Class / Patent application number | Description | Number of patent applications / Date published |
713173000 | Pre-loaded with certificate | 27 |
20080250246 | Method for Controlling Secure Transactions Using a Single Multiple Dual-Key Device, Corresponding Physical Deivce, System and Computer Program - A device is provided for controlling secure transactions using a physical device held by a user and bearing at least one first pair of asymmetric keys, including a first device public key and a first corresponding device private key. The control includes, prior to implementing the device, certifying a first device public key and characteristics data of the physical device by signing with a first certification key, delivering a factory certificate, after verifying that the device private key is housed in a tamper-proof zone of the physical device. At least one second pair of asymmetric keys is generated, including a second device public key and a second device private key housed in a tamper-proof zone of the device. A second device public key is certified by signing with at least the first device private key, delivering a provisional certificate. The factory and provisional certificate are verified using, respectively, a second certification key corresponding to the first certification key, and the first device public key. In case of positive verification, the method includes delivering by a trusted third party a device certificate corresponding to the signature by the provider at least the second device public key and an identifier of the user and the characteristic data of the device. | 10-09-2008 |
20090077382 | METHOD FOR THE PREPARATION OF A CHIP CARD FOR ELECTRONIC SIGNATURE SERVICES - The invention relates to a method for preparing a chip card for electronic signature services. According to said method, data is exchanged between a chip card user and a signature portal, an asymmetric pair of keys and a signature PIN that is associated with the asymmetric pair of keys being generated on the chip card by means of a software application which can be executed on the chip card, and the chip card communicating the signature PIN to the user. | 03-19-2009 |
20090164787 | METHOD AND SYSTEM FOR THE TRANSMISSION OF IDENTIFICATION SIGNALS - The invention relates to a system for information transmission between a write- and/or read installation and several portable devices. According to the invention, the information transmission between a portable device and the write- and/or read installation is effected via two channels. On the one hand a first information transmission takes place capacitively and preferably with the human body as a transmission medium. On the other hand, the information transmission procedure also includes a second or conventional “contactless” transmission, i.e. an inductive transmission or a transmission via electromagnetic waves, for example in the radio frequency-, microwave- or infrared range. | 06-25-2009 |
20090199006 | Method and Device for Secure Mobile Electronic Signature - The present invention relates to a mobile, portable and compact signature device which is used for simple and secure signature of information by a user. In particular the device is protected from manipulation attempts by the combination of two measures: firstly the architecture ensures that information can only be shown on the display and signed when decrypted by the Smartcard in the device and thus intended for a specific user identity represented by the Smartcard. Secondly further manipulation opportunities for a potential attacker are restricted by the permanent combination in everyday use of the signature device with display and Smartcard. The area of application of the signature device disclosed and associated method includes but is not restricted to the authorisation of financial transactions. | 08-06-2009 |
20100031046 | Method for Authorizing Access to at Least One Automation Component of a Technical System - A method for authorizing access of different types to an automation component of a technical system and, if needed, logging and digitally signing them, is provided. An authorization unit, for example a smart card, holds a digital signature function and information of a user and allocated access rights. Optionally, the authorization unit also comprises a budget account for services for e.g. billing software services. | 02-04-2010 |
20100049981 | SECURE MEDIA PERIPHERAL ASSOCIATION IN A MEDIA EXCHANGE NETWORK - A method for establishing secure access to a media peripheral in a home via a node in a communication network may include acquiring by the node, security data associated with the media peripheral. The method may include searching by the node, for a previously acquired security data associated with a location of previous operation of the media peripheral. The method may further include communicating between the node and the media peripheral, information associated with the media peripheral, while the media peripheral is located in the home, when the previously acquired security data is not found. The node may utilize the acquired security data associated with the media peripheral and the previously acquired security data to facilitate secure communication between the media peripheral in the home and the communication network, when the previously acquired security data is found. | 02-25-2010 |
20100153730 | Conditional access method and system for in broadcast transmissions - A method for conditionally allowing fruition of broadcast contents, broadcast by a contents broadcaster ( | 06-17-2010 |
20100180120 | INFORMATION PROTECTION DEVICE - A method for communication includes coupling an information protection device ( | 07-15-2010 |
20100293382 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 11-18-2010 |
20100313028 | Electronic Signature Method and Electronic Signature Tool - The present invention provides an electronic signature method and an electronic signature tool. The method includes: outputting verification prompt information; receiving verification confirmation information inputted by a user; checking whether the verification confirmation information matches the verification prompt information, and performing the predetermined electronic signature operation if the verification confirmation information matches the verification prompt information. Through the electronic signature method and the electronic signature tool of the present invention, an attack of other users on the network can be prevented, secure transactions are realized. The method and the tool are used conveniently and can be popularized easily. | 12-09-2010 |
20110238995 | METHODS FOR AUTHENTICATION USING NEAR-FIELD - Authentication methods are used to authenticate, a device | 09-29-2011 |
20110258453 | METHOD AND APPARATUS FOR AUTHENTICATION TOKEN-BASED SERVICE REDIRECTION - A method, apparatus, and computer readable medium is provided. According to an embodiment, a method includes, receiving a message from a client. The method further includes, forwarding the message to a first service when the message includes an authentication token, where the authentication token indicates that the client can access the first service. The method further includes, forwarding the message to a second service when the message excludes the authentication token. The receiving the message from the client and the forwarding the message to the first service occur over a confidential channel. | 10-20-2011 |
20120216042 | System and Method for Provisioning Device Certificates - A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established communications channel between the communication device and the server. The device certificate request comprises at least a user identifier and a device identifier. The server provides to the communication device a device certificate that includes the user identifier and the device identifier and that is signed by a private key of a certificate authority. | 08-23-2012 |
20120239934 | CREATION OF USER DIGITAL CERTIFICATE FOR PORTABLE CONSUMER PAYMENT DEVICE - A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate authority is described. The registration authority, typically a large financial or credit institution, has already performed the initial overhead steps necessary for a digital authentication system using a chip card. These steps include minting and distributing the chip card, establishing that the key pair and card are given to the right person, and creating the certificate library. The reliant party leverages this cryptographic infrastructure to issue its own digital certificate and certificate chain to a user already having a chip card from the registration authority. Consequently, a user can have additional digital certificates issued to him and stored at a user-specific memory in a remote certificate library without having the chip card modified. | 09-20-2012 |
20120297195 | ENABLING USE OF A CERTIFICATE STORED IN A SMART CARD - If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the certificates already installed in the smart card for the particular purpose. The selected certificate may be imported into the computerized device. | 11-22-2012 |
20130198520 | UNATTENDED CODE UPDATE OF STORAGE FACILITY - Various embodiments for providing an update to at least one storage facility in a computing storage environment are provided. In one embodiment, media is received in one or more updatable elements of one or more components of the at least one storage facility, each of the one or more updatable elements including one or more unique update images and one or more unique update commands, a security verification is performed on the update via a certificate authentication mechanism to confirm a validity of the update, a safety verification is performed on the update to confirm a suitability of the update to the at least one storage facility, the update is installed in the at least one storage facility, and the update in the at least one storage facility is processed by traversing a fixed state machine for each updatable element. | 08-01-2013 |
20140281553 | SECURE COMMUNICATIONS KIT AND CLIENT DEVICE FOR SECURELY COMMUNICATING USING THE SAME - A secure communication kit is disclosed. The secure communication kit may include a plurality of tangible security tokens; each security token storing one or more cryptographic keys and a group identifier. A first cryptographic key stored on each security token may correspond to one of the cryptographic key(s) stored on every of the other security tokens. The group identifier stored on each security token may correspond to each group identifier stored on every of the other security tokens. A client device for securely communicating using the secure communication kit is also disclosed. | 09-18-2014 |
20140304514 | APPLICATION PROGRAMMING INTERFACE FOR WEB APPLICATION PLATFORM SECURITY SYSTEM - The present invention includes a system for monitoring the transmission of digital files across a secured boundary of a private ecosystem. Because an application programming interface making calls to a web application platform controls the placement of security tokens, distinct programs on devices from which transmissions originate, or are bound, to place and update tokens is generally obviated. | 10-09-2014 |
20140359294 | CONFIGURABLE, SECURE QUICK RESPONSE CODE CREATION AND USE - Systems, software, and methods are provided for configurable, encrypted, secure QR code creation and use. Furthermore, these codes can be used by many entities to provide improved monitoring for a variety of systems. | 12-04-2014 |
20140359295 | METHOD OF TRANSFERRING THE CONTROL OF A SECURITY MODULE FROM A FIRST ENTITY TO A SECOND ENTITY - A method is provided for transferring control of a security module from a first entity to a second entity. The security module has a first security domain controlled by the first entity by at least one first secret control key specific to the first entity, and a second security domain, the second domain containing a private key and a certificate of a public key of a controlling authority. The method includes: receiving a request to obtain the certificate; sending the certificate; receiving data encrypted by the public key of the certificate, the data including at least one second secret control key specific to the second entity; decrypting the data; verifying the data; and if the verification is positive, replacing the at least one first secret control key by the at least one second secret control key. | 12-04-2014 |
20140372762 | TRUSTED DEVICE - A trusted device, such as a wristwatch | 12-18-2014 |
20150121077 | METHOD AND APPARATUS FOR CONTROLLING LOCK STATE IN ELECTRONIC DEVICE SUPPORTING WIRELESS COMMUNICATION AND SYSTEM THEREFOR - A method and an apparatus for controlling a lock state of an electronic device, and a system therefor are provided. The method includes signing a lock state update request by using a unique key loaded in a confidence region of the electronic device when a lock state change is requested, generating a lock state control request message including the lock state update request, the signed lock state update request, and a certificate of the electronic device, transmitting the generated lock state control request message to a service provider server, and authenticating a lock state update command in a communication processor of the electronic device and updating a state of the communication processor according to the lock state update command when the lock state update command is received from the service provider server. | 04-30-2015 |
20150334111 | METHODS AND APPARATUS TO SUPPORT GLOBALPLATFORM USAGE ON AN EMBEDDED UICC - Disclosed herein is a technique for managing one or more electronic Subscriber Identity Modules (eSIMs) on an embedded UICC (eUICC). In particular, the technique involves leveraging the GlobalPlatform™ Specification and/or other telecommunication standards to support the eSIMs on the eUICC. Each eUICC can include an Issuer Security Domain (ISD) owned by a device manufacturer and an eSIM manager that manages the plurality of eSIMs on the eUICC. Notably, binaries of one or more applications shared between different eSIMs can be standardized and stored in a manner that enables each eSIM to utilize the one or more applications (via the eSIM manager) without needing to individually store the binaries. Using this approach, the overall size and complexity of each eSIM can be reduced, which can increase the amount of available memory within the eUICC as well as the overall performance of the eUICC. | 11-19-2015 |
20150350164 | INTELLIGENT CARD SECURE COMMUNICATION METHOD - The present invention relates to the field of information security. Disclosed is an intelligent card secure communication method, capable of preventing the communication data from being monitored or intercepted. The method of the present invention provides a card with a definitely secure communication mechanism, initiates a session for the two communication parties to authenticate each other, and to check the identification legitimacy of the other party and the integrity of communication data, and provides a security constraint for subsequent communication, thus improving communication security. | 12-03-2015 |
20150358313 | SYSTEMS AND METHODS FOR SECURED COMMUNICATION HARDWARE SECURITY MODULE AND NETWORK-ENABLED DEVICES - A new approach is proposed that contemplates systems and methods to support security communication between a hardware security module (HSM) and a plurality of network-enabled devices to offload their key storage, management, and crypto operations to the HSM. The HSM includes a plurality of HSM service units, each configured to authenticate one of the network-enabled devices based on its credentials and process the key management and crypto operations offloaded from the network-enabled device once it is authenticated. The HSM service unit also communicates results of the key management and crypto operations back to the network-enabled device via the secured communication channel. | 12-10-2015 |
20160021111 | Method, Terminal Device, and Network Device for Improving Information Security - A method, a terminal device, and a network device are provided. The method of the present invention includes acquiring, by a terminal device, a key, an identity of the terminal device, and identification information of one or more applications on the terminal device, where identification information of different applications on the terminal device is different from each other, and the identity of the terminal device includes International Mobile Equipment Identity (IMEI) and/or International Mobile Subscriber Identity (IMSI); generating, for identification information of one application by using a preset encryption algorithm according to the identity of the terminal device and the key, an encryption result corresponding to the application; and when the application runs on the terminal device, accessing a network by using the encryption result corresponding to the application. The present invention is applicable to protecting information security of a terminal device accessing a network. | 01-21-2016 |
20160028550 | SYSTEMS AND METHODS FOR SECURE DETOKENIZATION - A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor. | 01-28-2016 |