Patent application number | Description | Published |
20090165095 | NETWORK CONNECTION TERMINAL AUTHENTICATION METHOD AND APPARATUS - A network connection terminal authenticating method that authenticates a terminal device demands communication with other terminal device in a computer network. The network connection terminal authenticating method include authenticating the terminal device outside a communication path between the terminal device and the other terminal device in response to a demand for communication of the terminal device with the other terminal device and determining whether communication with the other terminal device is permitted, and starting data transmission from the terminal device to the other terminal device when the terminal device is authenticated in the authenticating. | 06-25-2009 |
20090193522 | COMPUTER RESOURCE VERIFYING METHOD AND COMPUTER RESOURCE VERIFYING PROGRAM - A computer resource verifying method verifies computer resources introduced into a client device. The computer resource verifying method includes performing, by the client device, client side processing including verification of individual computer resources introduced into the client device and information collection for a dependence relation between computer resources; performing, by a server device, a server side processing by receiving information on a result of the client side processing performed in the performing of the client side processing to perform verification of the dependence relation between computer resources; and determining, by the server device, whether the client device is normal based on a verification result of the computer resources and a verification result of the dependence relation between computer resources. | 07-30-2009 |
20090240950 | Information processing apparatus and information management method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores therein user signature information in which biometric information of a user and a user electronic signature key that is a key for generating an electronic signature of the user for information created by the user are associated with each other and an encryption key that is a key for encrypting information, an electronic signature adding unit that, if the biometric information is obtained from the user, searches the storage unit for the user signature information corresponding to the biometric information, and adds the electronic signature of the user to user created information with a user electronic signature key in the user signature information, and an encrypt processing unit that encrypts with the encryption key the user created information processed by the electronic signature adding unit. | 09-24-2009 |
20100031327 | SAFETY JUDGMENT METHOD, SAFETY JUDGMENT SYSTEM, SAFETY JUDGMENT APPARATUS, FIRST AUTHENTICATION APPARATUS, AND COMPUTER PROGRAM PRODUCT - Security of an information processing apparatus is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus. The information processing apparatus transmits the collected environment information to a first authentication apparatus. An electronic certificate issued by a second authentication apparatus and information encrypted with a secret key issued by the second authentication apparatus are transmitted to the first authentication apparatus. The first authentication apparatus acquires the public key of the second authentication apparatus and the public key of the information processing apparatus so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus is judged to be safe. | 02-04-2010 |
20100082982 | Service control system and service control method - In a safety determining system, an information processing apparatus performs authentication of biometrical information and gathers corresponding environment information (apparatus information, software, peripheral devices, location information). Then, the information processing apparatus sends the gathered environment information and service information of a target service to a central server. Based on the environment information, the service information, and information stored in an environment information DB, the central server determines whether it is safe to provide a service to the information processing apparatus. Based on that determination result, a service terminal provides a service to the information processing apparatus. | 04-01-2010 |
20110179284 | Information processing apparatus and information managing method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores user unique information in which biometric information of a user and unique information for use when a unique process corresponding to the user is performed are associated with each other, and an information processing unit that retrieves, when biometric information of the user is obtained, unique information corresponding to the obtained biometric information from the user unique information and performs a predetermined process by using the retrieved unique information. | 07-21-2011 |
20130055228 | System and Method for Installing a Patch on a Computing System - According to one embodiment, a system includes a memory and a processor. The processor receives a message that includes a patch for installation and one or more requirements to be satisfied before the patch can be installed. The patch is configured to update the computing system. The processor also repeatedly collects information from one or more sensors until it is determined, based on the collected information, that the one or more requirements have been satisfied. Upon determining that the one or more requirements have been satisfied, the processor further conducts an installation process of the patch on the computing system. Upon determining that the installation process of the patch is finished, the processor further transmits a confirmation report indicating whether the patch was successfully installed. The confirmation report is generated and signed by a unique element associated with the computing system. | 02-28-2013 |
20140068028 | NETWORK CONNECTING METHOD AND ELECTRONIC DEVICE - A first electronic device transmits first configuration information of the first electronic device collected by a tamper-resistant chip mounted thereon and approved by a third-party device to a second electronic device over a short-distance network. The second electronic device transmits second configuration information of the second electronic device collected by a tamper-resistant chip mounted thereon and approved by the third-party device to the first electronic device over the short-distance network. The first electronic device transmits the first configuration information and the second configuration information to the second electronic device over a network. The second electronic device controls connection between the first electronic device and the second electronic device over the network based on the first configuration information and the second configuration information received from the first electronic device. | 03-06-2014 |
20140165205 | EQUIPMENT-INFORMATION TRANSMITTING APPARATUS, SERVICE CONTROL APPARATUS, EQUIPMENT-INFORMATION TRANSMITTING METHOD, AND COMPUTER PRODUCTS - An information generating unit generates identification information for an equipment based on environment information of the equipment. A search-result transmitting unit searches, when an information output request for equipment information generated based on the identification information is received, a database for the equipment information corresponding to the identification information, and transmits a search result as information indicating whether the equipment is allowed to receive a service. | 06-12-2014 |
Patent application number | Description | Published |
20110237234 | SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS - A client supported by remote maintenance in an electronic network configured to serve a plurality of clients may comprise a plurality of nodes, a first virtual machine (VM), a second virtual machine, and a virtual machine manager (VMM). The first VM may handle data associated with an external data center. The second VM may be associated with one of the plurality of nodes. The VMM may be configured to manage data transfer between the first VM and the second VM. The first VM may be configured to assess a state of the client system and identify a software update for installation on the one of the plurality of nodes. The software update may be configured to maintain identity between the data in the one of the plurality of nodes and the data center. The VMM may manage an attestation process prior to delivering or installing the software update on the client system using the first VM. | 09-29-2011 |
20110238260 | Using Trust Points To Provide Services - In certain embodiments, processors may operate to establish trust with trust point systems by performing a user authentication, a platform authentication, and an environment authentication. The processors may communicate information with the trust point systems in response to establishing trust. In certain embodiments, the trust point systems may cooperate to provide a variety of services, such as escorting, battery charging, vehicle security, and/or emissions reporting services. | 09-29-2011 |
20110238402 | SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS - A system for performing remote maintenance in an electronic network configured to serve a plurality of clients may comprise a client, a database, and a virtual machine. The client may include a plurality of processing resources. Each one of the plurality of processing resources may have a respective set of processing instructions stored on an respective associated computer readable memory. The database may include information correlating a list of processing resources with a respective set of processing instructions. The virtual machine may be operable to access the database and perform calculations simulating proposed combinations of processing resources and their respective set of processing instructions before approving a software update requested for the client. | 09-29-2011 |
20110238980 | SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS - A method for verifying electronic software code integrity may comprise providing a list of encryption keys to a client, encrypting a software code packet using one of the plurality of encryption keys, delivering the encrypted software code packet to the client, and informing the client to choose an encryption key for decryption based on the specific time factor. Each encryption key on the list may correlate to a respective time factor. The one of the plurality of encryption keys may be chosen from the list based at least in part on a specific time factor. | 09-29-2011 |
20110239209 | SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS - A system for performing remote maintenance an electronic network serving a plurality of clients may comprise a central server, a first client system hosting first virtual machine, and a receiver associated with the first client system. The central server may broadcast a list of updated software modules available for delivery to the plurality of client systems. The first client system may including a plurality of nodes, each one of the plurality of processing resources having a respective set of processing instructions stored on an respective associated computer readable memory. The receiver may be operable to receive the list broadcast by the central server. The first virtual machine may be operable to determine whether to request any of the updated software modules on the received list based at least in part on the identity of the plurality of nodes of the first client system. The receiver may be operable to receive any updated software module requested by the first virtual machine. The first virtual machine may be operable to install any updated software module delivered to the client system. | 09-29-2011 |
20110239210 | SYSTEM AND METHODS FOR REMOTE MAINTENANCE IN AN ELECTRONIC NETWORK WITH MULTIPLE CLIENTS - According to one embodiment, a client system supported by remote maintenance in an electronic network configured to serve a plurality of clients may include an electronic network, a plurality of storage resources, a first virtual machine, a second virtual machine, and a virtual machine manager. The electronic network may include a plurality of processing resources and a communication bus. The plurality of storage resources may be accessible by the plurality of processing resources. The plurality of storage resources may include a computer readable memory. The first virtual machine may handle a first data set associated with the client system. The first virtual machine may include an operating system and a reporting agent. The second virtual machine may handle a second data set associated with an external data center. The virtual machine manager may be configured to manage data transfer between the first virtual machine and the second virtual machine. The second virtual machine may be configured to assess a state of the first virtual machine and identify a software update for installation on the first virtual machine. The virtual machine manager may manage an attestation process for the first virtual machine prior to delivering or installing the software update on the client system using the first virtual machine. | 09-29-2011 |
20110321119 | Consigning Authentication Method - A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management includes making a first request for delivery of content, receiving the requested electronic content, receiving a second request for delivery of the electronic content, communicating the second request, receiving a decision, and delivering the electronic content if the second request is granted. The first request is made to a policy enforcement point in the network for delivery of content to a first client, and includes a trust level of the first client. The second request is for delivery of the content to a second client at the trust level of the first client and includes integrity information about the second client, and is communicated to the policy enforcement point. If the second request is granted, the content is delivered from the first client to the second client. | 12-29-2011 |
20110321134 | Consigning Authentication Method - A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management includes receiving integrity information from a first client at a first trust level in the trust hierarchy at a second client at the first trust level, requesting permission to receive electronic content from the first client, receiving a determination regarding the requested permission, and communicating the determination to the first client. The first client obtained content from a policy enforcement point in the network. The request for permission is made to the policy enforcement point and the request includes the integrity information. The determination is received from the policy enforcement point and is based in part on the integrity information about the first client. The second client communicates to the first client the determination of whether the second client receives the content from the first client. | 12-29-2011 |