Abstract:
THE PRESENT INVENTION RELATES TO A SYSTEM (100) AND METHOD FOR PERFORMING SECURE DESTRUCTION OF TEMPORARY FILES. THE PRESENT SYSTEM (100) AND METHOD INCLUDES CREATING A MAIN COMPARTMENT (104) AND A TEMPORARY COMPARTMENT (110) FOR PROVIDING A FIRST VIRTUAL COMPUTING ENVIRONMENT AND A SECOND VIRTUAL COMPUTING ENVIRONMENT TO HOST AT LEAST ONE OPERATING SYSTEM (102, 108) AND A PLURALITY OF APPLICATIONS (106, 112). MOREOVER, THE PRESENT SYSTEM (100) AND METHOD INSTRUCTS AN INSTALLATION TO THE TEMPORARY COMPARTMENT (112) FROM ONE OF THE PLURALITY OF APPLICATIONS (106) IN THE MAIN COMPARTMENT (104). FURTHER, THE PRESENT SYSTEM (100) AND METHOD DESTROYS A PLURALITY OF TEMPORARY FILES (114) GENERATED BY ONE OF THE PLURALITY OF APPLICATIONS (112) OF THE TEMPORARY COMPARTMENT FOR VIEWING A GRANTED AUTHORIZATION PROCESS. FURTHERMORE, THE PRESENT SYSTEM (100) AND METHOD INCLUDES COMMUNICATING FROM THE MAIN COMPARTMENT (104) TO THE TEMPORARY COMPARTMENT (110) FOR PROVIDING AN INSTRUCTION PATH TO PERFORM A SET OF FUNCTIONAL OPERATIONS TO CREATE AND DESTROY THE MAIN COMPARTMENT (104) OR THE TEMPORARY COMPARTMENT (110) USING A COMMUNICATION LINK. THE MOSI ILLUSTRATIVE DRAWING:
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate (156) to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate (156) issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate (156) resides in a web server (22) and the issuance of the proxy digital certificate (156) may be applied on any web based application through a public network such as the Internet.
Abstract:
A METHOD AND A SYSTEM COMPRISING THREE ENTITIES (110,120,130) AND A DEBIT CARD INCORPORATED WITH PKI INFRASTRUCTURE ARE DISCLOSED. THE SYSTEM TO CARRY OUT THE METHOD OF ENSURING A SECURED ONLINE TRANSACTION COMPRISES A FIRST ENTITY (110), A SECOND ENTITY (120) AND A THIRD ENTITY (130). PREFERABLY, THE ENTITIES (110,120,130) REPRESENT A USER OF THE DEBIT CARD, A MERCHANT AND A FINANCIAL INSTITUTION. THE USER MAKES AN ONLINE TRANSACTION (ONLINE PURCHASE) FROM A MERCHANT USING THE DEBIT CARD PROVIDED BY THE FINANCIAL INSTITUTION. BASED ON THE INFORMATION OF THE USER AND THE INFORMATION OF THE MERCHANT RECEIVED BY THE FINANCIAL INSTITUTION, THE USER’S ACCOUNT WILL BE DEDUCTED WITH THE PURCHASE AMOUNT WHILE THE MERCHANT’S ACCOUNT IS CREDITED. THE INFORMATION EXCHANGED BETWEEN THE ENTITIES (110,120,130) IS DIGITALLY SIGNED AND ENCRYPTED TO ENSURE CONFIDENTIALITY. A CONFIRMATION IS SENT TO THE MERCHANT WHO DIRECTS IT TO THE USER TO INFORM THE USER ON THE STATUS OF THE TRANSACTION. THE MOST ILLUSTRATIVE DRAWING:
Abstract:
This invention method for generating proxy certificate on web portal is a means of secure and reliable access to a web portal. This system will prevent identity fraud over the web and is a secure means of accessing personal information online.
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate resides in a web server and the issuance of the proxy digital certificate may be applied on any web based application through a public network such as the Internet.
Abstract:
A trusted computer platform method and system is disclosed for a secure computer system without a trust credential. The platform provides a functionality of a secure or 'trusted computing' (TC) environment to prevent or block unauthorized computer programs or applications from running within the computer system and provide a fully trusted computer system having 1) endorsement key; 2) secure input and output; 3) memory curtaining / protected execution; 4) sealed storage; and 5) remote attestation. The trusted computer platform is an implementation that achieves at least a mechanism to proactively establish more trusted relationships for remote or local access through secure user authentication and machine attestation, protect encryption keys and digital signature keys to maintain data confidentiality and integrity, protect key operations and other security tasks that would otherwise be performed on unprotected interfaces in unprotected communications, or protect platform and user authentication information from software- based attacks.
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate resides in a web server and the issuance of the proxy digital certificate may be applied on any web based application through a public network such as the Internet.
Abstract:
The present invention relates to a system and method for protecting a licensed software application (31) from piracy within a computer system by using a smart card (32) and a license code. The system for protecting a licensed software application (31) comprises a smart card (32), a licensed software (31), a registration software (11 ) running on a registration server (10) and a license code generator (21). Meanwhile, the method comprises the steps of determining the presence of a license code, decrypting the license code using user's private key from the smart card (32), verifying a digital signature in the license code, and checking the expiry date of the software (31) for execution of the software application. If the license code is not available, the method further requires the user to use certificate-based-login to a website and register using the smart card (32) that is provided by the software vendor. Subsequently, user's information and certificate is sent through a secure channel to the vendor's server and server side application digitally signs the program license expiry date and encrypt with recipient public key. Then, the license code is sent back to the user and the decryption and verification process of the digital signature repeats.