Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2006-10-31
2006-10-31
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S156000, C713S159000
Reexamination Certificate
active
07130998
ABSTRACT:
One embodiment of the present invention provides a system that uses a portable security token (PST) to facilitate cross-certification between a first certification authority (CA) and a second CA, wherein the first CA and associated subscriber devices constitute a first public-key infrastructure (PKI) domain, and wherein the second CA and associated subscriber devices constitute a second PKI domain. During operation, the system uses the PST to transfer certification information between the first CA and the second CA, wherein the PST communicates with the first CA and the second CA through a location-limited communication channel. Next, the system uses the certification information to issue a cross-certificate to the first CA. Note that the cross-certificate is signed by the second CA. Finally, the system propagates the cross-certificate from the first CA to the associated subscriber devices in the first PKI domain, thereby allowing the associated subscriber devices in the first PKI domain to authenticate themselves to the devices in the second PKI domain.
REFERENCES:
Public-key infrastructure interoperation Ford, W.; Aerospace Conference, 1998. Proceedings., IEEE vol. 4, Mar. 21-28, 1998 pp. 329-333 vol. 4.
Interoperability among healthcare organizations acting as certification authorities Bourka, A.; Polemi, D.; Koutsouris, D.; Information Technology in Biomedicine, IEEE Transactions on vol. 7, Issue 4, Dec. 2003 pp. 364-377.
A Description Logic for PKI Trust Domain Modeling Haibo Yu; Chunzhao Jin; Haiyan Che; Information Technology and Applications, 2005. ICITA 2005. Third International Conference on vol. 2, Jul. 4-7, 2005 pp. 524-528.
Menezes, Oorschot, Vanstone: “Handbook of Applied Cryptography”, CRC Press Series on Discrete Mathmatics and it Applications, pp. 570-576, XP002370863.
Girardot Y: “Bull CP8 Smart Card Uses in Cryptology”, Advances In Cryptology-Eurocrypt84, International Conference on the Theory and Application of Cryptographic Techniques, Springer Verlag, DE, Apr. 11, 1984, pp. 464-469, XP002185511.
Schneier B: “Applied Cryptopgraphy, Protocols, Algorithms, and Source Code in C”, Applied Cryptography. Protocols, Algorithms, and Source Code in C, New York, John Wiley & Sons, US, 1996, pp. 584-587, XP002370864.
Balfanz Dirk
Durfee Glenn E.
Smetters Diana K.
Jung David
Palo Alto Research Center Inc.
Park, Vaughn & Fleming LLP
LandOfFree
Using a portable security token to facilitate... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Using a portable security token to facilitate..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using a portable security token to facilitate... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3718754