Secure server using public key registration and methods of...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S151000, C713S152000, C713S155000, C713S193000, C713S152000, C380S030000

Reexamination Certificate

active

06715073

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to secure end-to-end communication systems and methods of operation. More particularly, the invention relates to secure end-to-end communications for conducting electronic business in a distributed information system, e.g., the Internet.
2. Background Discussion
Traditionally, organizations, such as retailers, banks, insurance companies in conducting electronic business register their customers or users and control their access to business software applications with a user identification (user ID) and password. The user ID and password establish a user's identity for accessing secured information. The password is the “virtual key” that authenticates a user. However, a password does not provide the security needed for electronic business. Passwords have the following limitations:
(a) Can be compromised during log-on by on-lookers;
(b) Can be easily intercepted on the Internet if the transaction is not secured with a secure web protocol, such as secure sockets layer;
(c) authenticate a user to a host, but not a host to a user;
(d) Can be discovered using automated “trial and error” techniques;
(e) Do not protect transmitted information; and
(f) Do not ensure that access is limited to authorized entities and applications.
A new approach to conducting electronic business on the Internet is described in the cross-referenced application. In this approach, digital keys replaced user identification-password pairs. Public key cryptography uses mathematically related public-private key pairs. Only the private key can decrypt the information the public key has encrypted. The public key can be made available to any one. The private key is kept secret by the holder.
Just as digital keys are replacing user identification-password pairs in electronic business, digital signatures are replacing physical signatures. A digital signature is a coded message affixed to a document or data that helps guarantee the identity of the sender, thereby providing a greater level of security than a physical signature. A digital signature identifies the sender because only the sender's private key can create the signature. The key also helps ensure that the content of the signed message cannot be altered without the recipient being able to discover that the message has been altered.
Digital certificates are also replacing their physical counterpart—hard copy credentials—in electronic business. Digital certificates issued by a certification authority vouches for (or certifies) the key of an individual, software application, organization or business. The certificate performs a role similar to that of a driver's license or medical diploma—the certificate certifies that the bearer of the corresponding private key is authorized (by an organization) to conduct certain activities with that organization.
However, the life cycle of digital certificates is similar to that of the physical certificates. Digital certificates are issued after authorization in which a user is given the right to use a digital certificate for a classified amount of time. The certificate may be temporarily suspended when a user reports a lost certificate. The certificate may be resumed or revoked when the by the organization. Finally, digital certificates expire and for secure end-to-end communication in electronic business, the certificate must be validated to determine whether the certificate has expired, been revoked or suspended.
Digital certificates are issued through authorized registrars known as Registration Authorities (RAs). The authorities determine whether the applicant should be authorized to access secure applications or services and set in motion the processes to issue a certificate. A Certification Authority (CA) issues the digital certificate after approval by the Registration Authority. The certificate is a binding between a public key and an identity, e.g. a person, organization or computer device. The certitude includes a subject name; issuer name; public key; validity period; unique serial number; CA digital signature. The CA guarantees the authenticity of the certificate through its digital signature. The certificate may be revoked at any time. The serial numbers of revoked certificates are added to a Certification Revoked List (CRL) published in an X.500 Directory based on a standard defined by the International Telecommunications Union (ITU).
IBM “Vault” technology provides strong authentication of clients and servers using digital keys and digital certificates for conducting electronic business. “Vault” technology is described in the above cross-related application. Briefly stated, “Vault” technology provides a secure environment in a web server using a vault controller (hereinafter, web server-vault controller) for running a secure web-based registration process and enabling secure application. The controller provides security from other processes running on the same server and secure areas or personal storage vaults to which only the owner has a key. System operators, administrators, certificate authorities, registration authorities and others cannot get to stored information or secure processes in such personal vaults. Combined with a Secure Sockets Layer (SSL), the controller enables secure registration transactions that require multiple sessions using personal vaults. The personal vault is owned by a particular UNIX account that is linked to a user with a specific vault access certificate. The content of the vault is encrypted and contains an encryption key pair and signing key pair, both of which are password protected. Each vault has a unique distinguished name in an X.500 directory that provides storage for specific items essential to a Public Key Infrastructure (PKI) using digital certificates, certificate authorities, registration authorities, certificate management services, and distributed directory services used to verify the identity and authority of each party involved in any transaction over the internet. The common name portion of a distinguished name is based on a unique vault ID. In addition the controller provides a unique map between the vault ID (which identifies the UNIX user account and the user's home directory) and the vault access certificate which enables a user to access a vault process.
To handle the exploding growth in electronic business, a registration system and method are needed to provide a set of services to manage the issuance, renewal and revocation of digital certificates for web browsers and servers. Such services should employ web-based facilities for requesting, reviewing certificate applications, and installing certificates. All important user interfaces and business policy requirements of the services should be tailorable with minor screen editing or programming changes on behalf of the business. Finally, certificate requests and responses should be implemented via agents using “Vault” technology.
SUMMARY OF THE INVENTION
An object of the invention is a secure end-to-end communication system for conducting electronic business using vault technology.
Another object is a registration system and method using public keys for user authentication and registration in a secure end-to-end communications system for conducting electronic business.
Another object is a registration system and method which provides unique mapping between a personal vault and a user from serial numbers and a user's certificate for the vault.
Another object is a registration system using an automatically generated password for accessing the vaults obtained by signing a token based on a digital certificate's serial number.
Another object is a registration system in which information about personal vaults is stored in an X.500 directory.
Another object is a vault process, a specialized program running on a vault controller on behalf of each end user under a unique UNIX user ID associated with the end user.
Another object is a vault agent, which allows interaction with a non-web based vault controller.
An

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure server using public key registration and methods of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure server using public key registration and methods of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure server using public key registration and methods of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3268179

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.