DIGICERT, INC. Patent applications |
Patent application number | Title | Published |
20160048674 | METHOD OF IMPROVING ONLINE CREDENTIALS - The invention comprises a method of providing additional assurance regarding a websites authenticity. The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations. The assurance is also provided by scanning the website associated with the credential for changes and alerting the website operator or a website visitor of the changes. The invention includes a method of ensuring the proper operation of the credential and a method of protecting the credential from mis-issuance. | 02-18-2016 |
20140344937 | Method and System of Attack Surface Detection - The invention comprises a method of using sensor agents to collect information in a central location to determine the entire attack surface of all certificate based resources, which includes vulnerable, insecure, or unknown resources but also includes where all the secure resources are located and the attack surface for each certificate resource. If a vulnerable resource is detected, the system may initiated additional sensor agents to determine the threat caused by the vulnerability. The system can also assign a rating to the overall security of the network based on vulnerabilities and display the attack surface as a topographic format for easy review by administrators. | 11-20-2014 |
20140337947 | METHOD OF IMPROVING ONLINE CREDENTIALS - The invention comprises a method of providing additional assurance regarding a websites authenticity. The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations. The assurance is also provided by scanning the website associated with the credential for changes and alerting the website operator or a website visitor of the changes. The invention includes a method of ensuring the proper operation of the credential and a method of protecting the credential from mis-issuance. | 11-13-2014 |
20140237091 | Method and System of Network Discovery - The invention comprises a method of discovering certificate resources using internal and external sensor agents. This information is correlated to create an extensive network map and detect potential phishing threats. The information is stored in a repository of correlated information and returned to authenticated users. | 08-21-2014 |
20140195800 | Certificate Information Verification System - The invention discloses a system and apparatus for detecting problematic certificate action requests and digital certificates. Ideally, the invention will be used to detect a certificate request that will result in security problems and detect issued certificates that lack essential information. The invention uses a proxy system that intercepts certificate requests and transmitted certificates. The proxy system runs a series of checks on the intercepted request and/or certificate. The checks vary depending on the certificate contents, requester, and system providing the request or certificate. | 07-10-2014 |
20140052994 | Object Signing Within a Cloud-based Architecture - This invention uses a cloud-based architecture to sign objects by dynamically creating a cloud-based virtual machine with the ability to sign objects, perform network and object isolation, and encrypt and store keys generated by an object signing agent. Multi-user authentication is supported along with mobile access. | 02-20-2014 |
20140052849 | Sensor-based Detection and Remediation System - The invention comprises a method and system of deploying and managing sensor agents to provide services to networks and devices within a network. The invention dynamically deploys, initiates, and controls sensor agents that scan networks. Data obtained during the scan are returned to an analysis system for evaluation. Results are displayed to a user through a graphical interface or stored in a database. Results may also be used by the analysis system to remediate anomalies and provide graphical network information. Typically, a plurality of sensor agents are used to gather data in the aggregate and provide a more complete analysis on the operation and security of a network. | 02-20-2014 |
20140050317 | Cloud Key Management System - This invention uses a cloud-based key management system to store, retrieve, generate, and perform other key operations. The cloud-based system ensures security of the keys while preventing their loss or destruction. Using this invention, a company can now manage, audit, and maintain control and security around their keys. Security event auditing permits evaluation of the operations to ensure that each step is completely securely. | 02-20-2014 |
20140019762 | Method, Process and System for Digitally Signing an Object - The invention comprises a method of auditing an object signing by creating security events throughout the signature process, including a security event that captures the identity of the signer and any anomalies associated with the signing process. The signature process may include multi-factor authentication, a policy engine that establishes the signer's authority and rights, and compliance checks that ensure the object's readiness for signature. The digital certificate used to sign the object may be stored on the cloud, locally, remotely, or on a hardware token. | 01-16-2014 |
20130318353 | Method for Creating and Installing a Digital Certificate - The invention comprises a method of creating a certificate based on the contents of another certificate. The certificate is then automatically installed and configured on the server where it will be used. A further enhancement automatically requests and installs the certificate prior to an existing certificate's expiration. | 11-28-2013 |
20120324551 | Method of Improving Online Credentials - The invention comprises a method of providing additional assurance regarding a websites authenticity, The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations. The assurance is also provided by scanning the website associated with the credential for changes and alerting the website operator or a website visitor of the changes. The invention includes a method of ensuring the proper operation of the credential and a method of protecting the credential from mis-issuance. | 12-20-2012 |