Method and apparatus for obtaining status of public key...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S076000, C380S030000

Reexamination Certificate

active

06442688

ABSTRACT:

TECHNICAL FIELD OF THE INVENTION
The present invention relates generally to public key infrastructure and more particularly to obtaining status information relating to public key management certificate updates.
BACKGROUND OF THE INVENTION
As is known, to securely transmit data from one party to another in a secured communications system, the data needs to be encrypted, via an encryption key and an encryption algorithm, and/or digitally signed. Such an encryption algorithm may be a symmetric key algorithm such as the data encryption standard (“DES”) while the encryption key is a corresponding symmetric key. The sending party encrypts the data using the symmetric key algorithm and transmits the encrypted message over a transmission medium to a receiving party. Upon receiving the encrypted message, the receiving party decrypts the message using the same symmetric key, which must be transmitted to the receiving party or derived by the receiving party by some appropriate security means.
Encrypting data using public key algorithms is somewhat more expensive than using a symmetric key algorithm, but the cost, in many circumstances, is justified because of the difficulty in securely providing the symmetric key to both parties. To obtain the cost saving benefits of symmetric key encryption and the key distribution advantages of public/private key pairs, a wrapped session key is provided to the receiving party along with the data that is encrypted using the symmetric key. The wrapped session key is the symmetric key that has been encrypted using the public key (of the public/private key pair) of the receiving party. When the receiving party receives the encrypted message, it decrypts the wrapped session key using its private key to recapture the symmetric key. Having recaptured the symmetric key, the receiving party utilizes it to decrypt the message. Typically, symmetric keys are used for a relatively short duration (e.g., a communication, a set number of communications, an hour, a day, a few days, etc.), while encryption public keys are used for longer durations (e.g., a week, a month, a year, or more).
To further enhance security of data transmissions in the secured communication system, the sending party provides its digital signature with messages that it transmits. The signature of the sending party consists of a tag computed as a function of both the data being signed and the signature private key of the sender. The receiving party, using the corresponding signature verification public key of the sending party, which accompanies the message, can validate the signature. The signature public key certificate includes the signature public key of the sending party and a signature of the certification authority. The receiving party first verifies the signature of the certification authority using a locally stored trusted public key of the certification authority. Once the signature of the certification authority has been verified, the receiving party can trust any message that was signed by the certification authority. Thus, the signature public key certificate that the receiving party obtained is verified and the signature public key of the sending party can be trusted to verify the signature of the sending party of the message.
As one can imagine, in a secured communication system that has several thousand users, keeping track of encryption keys and verification public keys of the endusers is a monumental task. For example, if the secured communication system is utilized by a large corporation which has 100,000 employees, or more, a certification authority needs to maintain accurate information regarding the encryption public key and the signature public key of each of the 100,000, or more, employees of the corporation. As with any large corporation, employees leave the company requiring their public keys to be deleted from the system, new employees are hired requiring new encryption and signature public keys to be issued, and employees lose their private keys requiring new keys to be issued. In the public key infrastructure environment, it is not uncommon for a certification authority to have to process several thousand public key updates, issues, and re-issues per day.
When a change to an end-user's public key occurs, the other end-users need to be informed of the change such that the end-user whose public key was changed can participate in secure communications. To inform the other end-users of the change, the certification authority issues a certificate revocation list and update messages. The certificate revocation list indicates the public keys that have been revoked, while the update messages are between a subscriber and its certification authority regarding the subscriber's public key certificates. Typically, the certification authority will issue the update messages and revocation list on a daily basis, or even less frequently.
As mentioned for a relatively large secure communication system, thousands of public key changes may occur on a daily basis. To a typical end-user, however, only a few dozen, or less, public key changes will be of interest. Thus, even though a particular end-user may only be interested in a few dozen public key certificate changes, it receives the complete revocation list. To transmit the revocation list to tens of thousands of endusers creates a large amount of data traffic that degrades the overall efficiency of the overall secured communication system.
In addition to the large of amount of data that is being transmitting, the revocation list include data that is up to twenty-four hours old. As such, affected end-users are unable to receive encrypted messages and verify signatures for almost a day. In many secured communication systems, such a lapse of secure communication service is unacceptable. Therefore, a need exists for a method and apparatus that provides an enduser with public key certificate revocations regarding other end-users of interest without the data bandwidth requirements of the above mentioned revocation list.


REFERENCES:
patent: 5133075 (1992-07-01), Risch
patent: 5261002 (1993-11-01), Perlman et al.
patent: 5446888 (1995-08-01), Pyne
patent: 5471629 (1995-11-01), Risch
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5699431 (1997-12-01), Van Oorschot et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for obtaining status of public key... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for obtaining status of public key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for obtaining status of public key... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2932264

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.