Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2001-12-13
2009-08-04
Smithers, Matthew B (Department: 2437)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S156000, C713S175000, C726S010000
Reexamination Certificate
active
07571314
ABSTRACT:
A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
REFERENCES:
patent: 6138235 (2000-10-01), Lipkin et al.
patent: 6367009 (2002-04-01), Davis et al.
patent: 6643774 (2003-11-01), McGarvey
patent: 6763459 (2004-07-01), Corella
patent: 7237107 (2007-06-01), Wray
patent: 7313692 (2007-12-01), Weeks et al.
patent: 7340601 (2008-03-01), Wray
patent: 7395550 (2008-07-01), Weeks et al.
patent: 7418256 (2008-08-01), Kall et al.
patent: 7500104 (2009-03-01), Goland
patent: 2357225 (2001-06-01), None
patent: WO 02054808 (2002-07-01), None
Aura, T. “On the Structure of Delegation Networks”, Helskinki University of Technology Digital Systems Laboratory, Series A: Research Reports. No. 48, Dec. 1997. 56 pgs.
Aura, T. “On the Structure of Delegation Networks”, Proceedings of the 11th IEEE Computer Security Foundations Workshop. Jun. 9, 1998. 13 pgs.
Brown, A., et al., “SOAP Security Extensions: Digital Signature”,W3C Note, Feb. 6, 2001,1-8.
Eastlake, D. et al., “XML-Signature Syntax and Processing”,W3C Candidate Recommendation, 2000,1-60.
Ellison, C.A., et al., “SPKI Certificate Theory”, http://www.ietf.org/rfc/rfc2693.txt, 1-41, 1999.
Kagal, L., et al., “Trust-Based Security in Pervasive Computing Environments”, Computer, Dec. 2001, 154-157.
Davis Zachary A
Intel Corporation
Schwegman Lundberg & Woessner, P.A.
Smithers Matthew B
LandOfFree
Method of assembling authorization certificate chains does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of assembling authorization certificate chains, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of assembling authorization certificate chains will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4066000