Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-01-24
2006-01-24
Au, David Jung (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C713S150000
Reexamination Certificate
active
06990583
ABSTRACT:
A public-key-encryption data-communication system includes a public-key-certificate issuer authority. The public-key-certificate issuer authority performs the issuance of a public key certificate and management operations, certification of a subject to be certificated, which is a certificate issuing request, and management such as registration processing are executed by a root registration authority or each registration authority. The public-key-certificate issuer authority performs processing for validating, invalidating, and deleting the certificate in accordance with a request from the root registration authority. The root registration authority accepts a request for issuing a public key certificate corresponding to the subject to be certificated which is under the control of a certificated registration authority, and transfers it to the public-key-certificate issuer authority in a form in which a signature is added to it. Processes by the public-key-certificate issuer authority, the root registration authority, the registration authority are separated, whereby the need for new implementation of user recognition, certificate issuance, registration, and management is eliminated.
REFERENCES:
The problem with multiple roots in Web browsers-certificate masquerading Hayes, J.M.; Enabling Technologies: Infrastructure for Collaborative Enterprises, 1998. (WET ICE '98) Proceedings., Seventh IEEE.
Secure in-band update of trusted certificates Hayes, J.M.; Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999. (WET ICE '99) Proceedings. IEEE 8th International.
Restricting access with certificate attributes in multiple root environments—a recipe for certificate masquerading Hayes, J.M.; Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual, Dec. 10-14, 2001.
Enterprise strength security on a JXTA P2P network Yeager, B.; Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on Sep. 1-3, 2003.
John Rogers, “Progress Towards a Public Key Infrastructure in Australia”, The Institute of Electrical and Electronic Engineers: 31stAnnual 1997 International Carnahan Conference on Security Technology, Oct. 15-17, 1997, pp. 120-122, XP010248863, Canberra, ACT, Australia.
Futamura Ichiro
Ishibashi Yoshihito
Kon Masashi
Matsuyama Shinako
Watanabe Hideaki
Au David Jung
Sonnenschein Nath & Rosenthal LLP
Sony Corporation
LandOfFree
Public-key-encryption data-communication system and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Public-key-encryption data-communication system and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Public-key-encryption data-communication system and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3578378