By Generation Of Certificate Patents (Class 713/175)
  • Publication number: 20040073798
    Abstract: Techniques are described for distributed production of controlled certificates, such as license plates for motor vehicles, in a secure manner. Controlled certificates may be printed at a local branch office subject to the control of a client computer. A server computer may regulate the operations of the client computers at the branch offices. The production system includes any of several security features to deter forgery and counterfeiting. For example, the security components that make up a finished controlled certificate may be separately secured with unique security elements. The finished controlled certificate may also have a unique security element.
    Type: Application
    Filed: June 10, 2003
    Publication date: April 15, 2004
    Inventors: Thomas F. Look, Liu Yubao, Mao Jianyong, Zhang Wei, Craig A. Schmidt, Qui Tian, Chen Wei, Huang Tien-Hsiagn, Ji Hong, Robert T. Krasa, Jeremy P. Gundale
  • Patent number: 6718470
    Abstract: A system and method grants security privilege in a communication system by providing privilege test criteria data for a subscriber unit so that the subscriber unit or some other entity can select among subscriber privilege data based on the privilege test criteria data, so that only the necessary privilege information is communicated between the relying party and the subscriber unit of interest. A privilege data selector selects, for example, among a plurality of attribute certificates associated with a selected subscriber unit or among sets of privilege data within an attribute certificate, the certificate (or certificates) that matches the privileged test criteria data. This pre-selected certificate is then communicated for use by the relying unit and verified that it meets the test selected by the relying party unit.
    Type: Grant
    Filed: June 5, 1998
    Date of Patent: April 6, 2004
    Assignee: Entrust Technologies Limited
    Inventor: Carlisle Adams
  • Publication number: 20040064701
    Abstract: The invention relates to a method and device for authenticating a user of an electronic device in usage contexts being able to use in said electronic device by using a usage context identifier, wherein in the method, a usage context being used in the device is selected by the user. The method comprising maintaining a centralized register of the usage context s available for the user in the device and the user profiles associated to said usage contexts, the device identifying an usage context selected by the user, selecting at least one user profile in response to the identified service, and authenticating the user in the selected usage context on the basis of the selected user profile.
    Type: Application
    Filed: June 27, 2003
    Publication date: April 1, 2004
    Applicant: NOKIA CORPORATION
    Inventor: Niall O'Donoghue
  • Publication number: 20040054913
    Abstract: Digital signatures are at best only as good as the digital certificates that are used to create them, and digital identity tokens that are based on digital certificates are at best only as good as the digital certificates therein. Digital certificates are at best only as good as the level of certainty to which the certificate can be associated with the holder. It follows then that digital signatures and digital ID tokens are at best only as good as the level of certainty to which the certificate involved can be associated with the holder. Presented here are: a system for issuing digital certificates wherein biometric data of the certificate requester is irrefutably bound to the issued certificate, and a system for validating the bound biometric data while any validation operation which involves the issued certificate is performed.
    Type: Application
    Filed: February 28, 2002
    Publication date: March 18, 2004
    Inventor: Mark Brian West
  • Publication number: 20040054907
    Abstract: A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to the particular computing platform (10). The manufacturer certificate may also store configuration parameters and device identification numbers. A secure run-time platform data checker (200) and a secure run-time checker (202) check the system firmware during operation of the computing platform (10) to ensure that the system firmware (30) or information in the manufacturer certificate (36) has not been altered. Application software files (32) and data files (34) are bound to the particular computing device (10) by a platform certificate (38). A key generator may be used to generate a random key and an encrypted key may be generated by encrypting the random key using a secret identification number associated with the particular computing platform (10). Only the encrypted key is stored in the platform certificate (36).
    Type: Application
    Filed: July 14, 2003
    Publication date: March 18, 2004
    Inventors: Alain Chateau, Jerome Azema, Constantin Haidamous
  • Patent number: 6704787
    Abstract: A system or method for an access code issuer to receive an on-line application including certain personal information from a user of a computer network such as the Internet, to independently operatively connect to a database and obtain or verify demographic and additional personal information regarding the user, and issue an access code to the user. The user enters this access code when accessing various nodes or websites of a plurality of affiliated content providers. The content providers obtain or verify the user's demographics by operatively connecting to the access code issuer, thereby obtaining or verifying the demographics of the visitor to its site without requiring the visitor to enter his or her demographic information or to independently provide proof thereof to the content provider.
    Type: Grant
    Filed: December 3, 1999
    Date of Patent: March 9, 2004
    Assignee: Intercard Payments, Inc.
    Inventor: Timothy F. Umbreit
  • Publication number: 20040039937
    Abstract: A credential management device has a protected domain and a credential manager to perform credential transactions. A credential transaction may comprise determining if a platform is operating in a trusted mode and releasing an operation credential if the platform is operating in a trusted mode. A credential transaction may comprise validating incoming credentials from other platforms.
    Type: Application
    Filed: August 20, 2002
    Publication date: February 26, 2004
    Applicant: Intel Corporation
    Inventors: Selim Aissi, Ned McArthur Smith, Willard M. Wiseman
  • Publication number: 20040039911
    Abstract: To implement a system in which content usage conditions can be upgraded without the need for a service provider to control content-usage rights of a user. In the system in which encrypted content is distributed and is allowed to be utilized only by authorized users, the service provider receives a content usage-right certificate from the user, and on the condition that it is determined that data is not tampered with by verifying a digital signature of an issuing entity of the content usage-right certificate, the service provider obtains user information and content purchase information of the user from the content usage-right certificate, and performs upgrade processing by, for example, changing the usage conditions. It is thus possible to change the content usage conditions without the need for the service provider to possess usage control data.
    Type: Application
    Filed: September 8, 2003
    Publication date: February 26, 2004
    Inventors: Makoto Oka, Yoshihito Ishibashi, Hiroshi Abe, Noboru Shimada, Masahiko Enari, Kenji Yoshino
  • Publication number: 20040034790
    Abstract: A device to validate security credentials is disclosed. The device comprises a credential validation module to recalculate security credentials received in a datagram and to determine if the security credentials are valid. The device may also include a parser to extract the security credentials from the payload data of the received datagram, and a memory to store validated credentials for further use.
    Type: Application
    Filed: August 16, 2002
    Publication date: February 19, 2004
    Applicant: Intel Corporation
    Inventor: Selim Aissi
  • Publication number: 20040030784
    Abstract: The invention discloses a method of displaying a feature relating to a web-page, the method comprising the steps of determining a feature of the web-page from a digital certificate associated with the web-page and displaying the feature. Other related aspects are also disclosed.
    Type: Application
    Filed: December 2, 2002
    Publication date: February 12, 2004
    Inventor: Melih Abdulhayoglu
  • Patent number: 6687825
    Abstract: A data processing system and method are disclosed for protecting data within a hard disk drive included within a data processing system. Data is generated. A signature value is provided which is stored in a signature device. The signature device is capable of being inserted into and removed from a computer system. A textual description of the data is created. The data is encrypted utilizing both the signature value stored on the device and the textual description. The encrypted data is then stored on the hard disk drive. The data processing system does not permanently store encryption keys.
    Type: Grant
    Filed: March 17, 2000
    Date of Patent: February 3, 2004
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Mark Charles Davis, Dhruv Manmohandas Desai, Charles William Kaufman, Hernando Ovies, James Peter Ward
  • Patent number: 6687822
    Abstract: A method for providing publicly verifiable translation certificates comprising the steps of receiving an input encryption having a first secret key; outputting an output re-encryption of the input encryption, the output re-encryption having a second secret key; and generating a translation certificate that proves the input encryption and the output re-encryption are encryptions of an identical message, wherein the first secret key and the second secret key do not need to be, but are allowed to be, equal. This method and system for generating translation certificates in quorum controlled asymmetric proxy encryptions has uses, including but not limited to, Internet applications and specifically to E-mail systems.
    Type: Grant
    Filed: June 11, 1999
    Date of Patent: February 3, 2004
    Inventor: Markus Bjorn Jakobsson
  • Patent number: 6681328
    Abstract: A system and method for authenticating a digital ID can utilize a central switch to transmit data between a network connected to a service provider and a network connected to a digital ID issuer. The system can be configured to provide a “yes/no” authorization or a validation at a selected validation level. The system can receive an encrypted authorization request message, and can generate an encrypted authorization response message. The authorization response message can be used by the service provider to decide whether to provide a service to a digital ID holder.
    Type: Grant
    Filed: October 5, 2000
    Date of Patent: January 20, 2004
    Assignee: MasterCard International Incorporated
    Inventors: Michael D. S. Harris, John Wankmueller
  • Publication number: 20040010698
    Abstract: A digital certificate registration and verification system and method incorporate a unique identifier of a voice biometric data profile from an applicant into a certificate. The profile can subsequently be retrieved and compared to a profile from a party initiating a transaction. Results can be incorporated into a decision as to the authenticity of the party that has initiated the transaction.
    Type: Application
    Filed: May 29, 2003
    Publication date: January 15, 2004
    Inventor: Andrew R. Rolfe
  • Publication number: 20040010696
    Abstract: The present invention relates to methods and systems for establishing trust in an identity of an individual in a transaction with a transacting entity. Trust is based on secure biometric data such as a captured print. In one environment, an individual uses an identification device at or near a terminal to carry out the transaction. For example, the identification device may be coupled to the terminal by a wireless or wired link. The terminal is coupled over a network to an identity service provider and/or the transacting entity.
    Type: Application
    Filed: October 31, 2002
    Publication date: January 15, 2004
    Inventors: Greg Cannon, Walter Guy Scott
  • Publication number: 20040006701
    Abstract: A set of procedures is described which permit signing digital audio recordings by means of private keys, and which permit later authentication of such recordings, for example in a courtroom, in a way that is well suited to comprehension by non-technical personnel. Importantly, the explanation leading to such comprehension does not enable the creation of tampered recordings that would appear to be authentic. The procedures call for signing by trusted and disinterested third parties and for distributing hardware tokens storing various keys and key pairs. The format of the digital audio recordings permits playback on conventional equipment and also on equipment having cryptographic capabilities for authentication.
    Type: Application
    Filed: April 7, 2003
    Publication date: January 8, 2004
    Applicant: ADVANCED DECISIONS INC.
    Inventors: Roman Kresina, Michael Landino
  • Publication number: 20040006695
    Abstract: To provide an improved management structure of memory devices storing service-use applications. A card for a memory device applied to use various services is provided as one child card or more corresponding to each of the services, a parent card-stores data for child-card issue management, and the child-card issue processing is executed based on the parent card, such as parent card authentication. An issue certificate having a parent-card digital signature is stored in the child card, the issue certificate contains a service code and a child-card identification, and thus it becomes possible to confirm a service set in the child card based on the issue certificate as the parent-card signature data.
    Type: Application
    Filed: May 21, 2003
    Publication date: January 8, 2004
    Inventors: Yoshihito Ishibashi, Susumu Kusakabe, Hideaki Watanabe
  • Patent number: 6675296
    Abstract: A certificate issuing apparatus and method creates a new certificate of a differing format from an existing certificate format to facilitate certificate conversion. A certificate converting unit receives first certificate data in a first format and desired certificate format criteria data, such as data representing the format of a certificate to which the first certificate is to be converted. The apparatus and method then generates second certificate data in a second format in response to the desired certificate format criteria data. In one embodiment, this is done using certificate format template data, such as templates representing the format and/or syntax of a plurality of differing certificate formats. The format template data is then mapped so that information from one certificate can be suitably mapped and then placed in a proper format and syntax for a different certificate format.
    Type: Grant
    Filed: June 28, 1999
    Date of Patent: January 6, 2004
    Assignee: Entrust Technologies Limited
    Inventors: Sharon M. Boeyen, James Steven Lloyd, Ronald J. Vandergeest
  • Publication number: 20040003238
    Abstract: A method and apparatus for distribution of digital certificates is disclosed. A limited access to networks by use of existing identity information allows distribution of digital certificates.
    Type: Application
    Filed: June 30, 2002
    Publication date: January 1, 2004
    Inventors: Wai Kwan Mak, Victor C. Robison, Jesse R. Walker
  • Publication number: 20040003252
    Abstract: A vehicle authenticates a component class of a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying an authentic component of the component class. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Ezzat A. Dabbish, Larry C. Puhl
  • Patent number: 6671804
    Abstract: In a cryptographic device (140) storing a number of templates (310), a system and method for supporting authentication services is provided. The cryptographic device (140) receives inputs representing a request for authentication services. The cryptographic device (140) then compares the syntax of the input to the syntactic constraints defined in one of the templates (310), where each template (310) includes syntactic constraints associated with at least one authority. When the cryptographic device (140) determines that the syntax of the input is consistent with the template (310), the cryptographic device (140) validates the input.
    Type: Grant
    Filed: June 12, 2000
    Date of Patent: December 30, 2003
    Assignee: BBNT Solutions LLC
    Inventor: Stephen Thomas Kent
  • Publication number: 20030237004
    Abstract: Virtual Private Network (VPN) client 1 and M access gateways 3, 4 and 5 each possess a public key cryptography key pair (i.e., a private key and a public key). If VPN client 1 sends Public Key Infrastructure (PKI) compliant signature based authentication information to an access gateway 3, 4 or 5, the access gateway does not itself verify this authentication information. Instead, it entrusts this processing to an authentication server 8, 9 or 10 and receives the verification result, via authentication server proxy 7. Conversely, generation of PKI compliant signature based authentication information to be sent from an access gateway to a VPN client is carried out by the access gateway alone. The access gateway and the authentication server thus together implement PKI support but have the functions required for such support apportioned between them.
    Type: Application
    Filed: June 18, 2003
    Publication date: December 25, 2003
    Applicant: NEC Corporation
    Inventor: Mine Okamura
  • Publication number: 20030233551
    Abstract: A system and method for verifying that a peer is a trusted peer using signed receipts in a peer-to-peer network environment are disclosed. The method generally comprises broadcasting a request over the network by a requesting peer for a task with respect to a remote non-local backend server, receiving a response to the request from the service-providing server, verifying a digital certificate of the response issued by the remote non-local backend server indicating that the responding service-providing server is trusted for the requested task, and forwarding the task to a local alias URL of the responding peer for performance of the task by the responding server if the verifying is successful. The digital certificate may be a 1024-bit VeriSign digital certificate. The verifying ensures that the local alias URL is approved by the non-local backend server for the requested task.
    Type: Application
    Filed: August 2, 2001
    Publication date: December 18, 2003
    Inventors: Victor Kouznetsov, Charles L. Vigue, Martin Fallenstedt, Daniel Melchione
  • Publication number: 20030221104
    Abstract: Proposed are a cryptographic security method and electronic devices suitable therefor, in particular portable electronic security modules. Stored in the electronic device is a secret private customer key of a first digital key pair, consisting of the secret private customer key and a public customer key. Using the private customer key, a digital customer signature is generated in the electronic device from object data to be signed. Stored in the electronic device is a secret private key of a second digital key pair, consisting of the secret private key of a security provider and a public key of the security provider. Using the private key of the security provider, a digital signature certificate is generated in the electronic device from the customer signature as well as from further information, in particular a customer identification and from personal customer attributes.
    Type: Application
    Filed: May 23, 2003
    Publication date: November 27, 2003
    Applicant: Swisscom Mobile AG
    Inventor: Felix Baessler
  • Publication number: 20030221105
    Abstract: A Digital Signature Extension provides a secure environment where digital signatures associated with the electronic documents can be verified. The Digital Signature Extension comprises: (1) cryptographic services for performing cryptographic operations on the digital signatures associated with the electronic documents, (2) one or more file-specific components for authenticating the digital signatures associated with the electronic documents, wherein the electronic documents are stored in a particular file format, and for interfacing to the cryptographic services, so that the cryptographic operations can be performed on the digital signatures, and (3) one or more applications for implementing logic for accessing the documents and for interfacing to the file-specific components, so that the file-specific components can authenticate the digital signatures.
    Type: Application
    Filed: May 20, 2002
    Publication date: November 27, 2003
    Applicant: Autodesk, Inc.
    Inventor: Samir Bajaj
  • Publication number: 20030204722
    Abstract: Briefly, a method and apparatus for facilitating instant messaging generates (e.g. issues) an instant messaging public key cryptography policy certificate containing selected instant messaging public key cryptography policy control information. An instant messaging device obtains the instant messaging public key cryptography policy certificate through the use of a local instant messaging secure public key infrastructure proxy. Based on instant messaging policy control data in the instant messaging public key cryptography policy certificate, operations of the local instant messaging secure PKI proxy are controlled for outgoing and incoming instant messages. Hence, among other advantages, central enforcement of security policies for instant messaging users is provided.
    Type: Application
    Filed: April 26, 2002
    Publication date: October 30, 2003
    Inventors: Isadore Schoen, Michael Boberski
  • Publication number: 20030200437
    Abstract: A host communicates with a gateway, a DHCP server or a PPP peer of ISP to determine an IPv6 address, also receives a public key certificate from the gateway, the DHCP server or the PPP peer of ISP, and sends a public key certificate including an IPv6 address to a communication counterpart. The host receives a new public key certificate from the gateway, the DHCP server or the PPP peer of ISP when necessary.
    Type: Application
    Filed: April 16, 2003
    Publication date: October 23, 2003
    Inventor: Kazuomi Oishi
  • Publication number: 20030196108
    Abstract: A method to providing multilevel security for a data object requested by a workstation user includes providing a security label for the data object, associating security rules including a security clearance level for the data object with the security label, binding the security label to the data object, validating the correctness of the security label, associating the user's security clearance level with at least one user certificate, verifying the at least one user certificate, and determining whether the user has clearance to receive the requested data.
    Type: Application
    Filed: April 1, 2003
    Publication date: October 16, 2003
    Inventor: Kenneth C. Kung
  • Patent number: 6622247
    Abstract: A computerized method is provided for certifying a digital object. The digital object is uniquely identified with an identification. The identification is registered with a certification authority using a first public/private key exchange to receive a certificate of the digital object. Authenticity of the object is addressed by means of certification of the supplier's identity, in conjunction with integrity validation of the object. The digital object is tested to receive a compliance label using a second public/private key information exchange. The digital object is then distributed along with the certificate, and the label using a third public/private key information exchange. Ongoing confidence in object compliance is sustained by re-affirmation and/or notification mechanisms.
    Type: Grant
    Filed: December 19, 1997
    Date of Patent: September 16, 2003
    Assignee: Hewlett-Packard Development Company, LP
    Inventor: James DeWitt Isaak
  • Publication number: 20030163701
    Abstract: A method for operating a cryptosystem having a user, a registration station, and an authentication station is disclosed. The user has been assigned an active key pair. The active key pair includes a private key and a public key. The method includes generating an at least one new security key for the user upon receiving a request to generate the at least one new security key. The generated new security key is stored in a storage area without activating the new security key, the new security key being stored as an auxiliary key for the user. A request to activate the new security key that is stored in the storage area is received from the user. The new security key for the user is activated after receiving the activation request from the user.
    Type: Application
    Filed: February 26, 2003
    Publication date: August 28, 2003
    Applicant: Hitachi, Inc.
    Inventors: Yasushi Ochi, Hiroyoshi Tsuchiya
  • Publication number: 20030163700
    Abstract: A method and system to allow user generation of a private-public key pair and an associated user generated certificate to establish the identity of a user based upon signing the user generated certificate with a private key of a private-public key pair associated with a certificate issued by a Certification Authority (CA). The user generated certificate thereby allows the user that generated the certificate to establish a secure session with a third party without multiple use of the certificate issued by the CA, typically for use on another network infrastructure. The method and system are particularly useful for establishing a secure session, such as a Secure Socket Layer session using a personal computer, where the CA certificate is associated with a wireless identity module of a wireless device.
    Type: Application
    Filed: February 28, 2002
    Publication date: August 28, 2003
    Applicant: Nokia Corporation
    Inventor: Lauri Paatero
  • Patent number: 6609199
    Abstract: A secure communication channel between an open system and a portable IC device is established. An application running on the open system desiring access to the information on the portable IC device authenticates itself to the portable IC device, proving that it is trustworthy. Once such trustworthiness is proven, the portable IC device authenticates itself to the application. Once such two-way authentication has been completed, trusted communication between the open system and the portable IC device can proceed, and private information that is maintained on the portable IC device can be unlocked and made available to the application.
    Type: Grant
    Filed: April 6, 1999
    Date of Patent: August 19, 2003
    Assignee: Microsoft Corporation
    Inventor: John DeTreville
  • Patent number: 6603758
    Abstract: Described are methods and apparatus that allow cable customers who wish to add a cable modem (or other device) to a local network to choose both the cable modem through which they access the Internet and the Internet Service Provider (ISP) that will provide them that access. A system of hardware connects the local network to the Internet. This hardware includes cable-modem infrastructure that denies Internet access to devices on the local network that are not registered with an authorized ISP. The hardware also facilitates the registration process, allowing devices new to the local network to establish Internet-access agreements with ISPs, and thereby gain access to the Internet.
    Type: Grant
    Filed: October 1, 1999
    Date of Patent: August 5, 2003
    Assignee: WebTV Networks, Inc.
    Inventors: Guenther Schmuelling, Stephan Bartlett Sears, Jr.
  • Patent number: 6601171
    Abstract: Methods, signals, devices, and systems are provided for delegating rights in a distributed computer system from a principal to one or more deputies. The deputies have identities separate from the principal. This allows the deputies to persist after the principal logs off the system, and permits deputization across boundaries imposed by namespaces and particular network protocols. A deputy may also delegate rights to additional deputies. Deputization is accomplished using certificates, credentials, public and private keys, process creation, and other tools and techniques.
    Type: Grant
    Filed: February 18, 1999
    Date of Patent: July 29, 2003
    Assignee: Novell, Inc.
    Inventors: Stephen R Carter, Carlos A Nevarez
  • Publication number: 20030115468
    Abstract: A method and computer program to assign certificates/private keys to a token (130). This method and computer program allows a user (132) to access a certificate authority (110) and have certificates/private keys that are used for signature, encryption and role purposes generated and downloaded to the token (130). The use of secure communication lines and computers is not necessary since the token (132) contains a unique token ID and private key, while the certificate authority (110) contains the associated public key for the token (130). The certificate generated is wrapped in the public key and only the token (130), having the associated private key, may activate the certificate.
    Type: Application
    Filed: December 19, 2001
    Publication date: June 19, 2003
    Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
  • Publication number: 20030101346
    Abstract: A notarization method is disclosed whereby two parties can transmit and exchange electronic data without sharing either the data or any proprietary security information with third parties, and whereby the receiving party cannot surreptitiously examine the data without creating a logged record. In a preferred embodiment, the sending party uses an encryption algorithm to encrypt the data package, generating an encrypted copy of the data and a session key that can be used to retrieve the plaintext copy of that data package. The session key is split into two or more discrete subkeys, some or all of which are required to reconstruct the session key, and none of which alone will compromise the other subkeys or the data package. Using secure transport methods, the encrypted data packet and one or more subkeys are delivered to the intended recipient. The remaining subkeys are either retained by the sending party or delivered to a trusted third party using secure transport methods.
    Type: Application
    Filed: February 27, 2001
    Publication date: May 29, 2003
    Inventors: Austin Kesler Barron, Tor Oliver Houghton, Simon Sydney Walker
  • Publication number: 20030097566
    Abstract: A public key certificate generation method includes the steps of: sending a certificate issuing request including a registration contents of a public key certificate and an information content guaranteed by the registration authority, to the issuing authority in a registration authority and generating a public key certificate including the registration contents described in the certificate issuing request the information guaranteed by the registration authority issuing contents issued by the issuing authority, and a signature to the issuing contents in the issuing authority.
    Type: Application
    Filed: February 19, 2002
    Publication date: May 22, 2003
    Inventors: Yoko Kumagai, Takahiro Fujishiro, Satoru Tezuka, Takanobu Oikawa, Izumi Anayama
  • Patent number: 6567915
    Abstract: This invention concerns an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for authenticating identities and authorizing transactions based on the authenticated identities. The IC device has a memory and a processor. The IC device maintains an identity authentication table in the memory to hold an arbitrary number of identities. The identity authentication table correlates identities with authentication protocols, so that different protocols can be used to authenticate associated identities. The identity authentication table also correlates counts with the identities. Individual counts specify a number of uses of the IC device for a corresponding identity without requiring the IC device to authenticate the identity for each use. The IC device also maintains an authentication vector in memory. The authentication vector tracks identities in the identity authentication table that are currently authenticated by the IC device.
    Type: Grant
    Filed: October 23, 1998
    Date of Patent: May 20, 2003
    Assignee: Microsoft Corporation
    Inventor: Scott B. Guthery
  • Patent number: 6567916
    Abstract: The present invention allows even small-size verification devices to authenticate rights and qualifications without leaking authentication characteristic information to third parties. A ticket issuance device computes document private information &mgr; from a private function f of an interaction device owned by a user and document m to be transferred to the interaction device when generating interaction, and issues ticket t generated from authentication characteristic information x and the document private information &mgr; to the user. The interaction device, when document m is input, generates document private information &mgr; using a private function f specific to the interaction device, and performs interaction based on the document private information. The interaction comprises output of commitment r, input of challenge &khgr;, output of response &sgr;, and message M output.
    Type: Grant
    Filed: February 1, 1999
    Date of Patent: May 20, 2003
    Assignee: Fuji Xerox Co., Ltd.
    Inventors: Taro Terao, Rumiko Kakehi, Masaki Kyojima
  • Publication number: 20030093676
    Abstract: An object of the present invention is to limit users who can check for validity of a certificate in a system which uses public key certificates. To achieve this object, in the present invention, a validity check permit permitting a request to check for validity of the certificate is issued by a permit issuing server 120 to the applicant of the certificate. The certificate applicant sends the validity check permit to a relevant user when the certificate is used (step 701). When having a certificate validity checking server check for validity of the certificate, the user sends the validity check permit of the certificate to be checked to the certificate validity checking server (step 704). The certificate validity checking server verifies the validity check permit (step 706).
    Type: Application
    Filed: January 31, 2002
    Publication date: May 15, 2003
    Inventors: Shunji Kawamura, Taminori Tomita
  • Patent number: 6564320
    Abstract: A local server (202) locally hosts the provision of digital certificate services to a client (102); while a central server (104) provides the actual digital certificate services. The local server (202) transmits (304) a custom entry form (210) to the client (102). In response to the client's (102) use of the custom entry form (210), the client (102) transmits (306) a standard request for digital certificate services to a central server (104), possibly via the local server (202). The central server (104) fulfills (310) the request, generating a standard response. The standard response is transmitted (312) to the local server (202), which generates (314) a custom display of the results contained in the standard response. The custom display is transmitted (316) to the client (102), fulfilling the client's request. Information is provided (320,330), enabling the local server (202) to create (322) appropriate custom entry forms (210) and to generate (314) the custom display from the standard response.
    Type: Grant
    Filed: June 30, 1998
    Date of Patent: May 13, 2003
    Assignee: VeriSign, Inc.
    Inventors: Mahinda K. de Silva, Atul Tulshibagwale, Xinhong Yuan
  • Publication number: 20030088772
    Abstract: A method for public key certification in a local network environment, wherein a personal certification authority associated with the local network environment is connected with a first device needing to be certified. Responsive to the connection, a certificate is provided to the device to be certified from the personal certification authority. The devices receiving a certificate may then use the certificate to carry out secure information exchange within the local network environment with other devices having a similar certificate.
    Type: Application
    Filed: May 31, 2002
    Publication date: May 8, 2003
    Inventors: Christian Gehrmann, Bernard Smeets, Jacobus Haartsen, Joakim Persson
  • Publication number: 20030088771
    Abstract: The present invention provides a method and system for creating non-repudiated digital receipts and electronic signatures for electronic transactions. More specifically, the present invention provides a method, computer program and system for authorizing an electronic data transfer. An authentication request containing a digital certificate is received from a requesting device via a communication link. The present invention then determines whether the digital certificate is valid, and creates an authentication response denying the authentication request when the digital certificate is not valid, or approving the authentication request when the digital certificate is valid. The authentication response is then sent to the requesting device via the communication link, and information about the electronic data transfer, the digital certificate and at least a portion of the authentication response are stored.
    Type: Application
    Filed: April 18, 2001
    Publication date: May 8, 2003
    Inventor: M. Russel Merchen
  • Publication number: 20030084350
    Abstract: The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of requested configuration changes initiated by the client system the Web-Server system provides a configuration data file to the client system preferably using a SOAP-communication protocol. The changes of the configuration data file are exclusively performed offline at the client side and the updated configuration data file is signed with authentication information and sent as a part of a SOAP-request to the Web-Server system. The Web-Server system provides a filter component for identifying and discarding non-SOAP requests as well as an access control manager for providing authentication examination for incoming SOAP-requests. After successful passing these components the SOAP-request is used for updating the existing configuration data file.
    Type: Application
    Filed: September 12, 2002
    Publication date: May 1, 2003
    Applicant: International Business Machines Corporation
    Inventors: Wolfgang Eibach, Matthias Gruetzner, Dietmar Kuebler
  • Publication number: 20030065921
    Abstract: A method for facilitating electronic certification, and systems for use therewith, are presented in the context of public key encryption infrastructures. Some aspects of the invention provide methods for facilitating electronic certification using authority-neutral service requests sent by an application, which are then formatted by a server comprising a middleware that can convert the authority-neutral request into certification authority specific objects. The server and middleware then return a response from a selected certification authority back to the service requesting application. Thus, the server and/or middleware act as intermediaries that facilitate user transactions in an environment having multiple certification authorities without undue burden on the applications or the expense and reliability problems associated therewith.
    Type: Application
    Filed: August 26, 2002
    Publication date: April 3, 2003
    Inventor: Kae-por F. Chang
  • Publication number: 20030065920
    Abstract: A method and apparatus for creating a digital certificate for a subject in an information handling system in which users of a host system authenticate themselves to the host system by presenting a host user ID and a host password. The host system has a host authentication system associated with it for automatically authenticating users to the host system using the host authentication information. Upon receiving a certification request from a subject, a certificate authority determines whether the certification request is for a general user certificate or for a host user certificate. If the certification request is for a general user certificate, the certificate authority places the request in a queue for processing by a human administrator. If the certification request is for a host user certificate, the certificate authority obtains a host user ID and password from the requester and authenticates the requester by presenting this host authentication information to the host authentication system.
    Type: Application
    Filed: October 1, 2001
    Publication date: April 3, 2003
    Applicant: International Business Machines Corporation
    Inventors: Messaoud Benantar, John Dayka, Thomas L. Gindin, James W. Sweeny
  • Publication number: 20030056114
    Abstract: A branding process provides a networked computing device with initial set up information, including a name, a public/private key pair, and a set of certificates the device will need to inter-operate with other devices in the trust group. A branding device conveys the initial set-up information to the networked computing device via a limited access network interface, or alternatively via a broadcast network media with the device enclosed in a wave guide and/or Faraday cage. The networked computing device can then use the set up information to verify that other devices on the network that seek to interact with the device are also members of the trust group, with which networked computing device can interact.
    Type: Application
    Filed: June 15, 2001
    Publication date: March 20, 2003
    Applicant: Microsoft Corporation
    Inventor: Yaron Goland
  • Patent number: 6535978
    Abstract: A digital certificate is formed from a digitized representation of a unique biological feature of a registrant, for example, the registrant's chromosomal DNA. The digital representation is signed with the registrant's private encryption key and transmitted to a certificate authority. The registrant's identity is verified at a remote registration terminal. When the registrant's identity has been verified the certificate authority forms the certificate by encrypting the digital signature with the certificate authority's own encrypting key. The certificate is also held in a publicly available directory. The certificate is used to authenticate an electronic document by appending the certificate to the electronic document. The document and the certificate are then transmitted to a receiving terminal. The identity of the transmitting party can be verified by inspecting the certificate.
    Type: Grant
    Filed: August 28, 2000
    Date of Patent: March 18, 2003
    Assignee: Commercial Electronics, LLP
    Inventors: Robert D. Padgett, John C. Maxwell, III
  • Patent number: 6532540
    Abstract: Methods and apparatuses for providing cryptographic assurance based on ranges as to whether a particular data item is on a list. According to one computer-implemented method, the items on the list are sorted and ranges are derived from adjacent pairs of data items on the list. Next, cryptographically manipulated data is generated from the plurality of ranges. At least parts of the cryptographically manipulated data is transmitted onto a network for use in cryptographically demonstrating whether any given data item is on the list. According to another computer-implemented method, a request message is received requesting whether a given data item is on a list of data items. In response, a range is selected that is derived from the pair of data items on the list that define the smallest range that includes the given data item. A response message is transmitted that cryptographically demonstrates whether the first data item is on the list using cryptographically manipulated data derived from the range.
    Type: Grant
    Filed: June 23, 1998
    Date of Patent: March 11, 2003
    Assignee: ValiCert, Inc.
    Inventor: Paul Carl Kocher
  • Patent number: 6530022
    Abstract: A scanning tool executing on a host computer may be used to scan a server only if the server (or a proxy) first exposes to the host a certificate that, upon processing by the host, indicates that the server may be scanned. The certificate preferably encrypts a scan permission and is made available from a given port on the server (or the proxy). Whenever the host desires to perform a scan of the server, the host searches the port for the certificate. The certificate is then decrypted to determine whether the scan permission exists. If so, the scan then proceeds, in accordance with any conditions set forth in the decrypted scan permission.
    Type: Grant
    Filed: December 17, 1998
    Date of Patent: March 4, 2003
    Assignee: International Business Machines Corporation
    Inventors: Steven Cameron Blair, Sebastian Hassinger, William Meyer Smith, John Joseph Edward Turek