US20040250062A1 - Method and system for the digital certificate generation and distribution - Google Patents
Method and system for the digital certificate generation and distribution Download PDFInfo
- Publication number
- US20040250062A1 US20040250062A1 US09/095,230 US9523098A US2004250062A1 US 20040250062 A1 US20040250062 A1 US 20040250062A1 US 9523098 A US9523098 A US 9523098A US 2004250062 A1 US2004250062 A1 US 2004250062A1
- Authority
- US
- United States
- Prior art keywords
- computer system
- certificate
- computer
- request
- certificates
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Definitions
- the present invention relates to digital certificates, and more particularly, to the generation and distribution of digital certificates.
- Encryption suitably refers to the transformation of plaintext data into an unintelligible form known as ciphertext. Encryption is usually accomplished by the application of mathematical algorithms on the plaintext data. These algorithms are defined by parameters known as ‘keys’.
- Two common encryption methods are symmetric methods, which use private keys, and asymmetric methods, which use public keys. Both private key encryption (such as DES (Data Encryption Standard)) and public key encryption methods have been implemented, but, key cryptographic methods alone do not allow a recipient to authenticate the validity of the public key nor to validate the identity of the sender.
- authentication allows for the verification that someone or something is valid or genuine.
- Digital signature authentication allows the receiver of a message to be confident of the identity of the sender and/or the integrity of the message.
- Digital signatures have been used to guarantee the validity of a public key by being incorporated into a digital certificate.
- the ‘signed’ document containing the digital signature attests to the validity and public key of the person signing the message, and prevents one user from impersonating another through a phony key pair.
- the certificate also contains the validity period of the key, the name of the issuer of the certificate and the certificate serial number. The information in the certificate is digitally signed by the issuer.
- a secure, centralized repository is required for storing and managing the keys.
- the X.500 directory may be used as a repository for storing certificates, with association of the public keys of network users with their distinguished name.
- An X.500 distinguished name refers to a unique object in the X.500 Directory, and is a sequence of vertex points leading from the ‘root’ of the tree to the object of interest, as is conventionally understood).
- the X.500 standard defines an authentication framework, known as X.509, for use by OSI (Open Systems International connection) applications to provide a basis for authentication and security services.
- the X.509 framework describes how authentication information is formed and placed in the directory.
- the X.509 authentication framework also defines basic security services, including simple and strong authentication.
- the present invention provides method and system aspects for automated generation and distribution of certificates in a computer network of computer systems. These aspects include generating a request by a first computer system for a certificate from a second computer system, and responding to the request in the second computer system by automatically generating the certificate and distributing the certificate to the first computer system. Further, generating a request includes issuing a POST/CERTREQ request, and sending a self-signed certificate from the first computer system to the second computer system. Automatically generating the certificate includes sending a sequence of certificates to the first computer system, the sequence of certificates including the newly generated certificate of the first computer system with a signature from the second computer system and a self-signed certificate from the second computer system.
- FIG. 1 illustrates a functional block diagram of a computer network arrangement with certificate generation in accordance with the present invention.
- FIG. 2 illustrates a block diagram of a computer system including a registration/discovery port for a preferred embodiment.
- FIG. 3 illustrates a block diagram of a process for certificate generation in accordance with the present invention via the registration/discovery port of FIG. 2.
- the present invention relates to generation and distribution of authentication certificates.
- the following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements.
- Various modifications to the preferred embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments.
- the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.
- the present invention is described in a preferred embodiment as being implemented in accordance with JavaTM object-oriented programming techniques, and more specifically, with resources of the Java Development Kit (JDK) 1.1, available from Sun Microsystems, Inc., Mountain View, Calif.
- JDK Java Development Kit
- FIG. 1 illustrates a functional block diagram of a computer network arrangement 10 with certificate generation in accordance with the present invention.
- computer network 10 includes a plurality of computers 12 ( 1 ) through 12 (N) (generally referred to herein as 12 ) interconnected by a communication link 14 .
- computers 12 are in the form of personal computers or computer workstations, each of which includes a system unit, a video display unit, and operator input devices, such as a keyboard and mouse, as is conventionally known.
- the system unit generally includes processing, memory, and mass storage devices, such as disk and/or tape storage elements, and other elements (not separately shown), including network interface devices 18 for interfacing the computers 12 to the communication link 14 .
- a video display unit permits the computer to display processed data and processing status to the user, and an operator input device enables the user to input data and control processing by the computer.
- the computers 12 transfer information, in the form of messages, through their respective network devices 18 among each other over the communication link 14 .
- the network 10 is suitably organized in a conventional ‘client-server’ 1.5 configuration, in which various ones of the computers 12 act as clients and servers.
- the communication link 14 interconnecting the clients 12 in the network 10 may, as is conventional, comprise wires, optical fibers, or other suitable media for carrying signals representing information among the computers 12 .
- the computer link 14 may comprise a public telephony system and/or the Internet, over which a person using computer 12 may access information, including programs and data from a ‘server’ computer which may be located some distance from a ‘client’ computer, as is well understood by those skilled in the art.
- generation and distribution of certificates for digitally authenticated communication between JavaTM applications operating on computers 12 via communication link 14 is achieved.
- each of the computers 12 includes two ports, a registration/discovery port 20 and an object port 22 , as shown in FIG. 2.
- the registration/discovery port 20 is suitably utilized in identifying network participants, and in the generation of certificates for authenticated channel communication in accordance with the present invention.
- communication over the object port 22 utilizes a digitally signed exchange of objects using object serialization and DSA (digital signature algorithm) signatures, the operation of which is not included in the discussion of the present invention, but an exemplary implementation of which may be found in co-pending U.S.
- DSA digital signature algorithm
- the protocol used on the registration/discovery port 20 is preferably based on HTTP (hypertext transfer protocol). Like HTTP, the session established on the port 20 is a straightforward request-response exchange.
- HTTP hypertext transfer protocol
- FIG. 3 A block diagram of a process for certificate generation in accordance with the present invention via registration/discovery port 20 is presented with reference to FIG. 3. The process is suitably provided via a computer readable medium, e.g., memory, floppy disk, hard disk, etc.
- a computer system 12 acting as an agent 24 first generates a self-signed certificate 26 .
- the self-signed certificate suitably contains the distinguished name and public key of the agent 24 .
- the agent 24 passes the self-signed certificate and makes a request for a certificate to a computer system 12 acting as a manager 28 through a POST/CERTREQ request.
- the manager 28 validates the self-signed certificate 26 and generates a manager-signed certificate 30 for the agent 24 .
- the response from the manager 28 comprises a sequence of the manager-signed certificate for the agent 30 and a copy of a self-signed certificate 32 for the manager.
- the content of the POST/CERTREQ request from the agent 24 suitably comprises a self-signed X.509 certificate for the agent 24 in DER (distinguished encoding rules) format that has been BASE64 encoded.
- the content of the response from manager 28 suitably comprises a DER sequence of two certificates.
- the sequence is preferably BASE64 encoded and consists of the agent certificate signed by the manager 30 and a self-signed certificate 32 for the manager.
- the present invention utilizes a simple HTTP POST request between an agent system and manager system to automatically generate a certificate, thus streamlining certificate generation for use in authenticated channel communication over an insecure network.
Abstract
Description
- The present invention relates to digital certificates, and more particularly, to the generation and distribution of digital certificates.
- Many methods have been developed to secure the integrity of electronic message data during transmission. Simple encryption is the most common method of securing data. Encryption suitably refers to the transformation of plaintext data into an unintelligible form known as ciphertext. Encryption is usually accomplished by the application of mathematical algorithms on the plaintext data. These algorithms are defined by parameters known as ‘keys’. Two common encryption methods are symmetric methods, which use private keys, and asymmetric methods, which use public keys. Both private key encryption (such as DES (Data Encryption Standard)) and public key encryption methods have been implemented, but, key cryptographic methods alone do not allow a recipient to authenticate the validity of the public key nor to validate the identity of the sender.
- In general, authentication allows for the verification that someone or something is valid or genuine. Digital signature authentication allows the receiver of a message to be confident of the identity of the sender and/or the integrity of the message. Digital signatures have been used to guarantee the validity of a public key by being incorporated into a digital certificate. The ‘signed’ document containing the digital signature attests to the validity and public key of the person signing the message, and prevents one user from impersonating another through a phony key pair. Along with the public key and the subject name, the certificate also contains the validity period of the key, the name of the issuer of the certificate and the certificate serial number. The information in the certificate is digitally signed by the issuer. However, a secure, centralized repository is required for storing and managing the keys.
- For example, the X.500 directory may be used as a repository for storing certificates, with association of the public keys of network users with their distinguished name. (An X.500 distinguished name refers to a unique object in the X.500 Directory, and is a sequence of vertex points leading from the ‘root’ of the tree to the object of interest, as is conventionally understood). The X.500 standard defines an authentication framework, known as X.509, for use by OSI (Open Systems International connection) applications to provide a basis for authentication and security services. The X.509 framework describes how authentication information is formed and placed in the directory. The X.509 authentication framework also defines basic security services, including simple and strong authentication. Strong authentication involves the use of public key cryptographic standard (PKCS) and a trusted hierarchy of Certificate Authorities (CAs), where a CA refers to a trusted source for obtaining a user's authentication information or certificate and that controls a Public Key Infrastructure (PKI). Thus, traditional methods of key generation and certificate distribution rely on human interaction with CAs.
- Accordingly, a need remains for a streamlined way of generating identities for widely distributed applications that use PKI for authentication. The present invention addresses such a need.
- The present invention provides method and system aspects for automated generation and distribution of certificates in a computer network of computer systems. These aspects include generating a request by a first computer system for a certificate from a second computer system, and responding to the request in the second computer system by automatically generating the certificate and distributing the certificate to the first computer system. Further, generating a request includes issuing a POST/CERTREQ request, and sending a self-signed certificate from the first computer system to the second computer system. Automatically generating the certificate includes sending a sequence of certificates to the first computer system, the sequence of certificates including the newly generated certificate of the first computer system with a signature from the second computer system and a self-signed certificate from the second computer system.
- Through the present invention, the generation and distribution of digital certificates for use by communicating Java™ applications for authentication is effectively achieved. A straightforward approach utilizes standard HTTP protocol in conjunction with a Java development kit version 1.1. These and other advantages of the aspects of the present invention will be more fully understood in conjunction with the following detailed description and accompanying drawings.
- FIG. 1 illustrates a functional block diagram of a computer network arrangement with certificate generation in accordance with the present invention.
- FIG. 2 illustrates a block diagram of a computer system including a registration/discovery port for a preferred embodiment.
- FIG. 3 illustrates a block diagram of a process for certificate generation in accordance with the present invention via the registration/discovery port of FIG. 2.
- The present invention relates to generation and distribution of authentication certificates. The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to the preferred embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. Thus, the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.
- Further, the present invention is described in a preferred embodiment as being implemented in accordance with Java™ object-oriented programming techniques, and more specifically, with resources of the Java Development Kit (JDK) 1.1, available from Sun Microsystems, Inc., Mountain View, Calif. However, it should be appreciated that the aspects of the present invention may be achieved in other programming environments that provide substantially equivalent functionality, as is well appreciated by those skilled in the art.
- FIG. 1 illustrates a functional block diagram of a
computer network arrangement 10 with certificate generation in accordance with the present invention. As shown in FIG. 1,computer network 10 includes a plurality of computers 12(1) through 12(N) (generally referred to herein as 12) interconnected by acommunication link 14. At least some of thecomputers 12 are in the form of personal computers or computer workstations, each of which includes a system unit, a video display unit, and operator input devices, such as a keyboard and mouse, as is conventionally known. The system unit generally includes processing, memory, and mass storage devices, such as disk and/or tape storage elements, and other elements (not separately shown), includingnetwork interface devices 18 for interfacing thecomputers 12 to thecommunication link 14. A video display unit permits the computer to display processed data and processing status to the user, and an operator input device enables the user to input data and control processing by the computer. Thecomputers 12 transfer information, in the form of messages, through theirrespective network devices 18 among each other over thecommunication link 14. - The
network 10 is suitably organized in a conventional ‘client-server’ 1.5 configuration, in which various ones of thecomputers 12 act as clients and servers. Thecommunication link 14 interconnecting theclients 12 in thenetwork 10 may, as is conventional, comprise wires, optical fibers, or other suitable media for carrying signals representing information among thecomputers 12. In addition thecomputer link 14 may comprise a public telephony system and/or the Internet, over which aperson using computer 12 may access information, including programs and data from a ‘server’ computer which may be located some distance from a ‘client’ computer, as is well understood by those skilled in the art. Through the present invention, generation and distribution of certificates for digitally authenticated communication between Java™ applications operating oncomputers 12 viacommunication link 14 is achieved. - In a preferred embodiment, each of the
computers 12 includes two ports, a registration/discovery port 20 and anobject port 22, as shown in FIG. 2. The registration/discovery port 20 is suitably utilized in identifying network participants, and in the generation of certificates for authenticated channel communication in accordance with the present invention. In a preferred embodiment, communication over theobject port 22 utilizes a digitally signed exchange of objects using object serialization and DSA (digital signature algorithm) signatures, the operation of which is not included in the discussion of the present invention, but an exemplary implementation of which may be found in co-pending U.S. patent application, entitled METHOD AND SYSTEM FOR THE EXCHANGE OF DIGITALLY SIGNED OBJECTS OVER AN INSECURE NETWORK, filed ______ , Ser. No. ______ , (attorney docket no. SA998027/JAS969P) and assigned to the assignee of the present invention. - The protocol used on the registration/
discovery port 20 is preferably based on HTTP (hypertext transfer protocol). Like HTTP, the session established on theport 20 is a straightforward request-response exchange. A block diagram of a process for certificate generation in accordance with the present invention via registration/discovery port 20 is presented with reference to FIG. 3. The process is suitably provided via a computer readable medium, e.g., memory, floppy disk, hard disk, etc. In order to generate a certificate, acomputer system 12 acting as an agent 24 first generates a self-signedcertificate 26. The self-signed certificate suitably contains the distinguished name and public key of the agent 24. The agent 24 then passes the self-signed certificate and makes a request for a certificate to acomputer system 12 acting as a manager 28 through a POST/CERTREQ request. - The manager28 validates the self-signed
certificate 26 and generates a manager-signedcertificate 30 for the agent 24. Thus, the response from the manager 28 comprises a sequence of the manager-signed certificate for theagent 30 and a copy of a self-signedcertificate 32 for the manager. - The content of the POST/CERTREQ request from the agent24 suitably comprises a self-signed X.509 certificate for the agent 24 in DER (distinguished encoding rules) format that has been BASE64 encoded. By way of example, the following Java™ code capably generates a key pair for an agent 24 and creates a self-signed
certificate 26 for the agent 24 using the key pair:// make a DSA key pair for the signer KeyPairGenerator keygen = KeyPairGenerator.getInstance(“DSA”); keygen.initialize(512, newSecureRandom( )); KeyPair kp = keygen.generateKeyPair( ); // create a self-signed x509 certificate using the key pair generated X500Name signerX500 = new X500Name(signerName, signerOrgUnit, signerOrg, signerCountry); X509Cert cert = new X509Cert( signerX500, (X509Key)kp.getPublic( ), now, expires ); AlgorithmId algId = ((PKCS8Key)(kp.getPrivate( ))).getAlgorithmId( ); X500Signer caSigner = cert.getSigner( algId, kp.getPrivate( ) ); cert.encodeAndSign( serial, caSigner ); - The content of the response from manager28 suitably comprises a DER sequence of two certificates. The sequence is preferably BASE64 encoded and consists of the agent certificate signed by the
manager 30 and a self-signedcertificate 32 for the manager. By way of example, the following Java™ code capably generates a signed certificate from manager 28 based on a self-signed certificate input from agent 24:X509Cert agentCert, cert; // cert being the manager's certificate 32KeyPair kp; // kp having the manager's key pair ...... AlgorithmId algId = ((PKCS8Key)(kp.getPrivate( ))).getAlgorithmId( ); X500Signer caSigner = cert.getSigner( algId, kp.getPrivate( ) ); X509Cert newAgentCert = new X509Cert( agentCert.getSubjectName( ), (X509Key)agent.cert.getPublicKey( ), now, expires ); newAgentCert.encodeAndSign( serial, caSigner ); - Through the present invention, an automated process for generating certificates is achieved. Rather than having to present some verification to a certificate authority that a requester is authentic in order to generate a certificate, the present invention utilizes a simple HTTP POST request between an agent system and manager system to automatically generate a certificate, thus streamlining certificate generation for use in authenticated channel communication over an insecure network.
- Although the present invention has been described in accordance with the embodiments shown, one of ordinary skill in the art will readily recognize that there could be variations to the embodiments and those variations would be within the spirit and scope of the present invention. For example, although the computer systems are described as having separate registration/discovery and object ports, a communication scheme could be developed that would allow a single port to be used. Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the appended claims.
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/095,230 US6826685B1 (en) | 1998-06-10 | 1998-06-10 | Method and system for the digital certificate generation and distribution |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/095,230 US6826685B1 (en) | 1998-06-10 | 1998-06-10 | Method and system for the digital certificate generation and distribution |
Publications (2)
Publication Number | Publication Date |
---|---|
US6826685B1 US6826685B1 (en) | 2004-11-30 |
US20040250062A1 true US20040250062A1 (en) | 2004-12-09 |
Family
ID=33449042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/095,230 Expired - Fee Related US6826685B1 (en) | 1998-06-10 | 1998-06-10 | Method and system for the digital certificate generation and distribution |
Country Status (1)
Country | Link |
---|---|
US (1) | US6826685B1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030233542A1 (en) * | 2002-06-18 | 2003-12-18 | Benaloh Josh D. | Selectively disclosable digital certificates |
US20090327696A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Authentication with an untrusted root |
US8589691B1 (en) * | 2009-08-17 | 2013-11-19 | Google Inc. | Self-signed certificates for computer application signatures |
US8620814B2 (en) * | 1998-11-09 | 2013-12-31 | First Data Corporation | Three party account authority digital signature (AADS) system |
US20140013387A1 (en) * | 2010-03-19 | 2014-01-09 | Salesforce.Com, Inc. | Efficient single sign-on and identity provider configuration and deployment in a database system |
US20150089567A1 (en) * | 2013-09-24 | 2015-03-26 | Microsoft Corporation | Automated production of certification controls by translating framework controls |
US20160192191A1 (en) * | 2013-08-08 | 2016-06-30 | Samsung Electronics Co., Ltd. | Method and device for registering and certifying device in wireless communication system |
US9754392B2 (en) | 2013-03-04 | 2017-09-05 | Microsoft Technology Licensing, Llc | Generating data-mapped visualization of data |
US9942218B2 (en) | 2013-09-03 | 2018-04-10 | Microsoft Technology Licensing, Llc | Automated production of certification controls by translating framework controls |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7395430B2 (en) * | 2001-08-28 | 2008-07-01 | International Business Machines Corporation | Secure authentication using digital certificates |
US7451116B2 (en) * | 2001-03-07 | 2008-11-11 | Diebold, Incorporated | Automated transaction machine digital signature system and method |
US8261975B2 (en) | 2001-03-07 | 2012-09-11 | Diebold, Incorporated | Automated banking machine that operates responsive to data bearing records |
AU2004239780B2 (en) * | 2003-05-13 | 2009-08-27 | Assa Abloy Ab | Efficient and secure data currentness systems |
US7591008B2 (en) * | 2005-06-30 | 2009-09-15 | Microsoft Corporation | Client authentication using multiple user certificates |
WO2010033125A1 (en) * | 2008-09-22 | 2010-03-25 | Nokia Corporation | Certificate signing in secure sessions |
US9778953B2 (en) * | 2009-06-16 | 2017-10-03 | International Business Machines Corporation | Process and system for comprehensive IT discovery without credentials |
US9100171B1 (en) | 2009-12-17 | 2015-08-04 | Secure Forward, LLC | Computer-implemented forum for enabling secure exchange of information |
US10728044B1 (en) | 2019-02-22 | 2020-07-28 | Beyond Identity Inc. | User authentication with self-signed certificate and identity verification and migration |
CN114157432A (en) * | 2021-11-25 | 2022-03-08 | 上海派拉软件股份有限公司 | Digital certificate acquisition method, device, electronic equipment, system and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5001752A (en) * | 1989-10-13 | 1991-03-19 | Fischer Addison M | Public/key date-time notary facility |
US6021495A (en) * | 1996-12-13 | 2000-02-01 | 3Com Corporation | Method and apparatus for authentication process of a star or hub network connection ports by detecting interruption in link beat |
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US5604804A (en) * | 1996-04-23 | 1997-02-18 | Micali; Silvio | Method for certifying public keys in a digital signature scheme |
US6178409B1 (en) * | 1996-06-17 | 2001-01-23 | Verifone, Inc. | System, method and article of manufacture for multiple-entry point virtual point of sale architecture |
US5884270A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for facilitating an employment search incorporating user-controlled anonymous communications |
US6035402A (en) * | 1996-12-20 | 2000-03-07 | Gte Cybertrust Solutions Incorporated | Virtual certificate authority |
-
1998
- 1998-06-10 US US09/095,230 patent/US6826685B1/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5001752A (en) * | 1989-10-13 | 1991-03-19 | Fischer Addison M | Public/key date-time notary facility |
US6021495A (en) * | 1996-12-13 | 2000-02-01 | 3Com Corporation | Method and apparatus for authentication process of a star or hub network connection ports by detecting interruption in link beat |
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8620814B2 (en) * | 1998-11-09 | 2013-12-31 | First Data Corporation | Three party account authority digital signature (AADS) system |
US20030233542A1 (en) * | 2002-06-18 | 2003-12-18 | Benaloh Josh D. | Selectively disclosable digital certificates |
US20090327696A1 (en) * | 2008-06-27 | 2009-12-31 | Microsoft Corporation | Authentication with an untrusted root |
US8924714B2 (en) * | 2008-06-27 | 2014-12-30 | Microsoft Corporation | Authentication with an untrusted root |
US9137023B1 (en) * | 2009-08-17 | 2015-09-15 | Google Inc. | Self-signed certificates for computer application signatures |
US8589691B1 (en) * | 2009-08-17 | 2013-11-19 | Google Inc. | Self-signed certificates for computer application signatures |
US8621226B1 (en) * | 2009-08-17 | 2013-12-31 | Google Inc. | Self-signed certificates for computer application signatures |
US8949613B1 (en) * | 2009-08-17 | 2015-02-03 | Google Inc. | Self-signed certificates for computer application signatures |
US20140013387A1 (en) * | 2010-03-19 | 2014-01-09 | Salesforce.Com, Inc. | Efficient single sign-on and identity provider configuration and deployment in a database system |
US9754392B2 (en) | 2013-03-04 | 2017-09-05 | Microsoft Technology Licensing, Llc | Generating data-mapped visualization of data |
US20160192191A1 (en) * | 2013-08-08 | 2016-06-30 | Samsung Electronics Co., Ltd. | Method and device for registering and certifying device in wireless communication system |
US10178550B2 (en) * | 2013-08-08 | 2019-01-08 | Samsung Electronics Co., Ltd. | Method and device for registering and certifying device in wireless communication system |
US10911436B2 (en) | 2013-08-08 | 2021-02-02 | Samsung Electronics Co., Ltd. | Method and device for registering and certifying device in wireless communication system |
US9942218B2 (en) | 2013-09-03 | 2018-04-10 | Microsoft Technology Licensing, Llc | Automated production of certification controls by translating framework controls |
US9998450B2 (en) | 2013-09-03 | 2018-06-12 | Microsoft Technology Licensing, Llc | Automatically generating certification documents |
US10855673B2 (en) | 2013-09-03 | 2020-12-01 | Microsoft Technology Licensing, Llc | Automated production of certification controls by translating framework controls |
WO2015047882A1 (en) * | 2013-09-24 | 2015-04-02 | Microsoft Corporation | Automated production of certification controls by translating framework controls |
US20150089567A1 (en) * | 2013-09-24 | 2015-03-26 | Microsoft Corporation | Automated production of certification controls by translating framework controls |
US9253212B2 (en) * | 2013-09-24 | 2016-02-02 | Microsoft Technology Licensing, Llc | Automated production of certification controls by translating framework controls |
CN105659556A (en) * | 2013-09-24 | 2016-06-08 | 微软技术许可有限责任公司 | Automated production of certification controls by translating framework controls |
CN110086760A (en) * | 2013-09-24 | 2019-08-02 | 微软技术许可有限责任公司 | Pass through the automated production of the authentication controls of transfer framework control |
Also Published As
Publication number | Publication date |
---|---|
US6826685B1 (en) | 2004-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6684332B1 (en) | Method and system for the exchange of digitally signed objects over an insecure network | |
US6826685B1 (en) | Method and system for the digital certificate generation and distribution | |
US9819666B2 (en) | Pass-thru for client authentication | |
US7461250B1 (en) | System and method for certificate exchange | |
US9882728B2 (en) | Identity-based certificate management | |
US8340283B2 (en) | Method and system for a PKI-based delegation process | |
Boneh et al. | Fine-grained control of security capabilities | |
US20050010757A1 (en) | Public-key infrastructure in network management | |
CA2313328A1 (en) | Client side public key authentication method and apparatus with short-lived certificates | |
Ding et al. | Experimenting with server-aided signatures | |
Benantar | The Internet public key infrastructure | |
CN115801223B (en) | CA certificate-based identification key system and PKI system compatible method | |
CA2524281A1 (en) | Digital signature and verification system for conversational messages | |
US7143285B2 (en) | Password exposure elimination for digital signature coupling with a host identity | |
CN115865520B (en) | Authentication and access control method with privacy protection in mobile cloud service environment | |
US20020144107A1 (en) | Password exposure elimination for digital signature coupling with a host identity | |
Boneh et al. | Instanteneous revocation of security capabilities | |
Parnerkar et al. | Secret key distribution protocol using public key cryptography | |
Berger | A Scalable Architecture for Public Key Distribution Acting in Concert with Secure DNS | |
US20020152383A1 (en) | Method for measuring the latency of certificate providing computer systems | |
Kanungo | Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework | |
US20050160041A1 (en) | Smartcard-based root certificate methods and apparatuses | |
Jiwa et al. | Beacon based authentication | |
Argyroudis et al. | Comparing the costs of public key authentication infrastructures | |
Ferguson et al. | Security Design Review of the Ciphire System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DOUGLAS, DANIEL GRAHAM;REEL/FRAME:009251/0592 Effective date: 19980608 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 8 |
|
SULP | Surcharge for late payment |
Year of fee payment: 7 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20161130 |