2010Publication date: December 30, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Roy DARE, John OWLETT, Imran Faiz TYABJI
-
Patent number: 7861077Abstract: A secure user authentication system, operable over a client-server communications network to authenticate a system user. The system includes an application server which includes a site which is able to be enabled, and an authentication server, which is able to enable the application server site. The authentication server includes a core database, and receives and stores user authentication-enabling data in the core database. The system further includes a client, and a client program which is able to be actuated in the client. The client program includes the user authentication-enabling data. Upon actuation, the client program automatically directly connects to the authentication server, and sends the client authentication-enabling data to the authentication server, for secure user authentication by the authentication server.Type: GrantFiled: October 6, 2006Date of Patent: December 28, 2010Assignee: Multiple Shift Key, Inc.Inventor: Raymond J. Gallagher, III
-
Patent number: 7859412Abstract: A module monitoring system and related method includes a plurality of nodes and a server component. Each node of the plurality of nodes is in operative communication with a network and with at least one RFID attached to a module. Each node of the plurality of nodes is a node type and at least two nodes of the plurality of nodes are different node types. A node of the at least two nodes is a printer-based node and is associated with a printing machine. The node associated with the printing machine is also in operative communication with a local RFID tag attached to a corresponding module. The server component includes a network interface and an analysis component. The network interface is in operative communication with the network and communicates with the at least two nodes utilizing the network.Type: GrantFiled: June 16, 2008Date of Patent: December 28, 2010Assignee: Xerox CorporationInventors: Pravin N. Kothari, Mark Steven Amico, Paul Allen Hosier, Khan Lutful Kabir
-
Patent number: 7861084Abstract: A method of authenticating data transmitted in a digital transmission system, in which the method comprises the steps, prior to transmission, of determining at least two encrypted values for at least some of the data, each encrypted value being determined using a key of a respective encryption algorithm, and outputting said at least two encrypted values with said data.Type: GrantFiled: July 19, 2006Date of Patent: December 28, 2010Assignee: THOMSON Licensing S.A.Inventors: Jean-Bernard Gerard Maurice Beuque, Philippe Poulain
-
Patent number: 7861079Abstract: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.Type: GrantFiled: September 21, 2007Date of Patent: December 28, 2010Assignee: International Business Machines CorporationInventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
-
Publication number: 20100325427Abstract: An approach is provided for authenticating a mobile device. A mobile device initiates transmission of a request to an authentication platform for generating a public-key certificate to access a service from the mobile device. The mobile device receives an identity challenge and responds by initiating transmission of a tag specific to the mobile device to the authentication platform. The authentication platform uses the tag to generate a public-key certificate.Type: ApplicationFiled: June 22, 2009Publication date: December 23, 2010Applicant: Nokia CorporationInventors: Jan-Erik Ekberg, Kari Kostiainen, Pekka Laitinen, Ville Aarni, Miikka Sainio, Niklas Von Knorring, Dmitry Kolesnikov, Atte Lahtiranta
-
Publication number: 20100325437Abstract: A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.Type: ApplicationFiled: June 28, 2010Publication date: December 23, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Roy DARE, John OWLETT, Imran Faiz TYABJI
-
Publication number: 20100325438Abstract: Systems and methods for binding a smartcard and a smartcard reader are provided. A smartcard is provision to store a first set of credentials for use in traditional transactions such as at a brick and mortar retail store and a second set of credentials for use when performing a transaction using a smartcard reader associated with a user such as an on-line transaction. The user smartcard reader registers with a smartcard issuer server by cryptographically authenticating a secure processor associated with the smartcard reader. As a result of the registration, the secure processor obtains a set of private keys associated with the second set of credentials. When a request for a authorizing a transaction via the user's smartcard reader is received, the smartcard reader cryptographically authenticates itself to the smartcard using a private key associated with a credential to be used to authorize the transaction.Type: ApplicationFiled: August 9, 2010Publication date: December 23, 2010Applicant: Broadcom CorporationInventor: Mark Buer
-
Publication number: 20100325654Abstract: A method for registering a first device with a second device over a wireless network includes receiving a registration request from the first device and sending one or more user input choices to the first device. The user input choices each specify a user input action available though a user interface associated with the second device. A device description describing the second device is sent to the first device in a manner that allows it to be presented to the user by the first device. At least one of the user input actions are sequentially received through the user interface in response to instructions provided to the user by the first device. The first device is registered with the second device if the user input actions received by the second device correctly reflect the instructions provided to the user by the first device.Type: ApplicationFiled: June 16, 2010Publication date: December 23, 2010Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Paul Moroney, Jiang Zhang
-
Publication number: 20100318803Abstract: This invention describes a system and methods for media content subscription service distribution; typical services include cable television, premium content channels, pay-per-view, XM radio, and online mp3 services. Subscribers use portable electronic devices to store digital certificates certifying the subscriber's privileges and an assigned public key. The devices can communicate with specially enabled televisions, radios, computers, or other media presentation apparatuses. These, in turn, can communicate with central databases owned by the provider, for verification purposes. Methods of the invention describe media content subscription service privilege issuing and use. The invention additionally describes methods for protecting media content transmitted to users with a variety of encryption schemes.Type: ApplicationFiled: August 23, 2010Publication date: December 16, 2010Inventors: David C. Russell, Barry W. Johnson, Kristen R. Olvera
-
Patent number: 7853790Abstract: A method includes issuing a digital certificate to a licensee, the digital certificate identifying a licensed product and the licensee to enable the licensee to enable the licensed product. The method involves receiving a request to enable the licensed product from an entity, the request including the digital certificate and determining whether the entity is the licensee of the licensed product based on the digital certificate. A system includes a relational structure having associations among authorized entities and digital certificates within an organization. Each to digital certificate identifies a licensed product licensed to the organization. A certificate distribution module distributes the digital certificates to associated authorized entities.Type: GrantFiled: March 19, 2004Date of Patent: December 14, 2010Assignee: Microsoft CorporationInventors: Henry P. Gabryjelski, Wesley Miller
-
Patent number: 7853791Abstract: A system for digital certificate direction is provided. The system includes an application server having one or more applications and a user computer. The system also includes a certificate optional server that is operable to communicate with the user computer regarding access to the one or more applications. The certificate optional server is operable, when the user computer communication is associated with a digital certificate, to direct the user computer to a digital certificate mandated computer to promote access to the one or more applications. When the user computer communication is not associated with the digital certificate, the certificate optional server is operable to direct the user computer to a certificate generator.Type: GrantFiled: May 16, 2006Date of Patent: December 14, 2010Assignee: Sprint Communications Company L.P.Inventors: Shrikant D. Jannu, Richard R. Perez, Keyang Wang
-
Patent number: 7853995Abstract: An integrated authentication service is described which may receive a bundled request from one or more clients. One or more of the described techniques may be utilized to provide, in response to a single bundled request, a token for proof of identity and a certificate for establishing secure communications.Type: GrantFiled: November 18, 2005Date of Patent: December 14, 2010Assignee: Microsoft CorporationInventors: Trevin Chow, Winfred Wong, Yordan Rouskov, Kok Wai Chan, Wei Jiang, Colin Chow, Sanjeev Nagvekar, Matt Sullivan, Dilip Pai, Kalyan Sayyaparaju, Avinash Belur
-
Publication number: 20100306546Abstract: A method of providing certificate issuance and revocation checks involving mobile devices in a mobile ad-hoc network (MANET). The wireless devices communicate with each other via Bluetooth wireless technology in the MANET, with an access point (AP) to provide connectivity to the Internet. A Certificate authority (CA) distributes certificates and certification revocation lists (CRLs) to the devices via the access point (AP). Each group of devices has the name of the group associated with the certificate and signed by the CA. A device that is out of the radio range of the access point may still connect to the CA to validate a certificate or download the appropriate CRL by having all the devices participate in the MANET.Type: ApplicationFiled: August 6, 2010Publication date: December 2, 2010Applicant: CERTICOM CORP.Inventors: William Daniel Willey, Simon Blake-Wilson
-
Publication number: 20100306545Abstract: A communication apparatus includes: a first storage unit storing a certification authority certificate; a verification unit verifying an electronic signature attached to a first electronic mail received by a receiving unit from a mail server based on the certification authority certificate; an output unit outputting the first electronic mail when a verification result of the verification unit is positive; a deletion unit deleting the first electronic mail from the mail server; a notification unit notifying a user of information regarding a specific certification authority when a specific certification authority certificate is not stored in the first storage unit; an acquiring unit acquiring the specific certification authority certificate; and a storage control unit storing the acquired specific certification authority certificate. The receiving unit again receives the first electronic mail.Type: ApplicationFiled: March 22, 2010Publication date: December 2, 2010Applicant: BROTHER KOGYO KABUSHIKI KAISHAInventor: Takao SEKI
-
Patent number: 7844816Abstract: A public key (PK) framework for allowing a relying party to act as a trust anchor to authenticate a subscriber. The framework provides a directory system under the control of the relying party, wherein the directory system includes: a storage system for storing certificates received from subscribers in a database, wherein the certificates are issued by a plurality of different certificate authorities; a management system for managing records in the database associated with subscribers; and a validation system that allows the relying party to retrieve certificates from the database in order to authenticate subscribers.Type: GrantFiled: June 8, 2005Date of Patent: November 30, 2010Assignee: International Business Machines CorporationInventor: David Karchov
-
Patent number: 7844832Abstract: A system and method for authenticating the source of, protecting the contents of, and ensuring the integrity of information. The information may be any digital information which can be stored in a computer file. The information is encapsulated in a computer file which also includes the biometrically verified identity of the person who packaged the information. The contents of the computer file are encrypted, and a unique message digest value is generated and stored in a secure central database. The message digest value functions as the digital signature of the encrypted information, and is used to ensure the integrity of the information.Type: GrantFiled: November 29, 2006Date of Patent: November 30, 2010Inventors: Ron L. Nation, Rodney P. Meli, William T. Garner
-
Publication number: 20100299694Abstract: A receiver and a method of processing a data broadcasting signal are disclosed. According to the present invention, a storage area is created, with a transfer subject authentication of a permissible application as identification information of a storage area owner. If a received application tries to have access to the storage area, a transfer subject authentication of the application is compared with the identification information of the storage area owner. If they are identical to each other, the received application is permitted to have access to the storage area.Type: ApplicationFiled: June 13, 2008Publication date: November 25, 2010Inventor: Sung Min Lee
-
Publication number: 20100299738Abstract: Techniques are described herein for managing access to services (e.g., Web sites, applications, results of executable operations, etc.) that are provided by relying parties. A relying party is a processing system that relies on an identity provider to authenticate an entity (e.g., user or software application) that attempts to access a service provided by the relying party. The identity provider is a processing system that is configured to perform authentication and authorization operations with respect to the entity. The identity provider generates a claim that indicates access rights of the entity with respect to the relying party. The identity provider provides the claim to the relying party via a user system or via a direct or indirect link that bypasses the user system. The relying party determines whether to allow the entity to access the service based on the access rights indicated by the claim.Type: ApplicationFiled: May 19, 2009Publication date: November 25, 2010Applicant: Microsoft CorporationInventor: Mark Wahl
-
Patent number: 7840544Abstract: One embodiment of the present invention sets forth a method for storing data collected from a network. The method may involve storing collected data only when a change relative to a previous value of the data is detected. For some embodiments, string data may be converted to numeric values, allowing the same change detection mechanisms to be used for both string and numeric values.Type: GrantFiled: December 4, 2007Date of Patent: November 23, 2010Assignee: Cisco Technology, Inc.Inventor: Timothy Evens
-
Patent number: 7840637Abstract: An example embodiment of a includes a Home Page, a Web Presence Tool Page, and a Product and Community Forum which is created and maintained by a Hosting Provider. The Home Page may be made accessible to Hosting Customers and Partners and is an ideal location for placement of ads since all members of the Web Hosting Community are funneled through this Web page. The Web Presence Tool Page may display information generated by a Partner regarding the Partner's application which may be viewed by the Hosting Customers. The Product and Community Forum may allow the Hosting Customers to share information regarding all the applications with other Hosting Customers.Type: GrantFiled: February 21, 2007Date of Patent: November 23, 2010Assignee: The Go Daddy Group, Inc.Inventors: Warren Adelman, Michael Chadwick
-
Patent number: 7840995Abstract: A storage gateway is employed as part of a security enhancing protocol in a data processing system which includes at least one metadata controller node and at least one application node which is granted a time limited access to files in a shared storage system. The gateway is provided with information as to data blocks to which access is to be allowed and also with information concerning the duration of special access granted to a requesting application node. This insures that metadata cannot be improperly used, changed or corrupted by users operating on an application node.Type: GrantFiled: October 29, 2008Date of Patent: November 23, 2010Assignee: International Business Machines CorporationInventors: Robert J. Curran, Roger L. Haskin
-
Patent number: 7835725Abstract: A terminal B, which is to enter a network, transmits a beacon including a network identifier and an operation mode of the terminal B. As the network identifier, the terminal identifier of a terminal that has issued an attribute certificate used for connecting the terminal B to the network can be used. Upon receiving the beacon, a terminal A checks whether the operation mode of the terminal A coincides with the operation mode contained in the beacon. The terminal A then sends an authentication request to the terminal B by providing an attribute certificate that matches the network identifier contained in the beacon.Type: GrantFiled: May 1, 2007Date of Patent: November 16, 2010Assignee: Sony CorporationInventors: Hideyuki Suzuki, Shin Saito
-
Patent number: 7836155Abstract: A method for assigning a global address to a node in an ad-hoc network is provided. A joining node to the ad-hoc network generates a local address using its MAC address. The joining node inquires of its one-hop nodes about whether they occupy a local address that is the same as the generated local address. When the joining node is informed that there are no nodes occupying the same local address, it generates a global address using the generated local address and a global prefix provided from neighbor nodes. The joining node inquires of an Internet gateway about whether the generated global address is currently used. When the joining node is informed that there are no nodes currently using the same global address, the joining node is assigned the generated global address. Further, the joining node and the Internet gateway communicate messages via a relay node using a tunneling.Type: GrantFiled: January 20, 2006Date of Patent: November 16, 2010Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-lim Kang, Young-sung Roh, Jae-hoon Kim, Young-gon Choi, Jung-ho Kim, Shubhranshu Singh, Jae-pil You, Dong-keun Lee, Hyun-sik Kang
-
Patent number: 7831833Abstract: A secure mechanism for transparent key recovery for a user who has changed authentication information is disclosed. A password manager agent intercepts requests by a user to access secure resources that require user credentials. Upon detecting changed authentication information for the user, the password manager agent automatically regenerates the components of a cryptographic key associated with the user that was previously used to encrypt user credentials for the user and then destroyed. After regeneration of the original cryptographic key, the password manager agent uses the key to decrypt the user credentials necessary for the requested application. The regenerated key is then destroyed and the user credentials are re-encrypted by the password manager agent using a new cryptographic key associated with the user made up of multiple components.Type: GrantFiled: May 6, 2005Date of Patent: November 9, 2010Assignee: Citrix Systems, Inc.Inventor: Timothy R. Gaylor
-
Patent number: 7831831Abstract: An authentication communication system is capable of storing information relating to revoked devices in less area than is conventionally required. A computer unit stores in advance revocation information that indicates at least one revoked apparatus, and when authenticating a driver unit judges, based on the revocation information, whether or not the driver unit is revoked. The computer unit prohibits communication with the driver unit when the driver unit is judged to be revoked, and communicates with the driver unit when the driver unit is judged not to be revoked.Type: GrantFiled: May 8, 2003Date of Patent: November 9, 2010Assignee: Panasonic CorporationInventors: Motoji Ohmori, Toshihisa Nakano, Takahiro Nagai, Hideshi Ishihara, Makoto Tatebayashi
-
Patent number: 7831828Abstract: A system and method for securely authenticating a data exchange session with an implantable medical device is presented. A crypto key uniquely associated with an implantable medical device is defined to authenticate data during a data exchange session. A secure connection is established from an external source with a secure key repository securely maintaining the crypto key. Authorization to access data on the implantable medical device is authenticated by securely retrieving the crypto key from the secure key repository.Type: GrantFiled: March 15, 2004Date of Patent: November 9, 2010Assignee: Cardiac Pacemakers, Inc.Inventors: Jeffrey A. Von Arx, Scott J. Healy, Scott Vanderlinde
-
Patent number: 7827399Abstract: Briefly, an embodiment of a method of certificate path processing is disclosed, which includes the following. A certificate is accessed. A first set of preferences is searched. Various preferences correlated to the certificate are identified. The correlated preferences include a preference set which is digitally or logically compatible with the specific computing system performing the processing. The preferences correlating to the specific computing system are merged with another set of preferences to form a third preference set.Type: GrantFiled: July 27, 2005Date of Patent: November 2, 2010Assignee: Adobe Systems IncorporatedInventors: Andrei Sheretov, Sunil C. Agrawal
-
Patent number: 7827401Abstract: We propose new systems for certificate revocation that are more economical and efficient than traditional ones. We also point out what we believe to be a structural problem in traditional public-key infrastructures, and various ways to solve it.Type: GrantFiled: October 11, 2007Date of Patent: November 2, 2010Assignee: Corestreet Ltd.Inventor: Silvio Micali
-
Publication number: 20100275024Abstract: A method and system of displaying information indicators that help provide security assurances to consumers. The method works by having a plug-in or browser extension that determines the URL of a browsed to website. The browser then initiates a secure connection to the domain associated with the URL of a browsed-to website. The plug-in can then show an indicator based on whether or not a digital certificate exists. If desired, the plug-in can perform further checks to ensure the validity and authenticity of the certificate. The information indicators can be static, pre-selected by the program, or selected by the end user.Type: ApplicationFiled: April 7, 2008Publication date: October 28, 2010Inventor: Melih Abdulhayoglu
-
Patent number: 7822988Abstract: In accordance with various aspects, the present invention relates to methods and systems for sending an identity information document comprising selecting identity information from a self-identity information store for inclusion in the identity information document. The selected identity information is read from a self-identity information store. The identity information document is generated to include the selected identity information and one or more keys, and signed using a key associated with one of the keys included in the identity information document. The identity information document is then sent to a recipient. Receiving an identity information document comprises receiving a signed identity information document from an originator. A determination is made as to whether identity information in the identity information document is reliable. The identity information is saved in a recognized identity information store if the identity information is determined to be reliable.Type: GrantFiled: October 23, 2003Date of Patent: October 26, 2010Assignee: Microsoft CorporationInventors: Kim Cameron, Arun Nanda, Don Hacherl, Murli Satagopan, Stuart Kwan, Colin Brace, Walter Smith, Melissa Dunn
-
Patent number: 7822984Abstract: Portal, and a method and program executed by a portal. The portal receives a data request and a public certificate from a user. The portal transmits the data request and the public certificate to a content supplier. The portal receives confidential data and non-confidential data responsive to the data request. The confidential data is received in encrypted form together with an identifier identifying the confidential data as encrypted. The non-confidential data is received in unencrypted form. The portal formats the non-confidential data in accordance with a specification previously provided by the user. The portal transmits the encrypted confidential data, the identifier and the formatted non-confidential data to the user.Type: GrantFiled: September 27, 2005Date of Patent: October 26, 2010Assignee: International Business Machines CorporationInventors: Pablo Martinez Martin, Manuel R. Rodriguez
-
Patent number: 7822985Abstract: A method for real-time validation of an electronically signature generated onboard a mobile system. The method includes maintaining a ground mobile user account management (GMUAM) module user database to have up-to-date authorized user account information. The GMUAM is hosted by a stationary central computer system (CCS). The method additionally includes transferring the up-to-date authorized user account information stored on the GMUAM user database to a mobile user account management (MUAM) module user database, thereby updating the MUAM user data base with up-to-date authorized user account information. The MUAM module is included in an onboard computer system (OCS) hosted by the mobile system. The method further includes evoking a signature validator module communicatively connected to the MUAM module to access the MUAM database and verify whether user account information included in an electronic signature initiated by a secure data application (SDA) is authorized user account information.Type: GrantFiled: August 21, 2006Date of Patent: October 26, 2010Assignee: The Boeing CompanyInventors: Timothy W. Anstey, David L. Allen, Steven J. Yukawa, Rajit Jain
-
Patent number: 7822987Abstract: A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme.Type: GrantFiled: November 26, 2008Date of Patent: October 26, 2010Assignee: Certicom Corp.Inventor: Scott A. Vanstone
-
Patent number: 7822690Abstract: According to the present invention, there is provided an electronic document processing system and method including an electronic document generation mechanism, an encrypted digital certificate generator, a tool for coordinating the processing of electronic documents, a packaging mechanism for finalizing and authenticating electronic documents, a tracking log for recording relevant electronic document information, and a transferring protocol for transferring the ownership of electronic documents. The present invention also provides an electronic authentication system including an electronic document authentication watermark seal or signature line for confirming a document's signing within the view.Type: GrantFiled: January 18, 2005Date of Patent: October 26, 2010Inventors: Paul Rakowicz, Robert Shanahan
-
Patent number: 7822986Abstract: A method enabling a personal computer to be authenticated by a server is provided. The method comprises the step, which includes for the user in launching the execution of a log-on procedure software, introducing personal identifiers providing access to a signature private key for long-term use relative to the duration of the session. The log-on procedure software produces: identification data of the session Id, a public ephemeral module, a public exponent and at least a pair of ephemeral pubic numbers and ephemeral private numbers related by a generic equation of the type: G=Qv (mod n) or G×Qv=1 (mod n), an ephemeral certificate linking, by means of said signature private key, Id and public ephemeral module. The public ephemeral module is of reduced size relative to the signature private key.Type: GrantFiled: July 23, 2008Date of Patent: October 26, 2010Inventor: Louis Guillou
-
Publication number: 20100268650Abstract: A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.Type: ApplicationFiled: June 25, 2010Publication date: October 21, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter Roy DARE, John OWLETT, Imran Faiz TYABJI
-
Publication number: 20100268943Abstract: A method and system for authentication is provided. A central node for issuing certificates to a plurality of nodes associated with the central node in a network is also provided. The central node receives a first key from at least one node from among the plurality of nodes and generates a second key based on the received first key and generates a certificate for the at least one node. The generated certificate is transmitted to the at least one node.Type: ApplicationFiled: April 21, 2010Publication date: October 21, 2010Applicant: University of MarylandInventors: Ayan Roy-Chowdhury, John Baras