Validity Report
Basic Report
US7657531B2 — Systems and methods for state-less authentication
Priority Date: 2001-04-19, Publication Date: 2010-02-02, Current Assignee: Alto Dynamics LLCReport Generated: 2022-10-14

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP0695985A1●●●●●Logon certificatesGRANT1996-02-071994-07-18GreatMicrosoft CorpMicrosoft Corp
EP1237321B1●●●●●CONTENT DISTRIBUTION SYSTEM AND CONTENT DISTRIBUTION METHODGRANT2008-01-232000-11-01GreatSony Corp, Sony Computer Entertainment IncSony Interactive Entertainment Inc, Sony Corp
EP1368722B1●●●●●METHOD AND SYSTEM FOR WEB-BASED CROSS-DOMAIN SINGLE-SIGN-ON AUTHENTICATIONGRANT2007-08-152000-11-09GreatIBM Deutschland GmbH, International Business Machines CorpInternational Business Machines Corp
EP1249095B1●●●●●METHOD FOR ISSUING AN ELECTRONIC IDENTITYGRANT2005-11-162000-01-21GreatSmarttrust Systems OySmarttrust Systems Oy
EP1183583A1●●●●●SYSTEM AND METHOD FOR PROVIDING USER AUTHENTICATION AND IDENTITY MANAGEMENTGRANT2002-03-061999-04-22GreatVisage Development LtdVisage Development Ltd
US7231517B1●●●●●Apparatus and method for automatically authenticating a network clientGRANT2007-06-122000-03-03GreatMicro Focus Software IncApple Inc
EP1198762B1●●●●●APPARATUS AND METHODS FOR USE OF ACCESS TOKENS IN AN INTERNET DOCUMENT MANAGEMENT SYSTEMGRANT2010-06-021999-04-07GreatMicrosoft CorpMicrosoft Corp
EP1244270B1●●●●●Method for generating an authentic electronic certificateGRANT2006-05-312001-03-22GreatDeutsche Telekom AGDeutsche Telekom AG
EP1042885A1●●●●●CLIENT SIDE PUBLIC KEY AUTHENTICATION METHOD AND APPARATUS WITH SHORT-LIVED CERTIFICATESGRANT2000-10-111998-01-09GreatCybersafe CorpCybersafe Corp
US7113994B1●●●●●System and method of proxy authentication in a secured networkGRANT2006-09-262000-01-24GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6385728B1●●●●●SYSTEM  METHOD  AND PROGRAM FOR PROVIDING WILL-CALL CERTIFICATES FOR GUARANTEEING AUTHORIZATION FOR A PRINTER TO RETRIEVE A FILE DIRECTLY FROM A FILE SERVER UPON REQUEST FROM A CLIENT IN A NETWORK COMPUTER SYSTEM ENVIRONMENTGRANT2002-05-071997-11-26GreatInternational Business Machines CorpRicoh Co Ltd
EP1374474A2●●●●●METHOD AND APPARATUS FOR CRYPTOGRAPHIC KEY STORAGE WHEREIN KEY SERVERS ARE AUTHENTICATED BY POSSESSION AND SECURE DISTRIBUTION OF STORED  KEYSGRANT2004-01-022001-03-09GreatArcot Systems LLCArcot Systems LLC
US5689566A●●●●●Network with secure communications sessionsGRANT1997-11-181995-10-24Great
EP1168763A2●●●●●Systems and methods for delegated digest access authorizationGRANT2002-01-022000-06-30GreatMicrosoft CorpMicrosoft Corp
EP1269425A2●●●●●SECURE TRANSACTION SYSTEMGRANT2003-01-022000-02-25GreatIdentix IncIdemia Identity and Security USA LLC
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
10
  HARD
Art VolumeHIGH
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityBROAD
Expert Services Estimate$5,550 — $6,000
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
708
Recommended Classes
177
Government Assigned Classes
11
CPC
Title
Score
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)●●●●●
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)●●●●●
H04L9/3263involving certificates  e.g. public key certificate [PKC] or attribute certificate [AC]| Public key infrastructure [PKI] arrangements | network architectures or network communication protocols for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)●●●●●
H04L63/0815providing single-sign-on or federations●●●●●
G06F21/33using certificates●●●●●
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)●●●●●
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)●●●●●
G07B17/0008Communication details outside or between apparatus | coin-freed apparatus for franking | per se|  | (ref: G07F17/26)●●●●●
G06F21/34involving the use of external additional devices  e.g. dongles or smart cards●●●●●
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.