Data processing: database and file management or data structures – Database design – Data structure types
Patent
1998-03-18
2000-10-17
Black, Thomas G.
Data processing: database and file management or data structures
Database design
Data structure types
707 10, 707101, G06F 1700
Patent
active
061345504
ABSTRACT:
A method and apparatus constructs a preferred certificate chain, such as a list of all certificate authorities in a shortest trusted path, based on generated certificate chain data, such as a table of trust relationships among certificate issuing units in a community of interest, to facilitate rapid validity determination of the certificate by a requesting unit. In one embodiment, requesting units, such as certificate validation units or subscribers, send queries to a common certificate chain constructing unit. Each query may identify a beginning and target certification authority in the community. The certificate chain constructing unit then automatically determines the certification chain among certification issuing units between the beginning and target certification authorities for each query and provides certificate chain data to the requesting unit. The requesting unit then performs validity determination on the certificate to be validated based on the certificate chain data.
REFERENCES:
patent: 5220604 (1993-06-01), Gasser et al.
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5666416 (1997-09-01), Micali
patent: 5671280 (1997-09-01), Rosen
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5745574 (1998-04-01), Muftic
patent: 5745886 (1998-04-01), Rosen
Levi et al., "Verification of classical certificates via nested certificates nested certificate paths," Computer Communications and Networks, 1999, Proceedings, Eighth International Conference on, pp. 242-247, Oct. 1999.
Xu et al., "Certificate path generating protocol (CPGP) for authentic signaling in ATM networks," Network Protocols, 1998, Proceedings, Sixth International Conference on, pp. 282-289, Oct. 1998.
Reiter et al., "Resilient authentication using path independence," Computers, IEEE Transactions on, pp. 1351-1362, Dec. 1998.
Handbook of Applied Cryptography, Alfred Menezes et al, (1997), pp. 572-576.
PKI Architectures and Interoperability, preliminary draft for Federal PKI TWG, by W.E Burr, published on the World Wide Web, Mar. 6, 1998.
Toward a National Public Key Infrastructure, IEEE Communications Magazine, Sep. 1994 by Santosh Chokani, pp. 70-74.
Data Structures and Algorithms, Alfred V. Aho et al., (1983), Addison Wesley Publishing Company, pp. 215-218 and pp. 239-244.
Graph Theory With Applications, J. A. Bondy and U.S.R. Murty, (1981), pp. 14-21.
Curry Ian
Van Oorschot Paul C.
Wiener Michael J.
Black Thomas G.
Entrust Technologies Limited
Jung David
LandOfFree
Method and apparatus for use in determining validity of a certif does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for use in determining validity of a certif, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for use in determining validity of a certif will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-478766