By Generation Of Certificate Patents (Class 713/175)
-
Publication number: 20040073798Abstract: Techniques are described for distributed production of controlled certificates, such as license plates for motor vehicles, in a secure manner. Controlled certificates may be printed at a local branch office subject to the control of a client computer. A server computer may regulate the operations of the client computers at the branch offices. The production system includes any of several security features to deter forgery and counterfeiting. For example, the security components that make up a finished controlled certificate may be separately secured with unique security elements. The finished controlled certificate may also have a unique security element.Type: ApplicationFiled: June 10, 2003Publication date: April 15, 2004Inventors: Thomas F. Look, Liu Yubao, Mao Jianyong, Zhang Wei, Craig A. Schmidt, Qui Tian, Chen Wei, Huang Tien-Hsiagn, Ji Hong, Robert T. Krasa, Jeremy P. Gundale
-
Patent number: 6718470Abstract: A system and method grants security privilege in a communication system by providing privilege test criteria data for a subscriber unit so that the subscriber unit or some other entity can select among subscriber privilege data based on the privilege test criteria data, so that only the necessary privilege information is communicated between the relying party and the subscriber unit of interest. A privilege data selector selects, for example, among a plurality of attribute certificates associated with a selected subscriber unit or among sets of privilege data within an attribute certificate, the certificate (or certificates) that matches the privileged test criteria data. This pre-selected certificate is then communicated for use by the relying unit and verified that it meets the test selected by the relying party unit.Type: GrantFiled: June 5, 1998Date of Patent: April 6, 2004Assignee: Entrust Technologies LimitedInventor: Carlisle Adams
-
Publication number: 20040064701Abstract: The invention relates to a method and device for authenticating a user of an electronic device in usage contexts being able to use in said electronic device by using a usage context identifier, wherein in the method, a usage context being used in the device is selected by the user. The method comprising maintaining a centralized register of the usage context s available for the user in the device and the user profiles associated to said usage contexts, the device identifying an usage context selected by the user, selecting at least one user profile in response to the identified service, and authenticating the user in the selected usage context on the basis of the selected user profile.Type: ApplicationFiled: June 27, 2003Publication date: April 1, 2004Applicant: NOKIA CORPORATIONInventor: Niall O'Donoghue
-
Publication number: 20040054913Abstract: Digital signatures are at best only as good as the digital certificates that are used to create them, and digital identity tokens that are based on digital certificates are at best only as good as the digital certificates therein. Digital certificates are at best only as good as the level of certainty to which the certificate can be associated with the holder. It follows then that digital signatures and digital ID tokens are at best only as good as the level of certainty to which the certificate involved can be associated with the holder. Presented here are: a system for issuing digital certificates wherein biometric data of the certificate requester is irrefutably bound to the issued certificate, and a system for validating the bound biometric data while any validation operation which involves the issued certificate is performed.Type: ApplicationFiled: February 28, 2002Publication date: March 18, 2004Inventor: Mark Brian West
-
Publication number: 20040054907Abstract: A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to the particular computing platform (10). The manufacturer certificate may also store configuration parameters and device identification numbers. A secure run-time platform data checker (200) and a secure run-time checker (202) check the system firmware during operation of the computing platform (10) to ensure that the system firmware (30) or information in the manufacturer certificate (36) has not been altered. Application software files (32) and data files (34) are bound to the particular computing device (10) by a platform certificate (38). A key generator may be used to generate a random key and an encrypted key may be generated by encrypting the random key using a secret identification number associated with the particular computing platform (10). Only the encrypted key is stored in the platform certificate (36).Type: ApplicationFiled: July 14, 2003Publication date: March 18, 2004Inventors: Alain Chateau, Jerome Azema, Constantin Haidamous
-
Patent number: 6704787Abstract: A system or method for an access code issuer to receive an on-line application including certain personal information from a user of a computer network such as the Internet, to independently operatively connect to a database and obtain or verify demographic and additional personal information regarding the user, and issue an access code to the user. The user enters this access code when accessing various nodes or websites of a plurality of affiliated content providers. The content providers obtain or verify the user's demographics by operatively connecting to the access code issuer, thereby obtaining or verifying the demographics of the visitor to its site without requiring the visitor to enter his or her demographic information or to independently provide proof thereof to the content provider.Type: GrantFiled: December 3, 1999Date of Patent: March 9, 2004Assignee: Intercard Payments, Inc.Inventor: Timothy F. Umbreit
-
Publication number: 20040039937Abstract: A credential management device has a protected domain and a credential manager to perform credential transactions. A credential transaction may comprise determining if a platform is operating in a trusted mode and releasing an operation credential if the platform is operating in a trusted mode. A credential transaction may comprise validating incoming credentials from other platforms.Type: ApplicationFiled: August 20, 2002Publication date: February 26, 2004Applicant: Intel CorporationInventors: Selim Aissi, Ned McArthur Smith, Willard M. Wiseman
-
Publication number: 20040039911Abstract: To implement a system in which content usage conditions can be upgraded without the need for a service provider to control content-usage rights of a user. In the system in which encrypted content is distributed and is allowed to be utilized only by authorized users, the service provider receives a content usage-right certificate from the user, and on the condition that it is determined that data is not tampered with by verifying a digital signature of an issuing entity of the content usage-right certificate, the service provider obtains user information and content purchase information of the user from the content usage-right certificate, and performs upgrade processing by, for example, changing the usage conditions. It is thus possible to change the content usage conditions without the need for the service provider to possess usage control data.Type: ApplicationFiled: September 8, 2003Publication date: February 26, 2004Inventors: Makoto Oka, Yoshihito Ishibashi, Hiroshi Abe, Noboru Shimada, Masahiko Enari, Kenji Yoshino
-
Publication number: 20040034790Abstract: A device to validate security credentials is disclosed. The device comprises a credential validation module to recalculate security credentials received in a datagram and to determine if the security credentials are valid. The device may also include a parser to extract the security credentials from the payload data of the received datagram, and a memory to store validated credentials for further use.Type: ApplicationFiled: August 16, 2002Publication date: February 19, 2004Applicant: Intel CorporationInventor: Selim Aissi
-
Publication number: 20040030784Abstract: The invention discloses a method of displaying a feature relating to a web-page, the method comprising the steps of determining a feature of the web-page from a digital certificate associated with the web-page and displaying the feature. Other related aspects are also disclosed.Type: ApplicationFiled: December 2, 2002Publication date: February 12, 2004Inventor: Melih Abdulhayoglu
-
Patent number: 6687825Abstract: A data processing system and method are disclosed for protecting data within a hard disk drive included within a data processing system. Data is generated. A signature value is provided which is stored in a signature device. The signature device is capable of being inserted into and removed from a computer system. A textual description of the data is created. The data is encrypted utilizing both the signature value stored on the device and the textual description. The encrypted data is then stored on the hard disk drive. The data processing system does not permanently store encryption keys.Type: GrantFiled: March 17, 2000Date of Patent: February 3, 2004Assignee: International Business Machines CorporationInventors: David Carroll Challener, Daryl Carvis Cromer, Mark Charles Davis, Dhruv Manmohandas Desai, Charles William Kaufman, Hernando Ovies, James Peter Ward
-
Patent number: 6687822Abstract: A method for providing publicly verifiable translation certificates comprising the steps of receiving an input encryption having a first secret key; outputting an output re-encryption of the input encryption, the output re-encryption having a second secret key; and generating a translation certificate that proves the input encryption and the output re-encryption are encryptions of an identical message, wherein the first secret key and the second secret key do not need to be, but are allowed to be, equal. This method and system for generating translation certificates in quorum controlled asymmetric proxy encryptions has uses, including but not limited to, Internet applications and specifically to E-mail systems.Type: GrantFiled: June 11, 1999Date of Patent: February 3, 2004Inventor: Markus Bjorn Jakobsson
-
Patent number: 6681328Abstract: A system and method for authenticating a digital ID can utilize a central switch to transmit data between a network connected to a service provider and a network connected to a digital ID issuer. The system can be configured to provide a “yes/no” authorization or a validation at a selected validation level. The system can receive an encrypted authorization request message, and can generate an encrypted authorization response message. The authorization response message can be used by the service provider to decide whether to provide a service to a digital ID holder.Type: GrantFiled: October 5, 2000Date of Patent: January 20, 2004Assignee: MasterCard International IncorporatedInventors: Michael D. S. Harris, John Wankmueller
-
Publication number: 20040010698Abstract: A digital certificate registration and verification system and method incorporate a unique identifier of a voice biometric data profile from an applicant into a certificate. The profile can subsequently be retrieved and compared to a profile from a party initiating a transaction. Results can be incorporated into a decision as to the authenticity of the party that has initiated the transaction.Type: ApplicationFiled: May 29, 2003Publication date: January 15, 2004Inventor: Andrew R. Rolfe
-
Publication number: 20040010696Abstract: The present invention relates to methods and systems for establishing trust in an identity of an individual in a transaction with a transacting entity. Trust is based on secure biometric data such as a captured print. In one environment, an individual uses an identification device at or near a terminal to carry out the transaction. For example, the identification device may be coupled to the terminal by a wireless or wired link. The terminal is coupled over a network to an identity service provider and/or the transacting entity.Type: ApplicationFiled: October 31, 2002Publication date: January 15, 2004Inventors: Greg Cannon, Walter Guy Scott
-
Publication number: 20040006701Abstract: A set of procedures is described which permit signing digital audio recordings by means of private keys, and which permit later authentication of such recordings, for example in a courtroom, in a way that is well suited to comprehension by non-technical personnel. Importantly, the explanation leading to such comprehension does not enable the creation of tampered recordings that would appear to be authentic. The procedures call for signing by trusted and disinterested third parties and for distributing hardware tokens storing various keys and key pairs. The format of the digital audio recordings permits playback on conventional equipment and also on equipment having cryptographic capabilities for authentication.Type: ApplicationFiled: April 7, 2003Publication date: January 8, 2004Applicant: ADVANCED DECISIONS INC.Inventors: Roman Kresina, Michael Landino
-
Publication number: 20040006695Abstract: To provide an improved management structure of memory devices storing service-use applications. A card for a memory device applied to use various services is provided as one child card or more corresponding to each of the services, a parent card-stores data for child-card issue management, and the child-card issue processing is executed based on the parent card, such as parent card authentication. An issue certificate having a parent-card digital signature is stored in the child card, the issue certificate contains a service code and a child-card identification, and thus it becomes possible to confirm a service set in the child card based on the issue certificate as the parent-card signature data.Type: ApplicationFiled: May 21, 2003Publication date: January 8, 2004Inventors: Yoshihito Ishibashi, Susumu Kusakabe, Hideaki Watanabe
-
Patent number: 6675296Abstract: A certificate issuing apparatus and method creates a new certificate of a differing format from an existing certificate format to facilitate certificate conversion. A certificate converting unit receives first certificate data in a first format and desired certificate format criteria data, such as data representing the format of a certificate to which the first certificate is to be converted. The apparatus and method then generates second certificate data in a second format in response to the desired certificate format criteria data. In one embodiment, this is done using certificate format template data, such as templates representing the format and/or syntax of a plurality of differing certificate formats. The format template data is then mapped so that information from one certificate can be suitably mapped and then placed in a proper format and syntax for a different certificate format.Type: GrantFiled: June 28, 1999Date of Patent: January 6, 2004Assignee: Entrust Technologies LimitedInventors: Sharon M. Boeyen, James Steven Lloyd, Ronald J. Vandergeest
-
Publication number: 20040003238Abstract: A method and apparatus for distribution of digital certificates is disclosed. A limited access to networks by use of existing identity information allows distribution of digital certificates.Type: ApplicationFiled: June 30, 2002Publication date: January 1, 2004Inventors: Wai Kwan Mak, Victor C. Robison, Jesse R. Walker
-
Publication number: 20040003252Abstract: A vehicle authenticates a component class of a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key. The certification certifies that the second cryptographic key is bound to information identifying an authentic component of the component class. The vehicle utilizes the second cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Inventors: Ezzat A. Dabbish, Larry C. Puhl
-
Patent number: 6671804Abstract: In a cryptographic device (140) storing a number of templates (310), a system and method for supporting authentication services is provided. The cryptographic device (140) receives inputs representing a request for authentication services. The cryptographic device (140) then compares the syntax of the input to the syntactic constraints defined in one of the templates (310), where each template (310) includes syntactic constraints associated with at least one authority. When the cryptographic device (140) determines that the syntax of the input is consistent with the template (310), the cryptographic device (140) validates the input.Type: GrantFiled: June 12, 2000Date of Patent: December 30, 2003Assignee: BBNT Solutions LLCInventor: Stephen Thomas Kent
-
Publication number: 20030237004Abstract: Virtual Private Network (VPN) client 1 and M access gateways 3, 4 and 5 each possess a public key cryptography key pair (i.e., a private key and a public key). If VPN client 1 sends Public Key Infrastructure (PKI) compliant signature based authentication information to an access gateway 3, 4 or 5, the access gateway does not itself verify this authentication information. Instead, it entrusts this processing to an authentication server 8, 9 or 10 and receives the verification result, via authentication server proxy 7. Conversely, generation of PKI compliant signature based authentication information to be sent from an access gateway to a VPN client is carried out by the access gateway alone. The access gateway and the authentication server thus together implement PKI support but have the functions required for such support apportioned between them.Type: ApplicationFiled: June 18, 2003Publication date: December 25, 2003Applicant: NEC CorporationInventor: Mine Okamura
-
Publication number: 20030233551Abstract: A system and method for verifying that a peer is a trusted peer using signed receipts in a peer-to-peer network environment are disclosed. The method generally comprises broadcasting a request over the network by a requesting peer for a task with respect to a remote non-local backend server, receiving a response to the request from the service-providing server, verifying a digital certificate of the response issued by the remote non-local backend server indicating that the responding service-providing server is trusted for the requested task, and forwarding the task to a local alias URL of the responding peer for performance of the task by the responding server if the verifying is successful. The digital certificate may be a 1024-bit VeriSign digital certificate. The verifying ensures that the local alias URL is approved by the non-local backend server for the requested task.Type: ApplicationFiled: August 2, 2001Publication date: December 18, 2003Inventors: Victor Kouznetsov, Charles L. Vigue, Martin Fallenstedt, Daniel Melchione
-
Publication number: 20030221104Abstract: Proposed are a cryptographic security method and electronic devices suitable therefor, in particular portable electronic security modules. Stored in the electronic device is a secret private customer key of a first digital key pair, consisting of the secret private customer key and a public customer key. Using the private customer key, a digital customer signature is generated in the electronic device from object data to be signed. Stored in the electronic device is a secret private key of a second digital key pair, consisting of the secret private key of a security provider and a public key of the security provider. Using the private key of the security provider, a digital signature certificate is generated in the electronic device from the customer signature as well as from further information, in particular a customer identification and from personal customer attributes.Type: ApplicationFiled: May 23, 2003Publication date: November 27, 2003Applicant: Swisscom Mobile AGInventor: Felix Baessler
-
Publication number: 20030221105Abstract: A Digital Signature Extension provides a secure environment where digital signatures associated with the electronic documents can be verified. The Digital Signature Extension comprises: (1) cryptographic services for performing cryptographic operations on the digital signatures associated with the electronic documents, (2) one or more file-specific components for authenticating the digital signatures associated with the electronic documents, wherein the electronic documents are stored in a particular file format, and for interfacing to the cryptographic services, so that the cryptographic operations can be performed on the digital signatures, and (3) one or more applications for implementing logic for accessing the documents and for interfacing to the file-specific components, so that the file-specific components can authenticate the digital signatures.Type: ApplicationFiled: May 20, 2002Publication date: November 27, 2003Applicant: Autodesk, Inc.Inventor: Samir Bajaj
-
Publication number: 20030204722Abstract: Briefly, a method and apparatus for facilitating instant messaging generates (e.g. issues) an instant messaging public key cryptography policy certificate containing selected instant messaging public key cryptography policy control information. An instant messaging device obtains the instant messaging public key cryptography policy certificate through the use of a local instant messaging secure public key infrastructure proxy. Based on instant messaging policy control data in the instant messaging public key cryptography policy certificate, operations of the local instant messaging secure PKI proxy are controlled for outgoing and incoming instant messages. Hence, among other advantages, central enforcement of security policies for instant messaging users is provided.Type: ApplicationFiled: April 26, 2002Publication date: October 30, 2003Inventors: Isadore Schoen, Michael Boberski
-
Publication number: 20030200437Abstract: A host communicates with a gateway, a DHCP server or a PPP peer of ISP to determine an IPv6 address, also receives a public key certificate from the gateway, the DHCP server or the PPP peer of ISP, and sends a public key certificate including an IPv6 address to a communication counterpart. The host receives a new public key certificate from the gateway, the DHCP server or the PPP peer of ISP when necessary.Type: ApplicationFiled: April 16, 2003Publication date: October 23, 2003Inventor: Kazuomi Oishi
-
Publication number: 20030196108Abstract: A method to providing multilevel security for a data object requested by a workstation user includes providing a security label for the data object, associating security rules including a security clearance level for the data object with the security label, binding the security label to the data object, validating the correctness of the security label, associating the user's security clearance level with at least one user certificate, verifying the at least one user certificate, and determining whether the user has clearance to receive the requested data.Type: ApplicationFiled: April 1, 2003Publication date: October 16, 2003Inventor: Kenneth C. Kung
-
Patent number: 6622247Abstract: A computerized method is provided for certifying a digital object. The digital object is uniquely identified with an identification. The identification is registered with a certification authority using a first public/private key exchange to receive a certificate of the digital object. Authenticity of the object is addressed by means of certification of the supplier's identity, in conjunction with integrity validation of the object. The digital object is tested to receive a compliance label using a second public/private key information exchange. The digital object is then distributed along with the certificate, and the label using a third public/private key information exchange. Ongoing confidence in object compliance is sustained by re-affirmation and/or notification mechanisms.Type: GrantFiled: December 19, 1997Date of Patent: September 16, 2003Assignee: Hewlett-Packard Development Company, LPInventor: James DeWitt Isaak
-
Publication number: 20030163701Abstract: A method for operating a cryptosystem having a user, a registration station, and an authentication station is disclosed. The user has been assigned an active key pair. The active key pair includes a private key and a public key. The method includes generating an at least one new security key for the user upon receiving a request to generate the at least one new security key. The generated new security key is stored in a storage area without activating the new security key, the new security key being stored as an auxiliary key for the user. A request to activate the new security key that is stored in the storage area is received from the user. The new security key for the user is activated after receiving the activation request from the user.Type: ApplicationFiled: February 26, 2003Publication date: August 28, 2003Applicant: Hitachi, Inc.Inventors: Yasushi Ochi, Hiroyoshi Tsuchiya
-
Publication number: 20030163700Abstract: A method and system to allow user generation of a private-public key pair and an associated user generated certificate to establish the identity of a user based upon signing the user generated certificate with a private key of a private-public key pair associated with a certificate issued by a Certification Authority (CA). The user generated certificate thereby allows the user that generated the certificate to establish a secure session with a third party without multiple use of the certificate issued by the CA, typically for use on another network infrastructure. The method and system are particularly useful for establishing a secure session, such as a Secure Socket Layer session using a personal computer, where the CA certificate is associated with a wireless identity module of a wireless device.Type: ApplicationFiled: February 28, 2002Publication date: August 28, 2003Applicant: Nokia CorporationInventor: Lauri Paatero
-
Patent number: 6609199Abstract: A secure communication channel between an open system and a portable IC device is established. An application running on the open system desiring access to the information on the portable IC device authenticates itself to the portable IC device, proving that it is trustworthy. Once such trustworthiness is proven, the portable IC device authenticates itself to the application. Once such two-way authentication has been completed, trusted communication between the open system and the portable IC device can proceed, and private information that is maintained on the portable IC device can be unlocked and made available to the application.Type: GrantFiled: April 6, 1999Date of Patent: August 19, 2003Assignee: Microsoft CorporationInventor: John DeTreville
-
Patent number: 6603758Abstract: Described are methods and apparatus that allow cable customers who wish to add a cable modem (or other device) to a local network to choose both the cable modem through which they access the Internet and the Internet Service Provider (ISP) that will provide them that access. A system of hardware connects the local network to the Internet. This hardware includes cable-modem infrastructure that denies Internet access to devices on the local network that are not registered with an authorized ISP. The hardware also facilitates the registration process, allowing devices new to the local network to establish Internet-access agreements with ISPs, and thereby gain access to the Internet.Type: GrantFiled: October 1, 1999Date of Patent: August 5, 2003Assignee: WebTV Networks, Inc.Inventors: Guenther Schmuelling, Stephan Bartlett Sears, Jr.
-
Patent number: 6601171Abstract: Methods, signals, devices, and systems are provided for delegating rights in a distributed computer system from a principal to one or more deputies. The deputies have identities separate from the principal. This allows the deputies to persist after the principal logs off the system, and permits deputization across boundaries imposed by namespaces and particular network protocols. A deputy may also delegate rights to additional deputies. Deputization is accomplished using certificates, credentials, public and private keys, process creation, and other tools and techniques.Type: GrantFiled: February 18, 1999Date of Patent: July 29, 2003Assignee: Novell, Inc.Inventors: Stephen R Carter, Carlos A Nevarez
-
Publication number: 20030115468Abstract: A method and computer program to assign certificates/private keys to a token (130). This method and computer program allows a user (132) to access a certificate authority (110) and have certificates/private keys that are used for signature, encryption and role purposes generated and downloaded to the token (130). The use of secure communication lines and computers is not necessary since the token (132) contains a unique token ID and private key, while the certificate authority (110) contains the associated public key for the token (130). The certificate generated is wrapped in the public key and only the token (130), having the associated private key, may activate the certificate.Type: ApplicationFiled: December 19, 2001Publication date: June 19, 2003Inventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Publication number: 20030101346Abstract: A notarization method is disclosed whereby two parties can transmit and exchange electronic data without sharing either the data or any proprietary security information with third parties, and whereby the receiving party cannot surreptitiously examine the data without creating a logged record. In a preferred embodiment, the sending party uses an encryption algorithm to encrypt the data package, generating an encrypted copy of the data and a session key that can be used to retrieve the plaintext copy of that data package. The session key is split into two or more discrete subkeys, some or all of which are required to reconstruct the session key, and none of which alone will compromise the other subkeys or the data package. Using secure transport methods, the encrypted data packet and one or more subkeys are delivered to the intended recipient. The remaining subkeys are either retained by the sending party or delivered to a trusted third party using secure transport methods.Type: ApplicationFiled: February 27, 2001Publication date: May 29, 2003Inventors: Austin Kesler Barron, Tor Oliver Houghton, Simon Sydney Walker
-
Publication number: 20030097566Abstract: A public key certificate generation method includes the steps of: sending a certificate issuing request including a registration contents of a public key certificate and an information content guaranteed by the registration authority, to the issuing authority in a registration authority and generating a public key certificate including the registration contents described in the certificate issuing request the information guaranteed by the registration authority issuing contents issued by the issuing authority, and a signature to the issuing contents in the issuing authority.Type: ApplicationFiled: February 19, 2002Publication date: May 22, 2003Inventors: Yoko Kumagai, Takahiro Fujishiro, Satoru Tezuka, Takanobu Oikawa, Izumi Anayama
-
Patent number: 6567915Abstract: This invention concerns an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for authenticating identities and authorizing transactions based on the authenticated identities. The IC device has a memory and a processor. The IC device maintains an identity authentication table in the memory to hold an arbitrary number of identities. The identity authentication table correlates identities with authentication protocols, so that different protocols can be used to authenticate associated identities. The identity authentication table also correlates counts with the identities. Individual counts specify a number of uses of the IC device for a corresponding identity without requiring the IC device to authenticate the identity for each use. The IC device also maintains an authentication vector in memory. The authentication vector tracks identities in the identity authentication table that are currently authenticated by the IC device.Type: GrantFiled: October 23, 1998Date of Patent: May 20, 2003Assignee: Microsoft CorporationInventor: Scott B. Guthery
-
Patent number: 6567916Abstract: The present invention allows even small-size verification devices to authenticate rights and qualifications without leaking authentication characteristic information to third parties. A ticket issuance device computes document private information &mgr; from a private function f of an interaction device owned by a user and document m to be transferred to the interaction device when generating interaction, and issues ticket t generated from authentication characteristic information x and the document private information &mgr; to the user. The interaction device, when document m is input, generates document private information &mgr; using a private function f specific to the interaction device, and performs interaction based on the document private information. The interaction comprises output of commitment r, input of challenge &khgr;, output of response &sgr;, and message M output.Type: GrantFiled: February 1, 1999Date of Patent: May 20, 2003Assignee: Fuji Xerox Co., Ltd.Inventors: Taro Terao, Rumiko Kakehi, Masaki Kyojima
-
Publication number: 20030093676Abstract: An object of the present invention is to limit users who can check for validity of a certificate in a system which uses public key certificates. To achieve this object, in the present invention, a validity check permit permitting a request to check for validity of the certificate is issued by a permit issuing server 120 to the applicant of the certificate. The certificate applicant sends the validity check permit to a relevant user when the certificate is used (step 701). When having a certificate validity checking server check for validity of the certificate, the user sends the validity check permit of the certificate to be checked to the certificate validity checking server (step 704). The certificate validity checking server verifies the validity check permit (step 706).Type: ApplicationFiled: January 31, 2002Publication date: May 15, 2003Inventors: Shunji Kawamura, Taminori Tomita
-
Patent number: 6564320Abstract: A local server (202) locally hosts the provision of digital certificate services to a client (102); while a central server (104) provides the actual digital certificate services. The local server (202) transmits (304) a custom entry form (210) to the client (102). In response to the client's (102) use of the custom entry form (210), the client (102) transmits (306) a standard request for digital certificate services to a central server (104), possibly via the local server (202). The central server (104) fulfills (310) the request, generating a standard response. The standard response is transmitted (312) to the local server (202), which generates (314) a custom display of the results contained in the standard response. The custom display is transmitted (316) to the client (102), fulfilling the client's request. Information is provided (320,330), enabling the local server (202) to create (322) appropriate custom entry forms (210) and to generate (314) the custom display from the standard response.Type: GrantFiled: June 30, 1998Date of Patent: May 13, 2003Assignee: VeriSign, Inc.Inventors: Mahinda K. de Silva, Atul Tulshibagwale, Xinhong Yuan
-
Publication number: 20030088772Abstract: A method for public key certification in a local network environment, wherein a personal certification authority associated with the local network environment is connected with a first device needing to be certified. Responsive to the connection, a certificate is provided to the device to be certified from the personal certification authority. The devices receiving a certificate may then use the certificate to carry out secure information exchange within the local network environment with other devices having a similar certificate.Type: ApplicationFiled: May 31, 2002Publication date: May 8, 2003Inventors: Christian Gehrmann, Bernard Smeets, Jacobus Haartsen, Joakim Persson
-
Publication number: 20030088771Abstract: The present invention provides a method and system for creating non-repudiated digital receipts and electronic signatures for electronic transactions. More specifically, the present invention provides a method, computer program and system for authorizing an electronic data transfer. An authentication request containing a digital certificate is received from a requesting device via a communication link. The present invention then determines whether the digital certificate is valid, and creates an authentication response denying the authentication request when the digital certificate is not valid, or approving the authentication request when the digital certificate is valid. The authentication response is then sent to the requesting device via the communication link, and information about the electronic data transfer, the digital certificate and at least a portion of the authentication response are stored.Type: ApplicationFiled: April 18, 2001Publication date: May 8, 2003Inventor: M. Russel Merchen
-
Publication number: 20030084350Abstract: The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of requested configuration changes initiated by the client system the Web-Server system provides a configuration data file to the client system preferably using a SOAP-communication protocol. The changes of the configuration data file are exclusively performed offline at the client side and the updated configuration data file is signed with authentication information and sent as a part of a SOAP-request to the Web-Server system. The Web-Server system provides a filter component for identifying and discarding non-SOAP requests as well as an access control manager for providing authentication examination for incoming SOAP-requests. After successful passing these components the SOAP-request is used for updating the existing configuration data file.Type: ApplicationFiled: September 12, 2002Publication date: May 1, 2003Applicant: International Business Machines CorporationInventors: Wolfgang Eibach, Matthias Gruetzner, Dietmar Kuebler
-
Publication number: 20030065921Abstract: A method for facilitating electronic certification, and systems for use therewith, are presented in the context of public key encryption infrastructures. Some aspects of the invention provide methods for facilitating electronic certification using authority-neutral service requests sent by an application, which are then formatted by a server comprising a middleware that can convert the authority-neutral request into certification authority specific objects. The server and middleware then return a response from a selected certification authority back to the service requesting application. Thus, the server and/or middleware act as intermediaries that facilitate user transactions in an environment having multiple certification authorities without undue burden on the applications or the expense and reliability problems associated therewith.Type: ApplicationFiled: August 26, 2002Publication date: April 3, 2003Inventor: Kae-por F. Chang
-
Publication number: 20030065920Abstract: A method and apparatus for creating a digital certificate for a subject in an information handling system in which users of a host system authenticate themselves to the host system by presenting a host user ID and a host password. The host system has a host authentication system associated with it for automatically authenticating users to the host system using the host authentication information. Upon receiving a certification request from a subject, a certificate authority determines whether the certification request is for a general user certificate or for a host user certificate. If the certification request is for a general user certificate, the certificate authority places the request in a queue for processing by a human administrator. If the certification request is for a host user certificate, the certificate authority obtains a host user ID and password from the requester and authenticates the requester by presenting this host authentication information to the host authentication system.Type: ApplicationFiled: October 1, 2001Publication date: April 3, 2003Applicant: International Business Machines CorporationInventors: Messaoud Benantar, John Dayka, Thomas L. Gindin, James W. Sweeny
-
Publication number: 20030056114Abstract: A branding process provides a networked computing device with initial set up information, including a name, a public/private key pair, and a set of certificates the device will need to inter-operate with other devices in the trust group. A branding device conveys the initial set-up information to the networked computing device via a limited access network interface, or alternatively via a broadcast network media with the device enclosed in a wave guide and/or Faraday cage. The networked computing device can then use the set up information to verify that other devices on the network that seek to interact with the device are also members of the trust group, with which networked computing device can interact.Type: ApplicationFiled: June 15, 2001Publication date: March 20, 2003Applicant: Microsoft CorporationInventor: Yaron Goland
-
Patent number: 6535978Abstract: A digital certificate is formed from a digitized representation of a unique biological feature of a registrant, for example, the registrant's chromosomal DNA. The digital representation is signed with the registrant's private encryption key and transmitted to a certificate authority. The registrant's identity is verified at a remote registration terminal. When the registrant's identity has been verified the certificate authority forms the certificate by encrypting the digital signature with the certificate authority's own encrypting key. The certificate is also held in a publicly available directory. The certificate is used to authenticate an electronic document by appending the certificate to the electronic document. The document and the certificate are then transmitted to a receiving terminal. The identity of the transmitting party can be verified by inspecting the certificate.Type: GrantFiled: August 28, 2000Date of Patent: March 18, 2003Assignee: Commercial Electronics, LLPInventors: Robert D. Padgett, John C. Maxwell, III
-
Patent number: 6532540Abstract: Methods and apparatuses for providing cryptographic assurance based on ranges as to whether a particular data item is on a list. According to one computer-implemented method, the items on the list are sorted and ranges are derived from adjacent pairs of data items on the list. Next, cryptographically manipulated data is generated from the plurality of ranges. At least parts of the cryptographically manipulated data is transmitted onto a network for use in cryptographically demonstrating whether any given data item is on the list. According to another computer-implemented method, a request message is received requesting whether a given data item is on a list of data items. In response, a range is selected that is derived from the pair of data items on the list that define the smallest range that includes the given data item. A response message is transmitted that cryptographically demonstrates whether the first data item is on the list using cryptographically manipulated data derived from the range.Type: GrantFiled: June 23, 1998Date of Patent: March 11, 2003Assignee: ValiCert, Inc.Inventor: Paul Carl Kocher
-
Patent number: 6530022Abstract: A scanning tool executing on a host computer may be used to scan a server only if the server (or a proxy) first exposes to the host a certificate that, upon processing by the host, indicates that the server may be scanned. The certificate preferably encrypts a scan permission and is made available from a given port on the server (or the proxy). Whenever the host desires to perform a scan of the server, the host searches the port for the certificate. The certificate is then decrypted to determine whether the scan permission exists. If so, the scan then proceeds, in accordance with any conditions set forth in the decrypted scan permission.Type: GrantFiled: December 17, 1998Date of Patent: March 4, 2003Assignee: International Business Machines CorporationInventors: Steven Cameron Blair, Sebastian Hassinger, William Meyer Smith, John Joseph Edward Turek