Images List Premium Download Classic

Certificate

Certificate-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Verifying a certificate
Blackberry Limited
July 20, 2017 - N°20170208469

Systems, methods, and software can be used to verify a certificate. In some aspects, a request to connect to a virtual private network (vpn) server is received from an application on a mobile device. A certificate of the vpn server is obtained at the mobile device. A device-level certificate verification for the certificate is performed. Whether an application-level certificate verification ...
In-vehicle communication system
Renesas Electronics Corporation
July 20, 2017 - N°20170207922

The present invention is directed to solve a problem that time is required for a process related to verification of a public key certificate of a message sender. An in-vehicle device mounted on a vehicle has a memory for holding information of a device which failed in verification of a public key certificate. At the time of performing communication between ...
Signed application cards
Quixey, Inc.
July 20, 2017 - N°20170207915

A device displays signed application cards. The device receives a card object that includes: an application function identifier that identifies an application function of a native application, a digital signature, and a certificate that comprises a public key. The device verifies the authenticity of the digital signature with the public key in the certificate. The device determines that the certificate ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Mobility management entity, terminal, and identity authentication method
Yulong Computer Telecommunication Scientific (shenzhen) Co., Ltd.
July 13, 2017 - N°20170201884

A mobility management entity (mme), a terminal and an identity authentication method are disclosed. The mme comprises: a sending unit, configured to send an identity authentication request, an encryption key and a corresponding digital certificate to a terminal when detecting that a mapping relation between a globally unique temporary terminal identity and an international mobile subscriber identity code is lost, ...
Method and apparatus for safe network access point detection
Intel Corporation
July 13, 2017 - N°20170201878

An approach is provided for determining the authenticity of an available wireless network access point. The approach involves detecting one or more available wireless network access points. The approach also involves communicating one or more authentication requests to each of the available wireless network access points requesting a corresponding access point certificate. The approach further involves processing one or more ...
Terminal identification method, and method, system and apparatus of registering machine identification code
Alibaba Group Holding Limited
July 13, 2017 - N°20170201516

A terminal identification method, a machine identification code registration method and related system and apparatus are disclosed. After receiving a first request for which signature or certificate verification is to be performed from a terminal, a service network obtains a signature or certificate of a trusted party for a machine identification code identifier of the terminal from the first request, ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems, methods and apparatuses for the application-specific identification of devices
Ologn Technologies Ag
July 13, 2017 - N°20170201384

The systems, methods and apparatuses described herein provide a computing environment that manages application specific identification of devices. An apparatus according to the present disclosure may comprise a non-volatile storage storing identifier (id) base data and a processor. The processor may be configured to validate a certificate of an application being executed on the apparatus. The certificate may contain a ...
Multiple factor authentication in an identity certificate service
Mobile Iron, Inc.
July 13, 2017 - N°20170201383

Multiple factor authentication in an identity certificate service is disclosed. A certificate including a cryptographically-obscured identifier associated with the end entity is sent from an end entity to a service node. The service node uses both the certificate and the identifier to authenticate the end entity at least in part by comparing the identifier to a reference identifier. A service ...
Systems and methods for providing a man-in-the-middle proxy
Secureworks Holding Corporation
July 13, 2017 - N°20170201381

A method for operating a secure man-in-the-middle proxy includes intercepting an attempt to establish a connection between an application and a network server associated with a whitelisted hostname, establishing a secure connection to the network server, checking the secure connection against the stored combination of certificate, encryption protocol, and encryption cipher for the whitelisted hostname, and forwarding traffic between the ...
Method for storing, delivering, and displaying documentation and credentials related to intrastate and interstate commerce
Legatus Solutions Corporation
July 13, 2017 - N°20170200170

A method and apparatus for one office, such as a state's fuel tax licensing bureau, to deliver an electronic/digital certificate to a licensee's “folder” and allow an authorized user to share a link to that object. This solves the three key problems: object delivery and provenance, allowing the issuer to set or update the obsolescence ...
Automatic clustering for self-organizing grids
The Research Foundation For The State University Of New York
July 06, 2017 - N°20170195412

A cluster of nodes, comprising: a plurality of nodes, each having a security policy, and being associated task processing resources; a registration agent configured to register a node and issue a node certificate to the respective node; a communication network configured to communicate certificates to authorize access to computing resources, in accordance with the respective security policy; and a processor ...
Systems and methods for automating client-side synchronization of public keys of external contacts
Verisign, Inc.
July 06, 2017 - N°20170195299

Systems and methods for automating client-side synchronization and discovery of public keys and certificates of external contacts include a key synchronizer at a client device. The key synchronizer obtains, from the client device, an external contact associated with an external domain outside of a local domain of the client device and then identifies, based on the external domain, a public ...
Persona and device based certificate management
T-mobile Usa, Inc.
July 06, 2017 - N°20170195124

A user device implements a certificate authority for issuing digital certificates that extend to other computing devices a level of trust to a particular user paired with the user device. The user device may obtain user persona information, generate a user key, and combine the user key with a device key for the generation of a digital certificate. The computing ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Apparatus and method for controlling its operation
Nxp B.v.
July 06, 2017 - N°20170192421

According to a first aspect of the present disclosure, a apparatus is provided, the apparatus comprising a reader and a controller operatively coupled to the reader, wherein the reader is configured to receive certificate data from an external tag and to provide said certificate data to the controller, and wherein the controller is configured to receive said certificate data from ...
Methods and apparatus for storage and execution of access control clients
Apple Inc.
June 29, 2017 - N°20170188234

Disclosed herein is a technique for securely provisioning access control entities (e. G., electronic subscriber identity module (esim) components) to a user equipment (ue) device. In one embodiment, a ue device is assigned a unique key and an endorsement certificate that can be used to provide updates or new esims to the ue device. The ue device can trust esim ...
Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
Wistaria Trading Ltd
June 29, 2017 - N°20170187729

Disclosed herein are methods and systems for transmitting streams of data. The present invention also relates to generating packet watermarks and packet watermark keys. The present invention also relates to a computerized system for packaging data for transmission to a user. The system may utilize computer code to generate a bandwidth rights certificate that may include: at least one cryptographic ...
Service request modification
Hewlett Packard Enterprise Development Lp
June 29, 2017 - N°20170187716

Example implementations relate to providing a web service. For example, an implementation includes a gateway to receive client certificate information from the client computing device and to determine a trust state of the client computing device based on the client certificate information. The gateway is also to receive a service request from the client computing device and to modify the ...
Certificate management apparatus and certificate management method
Hewlett Packard Enterprise Development Lp
June 29, 2017 - N°20170187706

An update determination information output unit outputs update determination information being information for determining whether or not to update a certificate. A certificate cache stores the certificate on a volatile memory. An operation unit stores the update determination information output by the update determination information output unit in the certificate cache by relating to the certificate, and based on the ...
Detection of undesired computer files using digital certificates
Fortinet, Inc.
June 29, 2017 - N°20170187684

Methods and systems for detecting undesirable computer files based on scanning and analysis of information contained within an associated digital certificate chain are provided. According to one embodiment, a file having associated therewith a certificate chain is received. A type and structure of the file are identified. A location of the certificate chain is determined based on the identified type ...
Detection of vulnerable root certificates in software containers
Twistlock, Ltd.
June 29, 2017 - N°20170187540

A method and system for detecting vulnerable root certificates in container images are provided. The method includes receiving an event to scan at least one container image hosted in a host device, wherein the least one container image includes resources utilized to execute, by the host device, at least a respective software application container; extracting contents of layers of the ...
Methods of proving validity and determining validity, electronic device, server and computer programs
Telefonaktiebolaget Lm Ericsson (publ)
June 29, 2017 - N°20170187532

There is provided a method of an electronic device for providing a one-time proof of knowledge about a one-time signing key to a server without revealing the one-time signing key. The method comprises computing a hash as a hash function from the one-time signing key, and transmitting, to the server, the computed hash, an identity associated with the electronic device ...
Loading