Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
1999-06-30
2004-09-21
Barrón, Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S164000, C713S167000, C713S193000, C713S152000
Reexamination Certificate
active
06795920
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to a secure end-to-end communication system and methods of operation using vault technology. More particularly, the invention relates to a vault controller secure depositor and a method of operation in an electronic business system managing secure communication between vaults in a vault controller(s).
2. Background Discussion
Traditionally, organizations such as retailers, banks, and insurance companies, in conducting electronic business, register their customers or users and control their access to business software applications with a user identification (“user ID”) and password. The user ID and password establish a user's identity for accessing secured information. The password is the “virtual key” that authenticates a user. However, a password does not provide the security needed for electronic business. Passwords have the following limitations:
(a) can be compromised during log-on by on-lookers;
(b) can be easily intercepted on the Internet if the transaction is not secured with a secure web protocol, such as secure sockets layer;
(c) authenticate a user to a host, but not a host to a user;
(d) can be discovered using automated “trial and error” techniques;
(e) do not protect transmitted information; and
(f) do not ensure that access is limited to authorized entities and applications.
A new approach to conducting electronic business on the Internet is described in the cross-referenced application. In this approach, digital keys replaced user identification-password pairs. Public key cryptography uses mathematically related public-private key pairs. Only the private key can decrypt the information the public key has encrypted. Only the public key can verify signature performed by the private key. The public key can be made available to any one. The private key is kept secret by the holder.
Just as digital keys are replacing user identification-password pairs in electronic business, digital signatures are replacing physical signatures. A digital signature is a coded message affixed to a document or data that helps guarantee the identity of the sender, thereby providing a greater level of security than a physical signature. A digital signature identifies the sender because only the sender's private key can create the signature. The key also helps ensure the content of the signed message cannot be altered without the recipient being able to discover that the message has been altered.
Digital certificates are also replacing their physical counterpart—hard copy credentials—in electronic business. A digital certificate, issued by a certification authority, vouches for (or certifies) the key of an individual, software application, organization or business. The certificate performs a role similar to that of a driver's license or medical diploma—the certificate certifies that the bearer of the corresponding private key is authorized (by an organization) to conduct certain activities with that organization.
However, the life cycle of digital certificates is similar to that of physical certificates. Digital certificates are issued for a specific amount of time. The certificate may be temporarily suspended under certain conditions and reissued at a later time. The certificate may be permanently revoked by the organization. Finally, digital certificates expire. For secure end-to-end communication in electronic business, the certificate must be validated to determine whether the certificate has expired, been revoked or suspended.
Digital certificates are issued through authorized registrars known as Registration Authorities (RAs). The authorities determine whether the applicant should be authorized to access secure applications or services and set in motion the processes to issue a certificate. A Certification Authority (CA) issues the digital certificate after approval by the Registration Authority. The certificate is a binding between a public key and an identity, e.g. a person, organization or computer device. The certificate includes a subject name; issuer name; public key; validity period; unique serial number; CA digital signature. The CA guarantees the authenticity of the certificate through its digital signature. The certificate may be revoked at any time. The serial numbers of revoked certificates are added to a Certification Revoked List (“CRL”) published in an X.500 Directory based on a standard defined by the International Telecommunications Union (“ITU”). The X.500 standard is now being used to implement a “white pages” for the Internet service. That is, a directory of people, computers, services, and of course electronic mail addresses. This on-line directory provides a single, global source of information that is constantly updated.
IBM “Vault” technology, described in the related application Ser. No. 08/980,022, supra provides strong authentication of clients and servers using digital keys and digital certificates for conducting electronic business. “Vault” technology is described in the above cross-related application. Briefly stated, “Vault” technology provides a secure environment in a web server using a vault controller (hereinafter, web server-vault controller) for running a secure web-based registration process and enabling secure application. The controller provides security from other processes running on the same server and secure areas or personal storage vaults to which only the owner has a key. System operators, administrators, certificate authorities, registration authorities and others cannot gain access to stored information or secure processes in such personal vaults. Combined with a Secure Sockets Layer (SSL) protocol, the controller enables secure registration transactions that require multiple sessions using personal vaults. SSL, an EETF standard communication protocol, has built-in security services that are as transparent as possible to the end user and provides a digitally secure communication channel. The personal vault is owned by a particular platform Identification (ID), e.g. a UNIX ID account that is linked to a user with a specific Vault Access Certificate. The content of the vault is encrypted and contains an encryption key pair and signing key pair, both of which are passwords protected. Each vault has a unique Distinguished Name (DN) in an X.500 directory that provides storage for specific items essential to a Public Key Infrastructure (PKI). PKU uses digital certificates, certificate authorities, registration authorities, certificate management services, and distributed directory services to verify the identity and authority of each party involved in any transaction over the Internet. The common name portion of a Distinguished Name is based on a unique vault ID. In addition, the controller provides a unique mapping between the vault ID (which identifies the UNIX user account and the user's home directory) and the Vault Access Certificate which enables an end-user to access a vault through a browser.
As a part of a secure end-to-end communication system conducting electronic business using vault technology, a need exists to send an receive messages securely between vaults in a controller and between vaults running in different vault controllers, even when no vault process is running in the recipient vault (i.e. the vault is inactive).
SUMMARY OF THE INVENTION
An object of the invention is a secure end-to-end communication system and method of operation for conducting electronic business using vault technology and handling communications securely between vault processes running in different vaults of a vault controller(s).
Another object is a secure depositor in a vault handling local or remote vault to vault secure communication.
Another object is a secure depositor daemon handling secure communications between vaults located in different controllers.
Another object is a secure depositor system and method for encrypting/decrypting messages transmitted between vaults in a local controller and with a vault in a remote controller.
Another object i
Bacha Hamid
Carroll Robert B.
Barrón Gilberto
International Business Machines - Corporation
Shofi David M.
Zand Kambiz
LandOfFree
Vault controller secure depositor for managing secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Vault controller secure depositor for managing secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Vault controller secure depositor for managing secure... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3211596