MANAGING SECURITY CREDENTIALS
    71.
    发明申请

    公开(公告)号:US20180026968A1

    公开(公告)日:2018-01-25

    申请号:US15679205

    申请日:2017-08-17

    CPC classification number: H04L63/0823 H04L63/0815 H04L63/0853

    Abstract: Disclosed are various embodiments for managing security credentials. In one embodiment, network content for a network site is obtained in response to a user request. A connection with a remote computing device that stores and manages security credentials for accessing network sites is authenticated using a master security credential and answers to knowledge-based questions. A security credential associated with the network site is provided to the client from the remote computing device based at least in part on the answers. Access to the network site is authenticated according to the security credential.

    Credential synchronization management

    公开(公告)号:US09754100B1

    公开(公告)日:2017-09-05

    申请号:US14580043

    申请日:2014-12-22

    CPC classification number: G06F21/45 H04L9/0891 H04L9/3268

    Abstract: Disclosed are various embodiments for replicating authentication data between computing devices. A computing device monitors a first certificate store located on a first client device for a change in a first state of the first certificate store. The computing device updates a record of the first state of the first certificate store with the change in the first state of the first certificate store, wherein the record is stored in a memory of the computing device. The computing device then determines that the first state of the first certificate store differs from a second state of a second certificate store located on a second client device. Finally, the computing device sends an update to the second client device, wherein the update comprises a change set representing a difference between the updated record and the second certificate store.

    Network beacon based credential store

    公开(公告)号:US09723003B1

    公开(公告)日:2017-08-01

    申请号:US14298853

    申请日:2014-06-06

    CPC classification number: H04L63/10 H04L63/0869 H04L63/102 H04W12/06 H04W12/08

    Abstract: A variety of different mobile computing devices, such as a laptop, tablet or smartphone, may be used in a mixed set of computing environments. At least some of the computing environments may be hostile computing environments where users of the mobile computing devices may be exposed to unknown risks. Furthermore, the mobile computing devices may be unable to determine if a network in a particular computing environment is in fact the network the mobile device determines it to be. A beacon device may be attached to a network and provide mutual authentication for mobile devices in the computing environment. The beacon device may provide a credential store for user device in the computing environment. Furthermore, the beacon device may provide a trusted third-party enabling access to restricted computing resources with requiring users to share their credentials.

    Secure Transfer and Use of Secret Material in a Shared Environment
    79.
    发明申请
    Secure Transfer and Use of Secret Material in a Shared Environment 有权
    在共享环境中安全传输和使用秘密资料

    公开(公告)号:US20170063811A1

    公开(公告)日:2017-03-02

    申请号:US14831341

    申请日:2015-08-20

    Abstract: Aspects related to the secure transfer and use of secret material are described. In one embodiment, public vendor and provider keys are provided to a customer and encrypted secret material is received in return. The encrypted secret material may include a customer secret material encrypted by the public vendor and provider keys. The encrypted secret material is imported into a trusted execution environment and decrypted with private provider and vendor keys. In this manner, a provider of cryptographic processes is not exposed to the secret material of the customer, as the customer secret material is decrypted and stored within the trusted execution environment but is not accessed by the provider in an unencrypted form. In turn, the provider may receive various instructions to perform cryptographic operations on behalf of the customer, and those instructions may be performed by the trusted execution environment.

    Abstract translation: 描述与秘密材料的安全转移和使用相关的方面。 在一个实施例中,公共供应商和供应商密钥被提供给客户,并且收到加密的秘密材料。 加密的秘密材料可以包括由公共供应商加密的客户秘密材料和提供商密钥。 加密的秘密资料被导入到受信任的执行环境中,并用专用提供商和供应商密钥进行解密。 以这种方式,密码处理提供者不会暴露给客户的秘密资料,因为客户秘密资料被解密并存储在受信任的执行环境中,但未被提供者以未加密形式访问。 反过来,提供商可以接收代表客户执行密码操作的各种指令,并且这些指令可以由可信执行环境执行。

Patent Agency Ranking