Automatic spoofed digital certificate detection
A deceptive and certificate technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as distinction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] This article discusses automatic spoofed digital certificate detection. Computing devices analyze digital certificates received from various locations (eg, accessed via the Internet or other networks) to automatically detect fraudulent digital certificates. A computing device maintains a record of the digital certificates it receives from these various locations. A certificate screening service operating remotely and independently from the computing device also accesses these various locations and maintains a record of the digital certificates that the service receives from these locations. In response to the request to access the target location, the computing device receives the current digital certificate from the target location. The computing device compares the current digital certificate to a last digital certificate previously received from the target site and determines whether the current digital certificate matches the last digital certificate. This matchin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


