Images List Premium Download Classic

Certificate

Certificate-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Bypassing certificate pinning
International Business Machines Corporation
January 11, 2018 - N°20180013754

A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of the client and the hosting server and provides a proxy security certificate to the client. In response to the client extracting a proxy authentication component from the proxy security certificate, operation of the client is ...
Bypassing certificate pinning
International Business Machines Corporation
January 11, 2018 - N°20180013753

A client application performs certificate pinning as a means of authenticating the identity of a server. A proxy is interposed in the communications path of the client and the hosting server and provides a proxy security certificate to the client. In response to the client extracting a proxy authentication component from the proxy security certificate, operation of the client is ...
Securing connections to unsecure internet resources
Team Internet Ag
January 11, 2018 - N°20180013752

A computer program product having a computer readable non-transitory storage medium. The storage medium having encoded thereon a computer code for instructing at least one hardware processor to automatically: (a) intercept a plurality of data packets transported over a computer network; (b) analyze said plurality of data packets to identify at least one secure connection request to an unsecure domain ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Dynamic access control to network resources using federated full domain logon
Citrix Systems, Inc.
January 04, 2018 - N°20180007059

Methods and systems for granting or denying a client device access to one or more resources in a remote computing environment are described herein. During authentication, context information for the client device, such as device type, device location, etc., may be determined. A computing device in the system may receive data indicating the context information, such as data indicating that ...
Systems and methods for authenticating network messages
Mastercard International Incorporated
January 04, 2018 - N°20180007035

Networks and methods for use in authenticating messages are provided. One exemplary method generally includes receiving a message from a client, where the message includes a client certificate. The method also includes validating, by an application programming interface (api) gateway, a computing device based on a certificate identifying the computing device as a recognized computing device, and validating, by the ...
Communication device, communication method, communication system, and non-transitory computer readable medium
Kabushiki Kaisha Toshiba
January 04, 2018 - N°20180007033

According to one embodiment, a communication device includes a first communicator capable of communicating with a server through a first network; a second communicator capable of communicating with an operation terminal of a user through a second network; a first communication processor to execute a first process; a second communication processor to receive, through the second communicator, an issue request, ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Splitting an ssl connection between gateways
Finjan, Inc.
January 04, 2018 - N°20180007010

A system for secure communication, including a first security computer communicatively coupled with a client computer via an ssl connection, including a certificate creator, for receiving certificate attributes of a server computer certificate and for creating a signed certificate therefrom, and an ssl connector, for performing an ssl handshake with the client computer using the signed certificate created by said ...
Detection of undesired computer files using digital certificates
Fortinet, Inc.
January 04, 2018 - N°20180007006

Methods and systems for detecting undesirable computer files based on scanning and analysis of information contained within an associated digital certificate chain are provided. According to one embodiment, a file having associated therewith a certificate chain is received. A type and structure of the file are identified. A location of the certificate chain is determined based on the identified type ...
Secure communication of iot devices for vehicles
T-central, Inc.
January 04, 2018 - N°20180006829

Method for establishing secure communication between a plurality of iot devices in one or more vehicles include: provisioning the plurality of iot devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of iot devices; establishing a secure communication line between the plurality of iot devices by authenticating respective communication lines ...
Digital data content certification system, data certification device, user terminal, computer program and method therefor
Genius Note Co., Ltd
January 04, 2018 - N°20180006828

A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed simultaneously. A data authentication device (1) is provided with: an original data receiving means which is communicably connected to a user terminal (2) and a timestamp provision device (3), and receives original data to be authenticated from the ...
Information sharing system, computer, and information sharing method
Hitachi, Ltd.
January 04, 2018 - N°20180006810

It is provided an information sharing system, comprising a server, and an in-vehicle system. The server includes: a first storage part; a first key generation part configured to generate a first private key and a first public key, if keys can be exchanged with the in-vehicle system; and a signature generation part configured to generate a signature value of the ...
Method of manufacturing a hearing device and hearing device with certificate
Gn Hearing A/s, Ballerup, Denmark
December 28, 2017 - N°20170374480

A hearing device includes: a processing unit configured to compensate for hearing loss of a user of the hearing device; a memory unit; and an interface; wherein the memory unit has a hearing device certificate stored therein, the hearing device certificate comprising: a hearing device identifier, a plurality of hearing device keys, at least one hearing device key identifier indicative ...
Attribute-based access control
International Business Machines Corporation
December 28, 2017 - N°20170374060

A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. The received security token with the added additional access control attributes is re-signed, with a private ...
Certificate Patent Pack
Download 288+ patent application PDFs
Certificate Patent Applications
Download 288+ Certificate-related PDFs
For professional research & prior art discovery
inventor
  • 288+ full patent PDF documents of Certificate-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and method for secure online authentication
Ao Kaspersky Lab
December 28, 2017 - N°20170374057

Disclosed are systems and methods for secure online authentication. An exemplary method comprises: determining, via a processor of a computing device, a connection being established between a browser application installed on a computer system and a protected website; obtaining information relating to the protected website in response to obtaining a request for authentication from the protected website; establishing a protected ...
Method for operating a network and a network
Nec Europe Ltd.
December 28, 2017 - N°20170374051

A method for providing a guarantee of a network property includes receiving, from a network user, a signature and a request for the network property, wherein the request for the network property includes a public key of the network user; verifying that the signature received from the network user matches the public key of the network user; demonstrating the capability ...
Intercepting secure session upon receipt of untrusted certificate
A10 Networks, Inc.
December 28, 2017 - N°20170374043

A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device and the security gateway, receiving a first secure session request ...
Routing cloud messages using digital certificates
General Electric Company
December 28, 2017 - N°20170373860

Provided are a system and method for routing messages in a multi-tenant cloud computing environment based on digital certificates. In one example, a server includes a network interface configured to receive a request and a digital certificate from a network object, where the digital certificate includes a plurality of attributes. The server also includes a processor configured to determine whether ...
Secure circuit for encryption key generation
Apple Inc.
December 28, 2017 - N°20170373843

Techniques are disclosed relating to relating to a public key infrastructure (pki). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and ...
Payment by mobile device secured by f-puf
Samsung Electronics Co., Ltd.
December 28, 2017 - N°20170372306

A method, executed by a processor of a mobile communication device, for authenticating a purchase transaction includes receiving a certificate from a purchase agent and authenticating the purchase transaction based upon a comparison outcome of the certificate and a flash physical unclonable function (f-puf) of a nonvolatile memory device integrated within the mobile communication device.
Method of authenticating and exchanging virtual currency
Samsung Electronics Co., Ltd.
December 28, 2017 - N°20170372277

A method of authenticating and exchanging virtual currency is used to permit secure ownership of virtual currency and manage financial transactions. The method is performed by a system that includes a user computing device and plurality of remote servers. The user computing device stores an unverified certificate which is used as currency. The plurality of remote servers is used to ...
Updating live system with static changes
Microsoft Technology Licensing, Llc
December 28, 2017 - N°20170371639

Technologies are described for updating a live system with static changes. According to some examples, changes such as installing and/or removing features may be applied to a cloud based service in live environment without disrupting the service. New software may be patched and installed on an upgraded machine (i. E., server). New features, diagnostics, and language packs may be ...
Loading