This page is updated frequently with new Certificate-related patent applications.
| Entity authentication|
Disclosed are an entity authentication method and device, involving: sending, by an entity a, a first identity authentication message to an entity b; inspecting, by the entity b after receiving the first message, the validity of a certificate of the entity a; sending, by the entity b, a second identity authentication message to the entity a; inspecting, by the entity a after receiving the second message, the correctness of field data therein; calculating, by the entity a, a secret information and message authentication code using a private key thereof and a temporary public key of the entity b, and sending a third message to the entity b; inspecting, by the entity b after receiving the third message, the correctness of field data therein; calculating, by the entity b, a secret information and message authentication code using a private key thereof and a public key of the entity a.. .
China Iwncomm Co., Ltd.
| Controlling access to clinical data analyzed by remote computing resources|
A method for controlling access to data being processed by a remote computing resource includes issuing a public encryption key for a data creator from a public certificate authority, detecting an encounter with a data owner, creating private encryption keys for the data creator and the data owner in response to detecting the encounter, encrypting data being sent to the remote computing resource with the public encryption key, the data creator's private encryption key, and the data owner's private encryption key, decrypting the data based on public verification of the public encryption key and local verification of the data creator's private encryption key and the data owner's private encryption key at the remote computing resource, and controlling the data creator's access to the data by altering the permission of at least one of the public encryption key and data creator's private encryption key.. .
Koninklijke Philips N.v.
| Secure communications using organically derived synchronized processes|
Organically derived synchronized processes provide encryption parameter management in a certificate-less system. A first node generates a parameter data set containing multiple values; uses a seed value stored at the first node to select values from a random parameter data set to form a parameter subset; generates encryption parameters using the subset; encrypts user data using the encryption parameters; generates a signature based at least on the parameter data set; and transmits a start frame including the parameter data set, the encrypted user data, and the signature.
Olympus Sky Technologies, S.a.
| Tax exemption processing system, information processing inputting electronic signature|
A storage device comprises a purchaser data file which stores information recorded in a certificate for certifying that a purchaser who purchases a commodity is subject to a tax exemption and information relating to sales of the commodity purchased by the purchaser at a tax-free store in association with a purchaser code of the purchaser. The information processing apparatus acquires the purchaser code of the purchaser who receives refund on a commodity purchased in a facility, receives the purchaser data file associated with the acquired purchaser code from the storage device, creates an electronic document required for a tax exemption measure based on the information recorded in the certificate and the information relating to the sales of the commodity in the purchaser data file received from the storage device, inputs an electronic signature detected by a detection device for detecting the electronic signature to a signature column of the electronic document, and outputs data of the electronic document in which the electronic signature is input to the signature column..
Toshiba Tec Kabushiki Kaisha
|Provisioning remote access points|
Provisioning remote access points for use in a telecommunication network. A remote access point contains identity information established during manufacturing; this identity information may be in the nature of a digital certificate.
Aruba Networks, Inc.
|System for domain control validation|
A system and method for domain control validation is presented. At a certificate authority a request is received.
Go Daddy Operating Company, Llc
|Systems and methods related to establishing a temporary trust relationship between a network-based media service and a digital media renderer|
Systems and methods related to establishing a temporary trusted relationship between a network-based media service and a device that does not have a trusted relationship with the network-based media service are disclosed. In one embodiment, a method of operation of a first device having a trusted relationship with a network-based media service to establish a temporary trusted relationship between the network-based media service and a second device that does not have a trusted relationship with the network-based media service is provided.
Telefonaktiebolaget Lm Ericsson (publ)
|Retrieval of data across multiple partitions of a storage device using digital signatures|
A system and method for exchanging data among partitions of a storage device is disclosed. For example, data stored in a first partition is exchanged with an application included in the first partition or with a second application included in a second partition.
Google Technology Holdings Llc
|Group management of authenticated entities|
Exemplary embodiments provide various techniques for managing groups of authenticated entities. In one exemplary computer-implemented method, an entity accesses a group roster that includes a first group identifier identifying a first group, a first group digital certificate associated with the first group, and a first entity identifier identifying the entity being a member of the first group.
|Secure instant messaging system|
A secure instant messaging (im) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (ca) issues security certificates to users binding the user's im screen name to a public key, used by sending users to encrypt messages and files for the user.
Tax exemption processing system, management server and settlement apparatus
A tax exemption processing system comprises a reception device, a settlement apparatus, a checkout device and a storage device. The reception device receives information recorded in a certificate for certifying a purchaser who is subject to a tax exemption and generates a tax exemption reception data in which the information recorded in the certificate is associated with a unique purchaser code for identifying the purchaser.
Toshiba Tec Kabushiki Kaisha
Controlling access to data
A system for controlling access to data, includes: one or more interfaces operable to receive an account alias messages, an account alias message comprising an account alias and one or more account identifiers; receive an account transaction message and a secure socket layer certificate generated with a block chain, the account transaction message comprising an account alias and a proposed transaction, and one or more processors operable to: determine that the received account transaction message is valid based on the received secure socket layer certificate by verifying that information included in the secure socket layer certificate is stored in the block chain, determine an account identifier associated with an account alias received in an account transaction message, and authorize the received proposed transaction for a financial account associated with the determined account identifier.. .
Bank Of America Corporation
Method and facilitating electronic payments using a wearable device
Apparatus and methods for binding a wearable device for use with the wearable device, a terminal, and a server are presented. The method executed by the wearable device includes providing device information to the terminal, receiving a device certificate from the server, and storing the device certificate for performing payment using the corresponding user account.
Alibaba Group Holding Limited
Method of managing credentials in a server and a client system
A method for deploying credentials in a server and a client system including three devices. The second device has primary credentials including a public key, a private key and a primary certificate.
Variable call-date bonds
A computer-based system, method and non-transitory medium for reducing cost to an issuer of a debt instrument. One or more computers and connected electronic storage that stores the computer-executable instructions, and data, together, process a structure for the operation of the debt investment which includes handling interactions with participants in the debt instrument and administrators by way of network connections.
Environmental Financial Products, Llc
System and trading digital assets between mobile devices
A mobile device and method are disclosed for trading a digital asset with a buyer device. The method provides for publishing a publicly available list of digital assets from the selling mobile device that can be accessed by potential buyer mobile devices over a network.
Certificate validation and channel binding
A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to establish a secure channel with the constrained network entity. The constrained network entity may receive a certificate from the endpoint attempting to establish the secure channel and the constrained network entity may send the certificate asserted by the endpoint to a core network entity for validation.
Interdigital Patent Holdings, Inc.
Authentication of networked devices having low computational capacity
Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node.
Texas Instruments Incorporated
Method for controlling vehicle security access based on certificate
A method for controlling access security at a vehicle gateway of a vehicle including at least one control unit in communication with the vehicle gateway includes: receiving a certificate from a diagnosis device; recognizing a rating of the certificate; and performing at least one of an integrity checking process and a security key authorization process according to the rating of the certificate to determine whether the diagnosis device is allowed to access to the vehicle.. .
Hyundai Motor Company
Trusting intermediate certificate authorities
A modification to commercial browsers is made that can enable them to detect a change in the server certificate of certain sensitive websites. Browsers are modified to remember certain fields in a certificate, the entire certificate, or hashes of certain fields or the entire certificate.
Detection of fraudulent certificate authority certificates
Systems and methods for verifying a certificate authority are provided. According to one embodiment, a network security device intercepts a session between a client and a server, wherein a secure channel is requested to be established between the client and the server in the session.
Image verification by an electronic device
A method for verifying an image by a first electronic device, the method comprising the first electronic device: sending a request for an image to a second electronic device, wherein the second electronic device is remote from the first electronic device and, optionally, a server; receiving an image and a certificate from the second electronic device, wherein the certificate comprises a protected checksum of at least the image; generating a checksum in dependence on at least the received image; performing a comparison in dependence on said generated checksum and the protected checksum received in the certificate; and verifying the received image in dependence upon the comparison. Advantageously, the first electronic device is able to verify each received image and to prevent the display of any received images that are not authenticated.
Mastercard International Incorporated
Computing device to securely activate or revoke a key
Disclosed is an apparatus and method to securely activate or revoke a key. For example, the apparatus may comprise: a storage device to store a plurality of pre-stored keys; a communication interface to receive an activate key command and a certificate associated with one of the pre-stored keys; and a processor.
Machines, systems, computer-implemented methods, and computer program products to test and certify oil and gas equipment
Embodiments of machines, systems, computer-implemented methods, and computer program products certify oil and. Gas well equipment.
S.p.m. Flow Control, Inc.
The embodiments of the present invention disclose a certificate acquiring method and device. A virtualized network function manager (vnfm) receives a certificate application proxy message sent by a virtualized network function (vnf) instance.
Huawei Technologies Co., Ltd.
Intelligent certificate discovery in physical and virtualized networks
Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing device and a second computing device. The mechanisms receive a data message from either the first computing device or the second computing device.
International Business Machines Corporation
End-to-end certificate pinning
Some embodiments implement end-to-end certificate pinning for content intake from various content providers and for content distribution to various end users. To ensure secure retrieval of content provider content, the content distributor pins the content provider to one or more certificate authorities.
Verizon Digital Media Services Inc.
Method and system for creating and checking the validity of device certificates
To easily identify an invalid device certificate by means of a validity check when signing keys that are used to create device certificates are compromised, a piece of status information is provided for device certificates that comprises positive evidence of the existence and validity of the device certificate, and alternatively or additionally to apply a special validity model for device certificates, wherein the time of issue of the device certificate is documented by means of a signed electronic timestamp, and wherein a different signing key is used for signing the timestamp than for signing the device certificate. Additionally, all information that is required for the validity check of a device certificate is stored in a memory of the device or in a memory associated with the device, so that an identity check on the device can be performed at any time without fetching additional data..
Phoenix Contact Gmbh & Co. Kg
A certificate acquiring method and device, where the method includes receiving a certificate application representation message sent by a newly installed virtualized network function component (vnfc) instance, sending a certificate request message to a certification authority, and acquiring a certificate issued by the certification authority. In this way, the newly installed vnfc instance does not need to use a current manner for a virtualized network function (vnf) to acquire a certificate, which effectively avoids a problem of a cumbersome and more complex process caused when the newly installed vnfc instance acquires a certificate..
Huawei Technologies Co., Ltd.
Applications of secured memory areas and secure environments in policy-based access control systems for mobile computing devices
Systems and methods are described for utilizing a secure environment on a mobile computing device for applying policy-based decision management in response to access requests from untrusted areas. A policy decision processor (pdp) within the secure environment provides a policy decision in response to an access query.
Sequitur Labs Inc.
A telematics system that includes a security controller is provided. The security controller is responsible for ensuring secure access to and controlled use of resources in the vehicle.
Cellport Systems, Inc.
Method for assisting restricted or handicapped people, and apparatuses for performing same
A method is disclosed for assisting limited or handicapped persons wherein an infrastructure unit periodically transmits a signal with an auxiliary function offer from the infrastructure unit, wherein a mobile communication unit, which is situated close to the infrastructure unit, of the limited or handicapped person receives the signal with the auxiliary function offer and takes a use authorization certificate as a basis for forming a signal with an auxiliary function request and returns it to the infrastructure unit, and wherein the infrastructure unit provides at least one auxiliary function for the limited or handicapped person in accordance with the auxiliary function request. This may assist limited or handicapped persons with the auxiliary functions suitable for them in the region of infrastructure elements, e.g., escalators, revolving doors and lifts, in a simple and inexpensive manner, with misuse largely being precluded..
Secure storage of enterprise certificates for cloud services
A system performs secure storage of certificate keys. The system receives a user password and a certificate that is locked by the user password.
Oracle International Corporation
Secure key storage systems, methods and apparatuses
The systems, methods and apparatuses described herein provide a computing environment that manages private key storage. An apparatus according to the present disclosure may comprise a first non-volatile storage for storing a private root key for signing digital certificates, an input device for receiving manual input from an operator, a communication interface consisting of a one-way transmitter for transmitting information from the apparatus, and a processor.
Ologn Technologies Ag
Device birth certificate
A device identification is generated for a programmable device. A security key is generated to protect a content of the programmable device.
Data I/o Corporation