Using a portable security token to facilitate...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S156000, C713S159000

Reexamination Certificate

active

07130998

ABSTRACT:
One embodiment of the present invention provides a system that uses a portable security token (PST) to facilitate cross-certification between a first certification authority (CA) and a second CA, wherein the first CA and associated subscriber devices constitute a first public-key infrastructure (PKI) domain, and wherein the second CA and associated subscriber devices constitute a second PKI domain. During operation, the system uses the PST to transfer certification information between the first CA and the second CA, wherein the PST communicates with the first CA and the second CA through a location-limited communication channel. Next, the system uses the certification information to issue a cross-certificate to the first CA. Note that the cross-certificate is signed by the second CA. Finally, the system propagates the cross-certificate from the first CA to the associated subscriber devices in the first PKI domain, thereby allowing the associated subscriber devices in the first PKI domain to authenticate themselves to the devices in the second PKI domain.

REFERENCES:
Public-key infrastructure interoperation Ford, W.; Aerospace Conference, 1998. Proceedings., IEEE vol. 4, Mar. 21-28, 1998 pp. 329-333 vol. 4.
Interoperability among healthcare organizations acting as certification authorities Bourka, A.; Polemi, D.; Koutsouris, D.; Information Technology in Biomedicine, IEEE Transactions on vol. 7, Issue 4, Dec. 2003 pp. 364-377.
A Description Logic for PKI Trust Domain Modeling Haibo Yu; Chunzhao Jin; Haiyan Che; Information Technology and Applications, 2005. ICITA 2005. Third International Conference on vol. 2, Jul. 4-7, 2005 pp. 524-528.
Menezes, Oorschot, Vanstone: “Handbook of Applied Cryptography”, CRC Press Series on Discrete Mathmatics and it Applications, pp. 570-576, XP002370863.
Girardot Y: “Bull CP8 Smart Card Uses in Cryptology”, Advances In Cryptology-Eurocrypt84, International Conference on the Theory and Application of Cryptographic Techniques, Springer Verlag, DE, Apr. 11, 1984, pp. 464-469, XP002185511.
Schneier B: “Applied Cryptopgraphy, Protocols, Algorithms, and Source Code in C”, Applied Cryptography. Protocols, Algorithms, and Source Code in C, New York, John Wiley & Sons, US, 1996, pp. 584-587, XP002370864.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Using a portable security token to facilitate... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Using a portable security token to facilitate..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using a portable security token to facilitate... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3718754

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.