Images List Premium Download Classic

Certificate

Certificate-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Secure messages for internet of things devices
Hewlett-packard Development Company, L.p.
September 14, 2017 - N°20170264597

Example implementations relate to secure messages for iot devices. For example, a system for secure messages for iot devices may include an iot device coupled to a network including a plurality of web services. The iot device may store a service certificate for each of the plurality of web services, generate a secure message for a web service among the ...
Issuing, presenting and challenging mobile device identification documents
International Business Machines Corporation
September 14, 2017 - N°20170264594

Methods and systems of authenticating electronic identification (id) documents may provide for receiving a decryption key and an encrypted id document from a certificate authority server at a mobile device, wherein the encrypted id document includes a read only document having a photograph of an individual. Additionally, the decryption key may be applied to the encrypted id document to obtain ...
Access control system and method for use by an access device
Liberty Plugins, Inc.
September 14, 2017 - N°20170263063

Systems and methods are provided to allow a smart phone or any terminal to activate a door lock using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes a processor and a communication module. The process has control of a door lock and is ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and device for providing verifying application integrity
Thomson Licensing
September 14, 2017 - N°20170262656

A device receives an apk file for the application, during which the code is modified. A checksum for the modified code is generated and signed using a signing key of a trusted entity in the os of the device. The signed checksum and a certificate for the signing key are stored in reserved spaces in memory. The modified application may ...
Local-area network (lan) -based location determination
Facebook, Inc.
September 07, 2017 - N°20170257454

In one embodiment, a method includes receiving a request for the client device to access a communication network. The request includes data identifying the client device based on an intermediate device certificate signed by one or more of the computing devices. The method also includes associating the request with a user profile of a social-networking system; and granting the client ...
Authenticating or controlling software application on end user device
F-secure Corporation
September 07, 2017 - N°20170257361

A method of authenticating or controlling a software application on an end user device. The method includes selecting a code signing certificate related to an application developer; selecting one or more clean files from a database of known clean files signed with the selected code signing certificate; generating an application developer identification for the application developer on the basis of ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure tunneling for connected application security
Ford Global Technologies, Llc
September 07, 2017 - N°20170257345

A computing platform of a vehicle may receive a request, from a mobile application accessing a secure vehicle function, to create a secure tunnel between the computing platform and the mobile device; retrieve an application certificate from the mobile application; and validate the creation of the secure tunnel using the application certificate and a module certificate from a local policy ...
Authenticating connections and program identity in a messaging system
Blackrock Institutional Trust Company, N.a.
September 07, 2017 - N°20170257282

A messaging system enables client applications to send and receive messages. The messaging system includes independent component programs performing different functions of the messaging system, such as connection managers that maintain network connections with the client applications, a message router that sends received messages to recipient applications through network connections, and a dispatcher that authenticates other component programs. A messaging ...
Information security realizing method and system based on digital certificate
Zte Corporation
September 07, 2017 - N°20170257221

A digital certificate based information security realization method and system are provided. The method includes: separately issuing a digital certificate for a cloud management host, a physical cloud computing host and a virtual cloud computing machine; and carrying out a compliance authentication according to a corresponding digital certificate when the cloud management host, the physical cloud computing host and the ...
Software verification systems with multiple verification paths
Apple Inc
September 07, 2017 - N°20170255775

Systems, methods, and machine readable media are described which use code verification to verify the authenticity of installed software. The code verification can be performed in any one of a set of different paths, in one embodiment, which includes a first path using a trust cache of hashes of operating system components and one or more platform applications that are ...
Establishment of a secure connection for a communication session
Telefonaktiebolaget Lm Ericsson (publ)
August 31, 2017 - N°20170251062

A system, method, node, user equipment and computer program for establishment of a secure connection between a user equipment (100) and a media gateway (130) at setup of a communication session with another party (150) is described. The media gateway (130) is controlled by a control server (120). The control server (120) receives a communication session setup request from the user equipment (100) and determines an indication ...
Method and system for managing secure custom domains
Lantirn Incorporated
August 31, 2017 - N°20170250978

Method, system and infrastructures for managing certificates for platform providers are described. A platform provider provides a platform to host a plurality of virtual sites designated individually with custom specified hostnames. According to one aspect of the present invention, traffic originating from a web browser to a designated website with a hostname is directed to a server (herein “...
Hypervisor agnostic bidirectional secure channel for guest agent transport
Nutanix, Inc.
August 31, 2017 - N°20170250976

Systems, methods, and computer readable medium for virtualized computing environments. A method for providing a connection between a guest virtual machine and a service virtual machine uses driver code functions to establish a listening port on the service virtual machine without providing a listening port on the guest virtual machine. The guest virtual machine initiates a remote procedure call socket ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Obtaining and using time information on a secure element (se)
Apple Inc.
August 31, 2017 - N°20170250826

A secure element (se) with a notion of time useful for checking secure items is disclosed herein. Use of public key infrastructure (pki) with secure elements is improved by verifying secure items used by an se. Methods of obtaining time information by the se include push, pull, opportunistic, and local interface methods. The se uses the time information to evaluate ...
Authentication system, image forming apparatus, method of controlling the same, and storage medium
Canon Kabushiki Kaisha
August 31, 2017 - N°20170250825

An image forming apparatus that performs an encrypted communication using a public key, and a method of controlling the same, determine the validity of a certificate in accordance with a certificate revocation list and/or the query to the certificate verification server. At a time of the determination of the validity of the certificate, it is selected whether to use ...
Efficient certificate revocation list processing
Red Hat, Inc.
August 31, 2017 - N°20170250824

Efficient certificate revocation list (crl) processing is disclosed. A desired modification to an encoded crl is determined. A computing device sequentially processes, during a first pass, a first crl stream comprising the crl to identify a crl length difference between the crl and a modified crl based on the desired modification. The computing device sequentially processes, during a second pass, ...
Method of managing implicit certificates using a distributed public keys infrastructure
Commissariat A L'energie Atomique Et Aux Energies Alternatives
August 31, 2017 - N°20170250822

A method of managing implicit certificates of an elliptical curve encryption (ecqv). The implicit certificates are stored in different nodes of the network as a function of a distributed hash table (dht) and not with a single certification authority. The implicit certificate of the public key associated with a node is obtained by chaining elementary certification operations with a sequence ...
Application specific certificate management
Vmware, Inc.
August 31, 2017 - N°20170250807

Application specific certificate deployment may be provided. An application may generate a security certificate comprising a public key and a first private key. The public key may be stored in a shared segment of a memory store, from where it may be retrieved and signed. The signed public key may be re-deployed and/or used to transmit securely encrypted resources.
Quality certification method for an additive manufacturing process
University Of Louisville Research Foundation, Inc.
August 31, 2017 - N°20170246809

In a quality certification method, a digital, three-dimensional quality certificate (3dqc) is created by the manufacturer and is delivered to the customer along with the manufactured part. The data in the 3dqc can be viewed using a three-dimensional rendering system, such that the customer that review and confirm that certain process monitor values were within specification during the entire manufacturing ...
Authenticated network time for mobile device smart cards
Verizon Patent And Licensing Inc.
August 24, 2017 - N°20170244697

A mobile device sends a network attach request to a network node, and receives an authentication challenge from the network node, where the authentication challenge includes an authentication token, a random number, and a time variable associated with a current time at the network node. A microprocessor smart card of the mobile device retrieves the time variable from the authentication ...
Automatic elevation of system security
Emc Corporation
August 24, 2017 - N°20170244569

A system for automatic setting of system security comprises an input interface and a processor. The input interface is configured to receive an indication to set a secure mode. The processor is configured to: determine whether the indication to set the secure mode comprises an indication to set a certificate mode; in the event that the indication to set the ...
Loading