Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2007-09-25
2007-09-25
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S176000
Reexamination Certificate
active
09704417
ABSTRACT:
A technique for automatically obtaining a second certificate for a user using a first certificate includes accessing a server platform using a user's server and the first certificate of the user to create a connection that authenticates both the user's server identity via a server certificate of the user server and the user's identity via the user's first certificate. A secure data channel is then created between the server platform and the user platform. A request for the second certificate is forwarded by the user from the user server to the server platform and the server platform then generates the second certificate. The first certificate may be a signature certificate and the second certificate may be an encryption certificate. The first certificate may be an expiring signature certificate and the second certificate may be a replacement signature certificate. The first certificate may be a signature certificate and the second certificate may be a replacement encryption certificate to replace an expiring encryption certificate. The first certificate may be a signature certificate and the second certificate may be one of either the user's current encryption certificate or an expired encryption certificate of the user. Thus, the first certificate may be used as a mechanism for establishing a “chain of trust” that can be used to obtain all other certificates without requiring the manual intervention of an enterprise officer, thereby considerably reducing the time and expense of obtaining additional certificates for a user.
REFERENCES:
patent: 5218637 (1993-06-01), Angebaud et al.
patent: 5373561 (1994-12-01), Haber et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5922074 (1999-07-01), Richard et al.
patent: 6108788 (2000-08-01), Moses et al.
patent: 6122742 (2000-09-01), Young et al.
patent: 6160891 (2000-12-01), Al-Salqan
patent: 6233341 (2001-05-01), Riggins
patent: 6249873 (2001-06-01), Richard et al.
patent: 6304974 (2001-10-01), Samar
patent: 6389136 (2002-05-01), Young et al.
patent: 6490358 (2002-12-01), Geer et al.
patent: 6549626 (2003-04-01), Al-Salqan
patent: 6553393 (2003-04-01), Eilbott et al.
patent: 6625734 (2003-09-01), Marvit et al.
patent: 6636975 (2003-10-01), Khidekel et al.
patent: 6643774 (2003-11-01), McGarvey
patent: 6658568 (2003-12-01), Ginter et al.
patent: 6675296 (2004-01-01), Boeyen et al.
patent: 6785729 (2004-08-01), Overby et al.
patent: 6816900 (2004-11-01), Vogel et al.
patent: 6842523 (2005-01-01), Niwa et al.
patent: 2002/0029337 (2002-03-01), Sudia et al.
LaForgia Christian
Northrop Grumman Corporation
Sheikh Ayaz
Tarolli, Sundheim Covell & Tummino LLP
LandOfFree
Chain of trust processing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Chain of trust processing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Chain of trust processing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3752274