[go: up one dir, main page]

AU2001227928A1 - Public key validation service - Google Patents

Public key validation service

Info

Publication number
AU2001227928A1
AU2001227928A1 AU2001227928A AU2792801A AU2001227928A1 AU 2001227928 A1 AU2001227928 A1 AU 2001227928A1 AU 2001227928 A AU2001227928 A AU 2001227928A AU 2792801 A AU2792801 A AU 2792801A AU 2001227928 A1 AU2001227928 A1 AU 2001227928A1
Authority
AU
Australia
Prior art keywords
public key
unsigned
pkvc
subject
disposable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001227928A
Inventor
Francisco Corella
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HP Inc
Original Assignee
Hewlett Packard Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Co filed Critical Hewlett Packard Co
Publication of AU2001227928A1 publication Critical patent/AU2001227928A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A public key validation agent (PKVA) includes a registration authority which issues a first unsigned public key validation certificate (unsigned PKVC) off-line to a subject that binds a public key of the subject to a first public key serial number (PKVN). The registration authority maintains a certificate database of unsigned PKVCs in which it stores the first unsigned PKVC. A credentials server issues a disposable public key validation certificate (disposable PKVC) on-line to the subject. The disposable PKVC binds the public key of the subject from the first unsigned PKVC to the first PKVN from the first unsigned PKVC. The credentials server maintains a table that contains entries corresponding to valid unsigned PKVCs stored in the certificate database. The PKVA can be employed in a public key validation service to validate the public key of the subject before a private/public key pair of the subject is used for authentication purposes.
AU2001227928A 2000-01-14 2001-01-16 Public key validation service Abandoned AU2001227928A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US17615700P 2000-01-14 2000-01-14
US60176157 2000-01-14
US09/759,443 US7010683B2 (en) 2000-01-14 2001-01-13 Public key validation service
US09759443 2001-01-13
PCT/US2001/001520 WO2001052470A2 (en) 2000-01-14 2001-01-16 Public key validation service

Publications (1)

Publication Number Publication Date
AU2001227928A1 true AU2001227928A1 (en) 2001-07-24

Family

ID=26871941

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001227928A Abandoned AU2001227928A1 (en) 2000-01-14 2001-01-16 Public key validation service

Country Status (7)

Country Link
US (1) US7010683B2 (en)
EP (1) EP1250774B1 (en)
JP (1) JP2003534677A (en)
AT (1) ATE301894T1 (en)
AU (1) AU2001227928A1 (en)
DE (1) DE60112546T2 (en)
WO (1) WO2001052470A2 (en)

Families Citing this family (114)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004104750A (en) * 2002-07-17 2004-04-02 Hitachi Ltd Digital signature verification method
US7873589B2 (en) * 2001-04-02 2011-01-18 Invivodata, Inc. Operation and method for prediction and management of the validity of subject reported data
US6854057B2 (en) * 2001-09-06 2005-02-08 America Online, Inc. Digital certificate proxy
US20030084298A1 (en) * 2001-10-25 2003-05-01 Messerges Thomas S. Method for efficient hashing of digital content
KR100843494B1 (en) * 2001-11-06 2008-07-04 인터내셔널 비지네스 머신즈 코포레이션 Methods and systems for supplying data, methods and systems for providing digital signatures, methods and systems for transferring ownership of electronic property, methods and systems for electronic voting, and computer-readable recording media recording computer programs
FR2840748B1 (en) * 2002-06-05 2004-08-27 France Telecom METHOD AND SYSTEM FOR VERIFYING ELECTRONIC SIGNATURES AND MICROCIRCUIT CARD FOR IMPLEMENTING THE METHOD
JP4304362B2 (en) * 2002-06-25 2009-07-29 日本電気株式会社 PKI-compliant certificate confirmation processing method and apparatus, and PKI-compliant certificate confirmation processing program
US7484089B1 (en) * 2002-09-06 2009-01-27 Citicorp Developmemt Center, Inc. Method and system for certificate delivery and management
DE60220959T2 (en) * 2002-09-17 2008-02-28 Errikos Pitsos Method and apparatus for providing a list of public keys in a public key system
US7318155B2 (en) * 2002-12-06 2008-01-08 International Business Machines Corporation Method and system for configuring highly available online certificate status protocol responders
US7703128B2 (en) 2003-02-13 2010-04-20 Microsoft Corporation Digital identity management
CA2422334C (en) * 2003-03-17 2009-06-09 British Telecommunications Public Limited Company Authentication of network users
GB2400461B (en) * 2003-04-07 2006-05-31 Hewlett Packard Development Co Control of access to of commands to computing apparatus
CN1902853B (en) * 2003-10-28 2012-10-03 塞尔蒂卡姆公司 A method and device for verifiably generating public keys
US7546373B2 (en) * 2003-11-14 2009-06-09 Microsoft Corporation Secure dynamic credential distribution over a network
US7814327B2 (en) 2003-12-10 2010-10-12 Mcafee, Inc. Document registration
US7899828B2 (en) 2003-12-10 2011-03-01 Mcafee, Inc. Tag data structure for maintaining relational data over captured objects
US7984175B2 (en) 2003-12-10 2011-07-19 Mcafee, Inc. Method and apparatus for data capture and analysis system
US8656039B2 (en) 2003-12-10 2014-02-18 Mcafee, Inc. Rule parser
US7774604B2 (en) 2003-12-10 2010-08-10 Mcafee, Inc. Verifying captured objects before presentation
US8548170B2 (en) * 2003-12-10 2013-10-01 Mcafee, Inc. Document de-registration
WO2005071877A1 (en) * 2004-01-09 2005-08-04 Corestreet, Ltd. Signature-efficient real time credentials for ocsp and distributed ocsp
US7930540B2 (en) 2004-01-22 2011-04-19 Mcafee, Inc. Cryptographic policy enforcement
US7984488B2 (en) * 2004-04-09 2011-07-19 Microsoft Corporation Credential roaming in electronic computing systems
WO2005106658A1 (en) 2004-04-26 2005-11-10 Google Inc. Methods and systems for dynamically composing distributed interactive applications from high-level programming languages
JP4314152B2 (en) * 2004-05-21 2009-08-12 株式会社東芝 Electronic information assurance system, business terminal
US7461012B2 (en) * 2004-06-08 2008-12-02 Elbex Video Ltd. Method and apparatus for simplified e-commerce shopping via home shopping terminals
US7962591B2 (en) 2004-06-23 2011-06-14 Mcafee, Inc. Object classification in a capture system
US8607334B2 (en) * 2004-07-08 2013-12-10 Research In Motion Limited System and method for secure message processing
US8560534B2 (en) 2004-08-23 2013-10-15 Mcafee, Inc. Database for a capture system
US7949849B2 (en) 2004-08-24 2011-05-24 Mcafee, Inc. File system for a capture system
US8049594B1 (en) * 2004-11-30 2011-11-01 Xatra Fund Mx, Llc Enhanced RFID instrument security
JP4305854B2 (en) * 2005-01-19 2009-07-29 富士フイルム株式会社 Image management apparatus and method
US7653696B2 (en) * 2005-07-29 2010-01-26 Research In Motion Limited Method and apparatus for processing digitally signed messages to determine address mismatches
US7907608B2 (en) 2005-08-12 2011-03-15 Mcafee, Inc. High speed packet capture
US7818326B2 (en) 2005-08-31 2010-10-19 Mcafee, Inc. System and method for word indexing in a capture system and querying thereof
US20070071243A1 (en) * 2005-09-23 2007-03-29 Microsoft Corporation Key validation service
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US7730011B1 (en) 2005-10-19 2010-06-01 Mcafee, Inc. Attributes of captured objects in a capture system
JP4736722B2 (en) * 2005-11-04 2011-07-27 コニカミノルタホールディングス株式会社 Authentication method, information processing apparatus, and computer program
US7657104B2 (en) 2005-11-21 2010-02-02 Mcafee, Inc. Identifying image type in a capture system
US7600123B2 (en) * 2005-12-22 2009-10-06 Microsoft Corporation Certificate registration after issuance for secure communication
KR100714124B1 (en) * 2006-02-21 2007-05-02 한국전자통신연구원 Certificate issuing device and method using user consent information
EP1833222A1 (en) * 2006-03-10 2007-09-12 Abb Research Ltd. Access control protocol for embedded devices
US8504537B2 (en) 2006-03-24 2013-08-06 Mcafee, Inc. Signature distribution in a document registration system
PT2011301E (en) * 2006-04-10 2011-09-23 Trust Integration Services B V Arrangement of and method for secure data transmission.
US7689614B2 (en) 2006-05-22 2010-03-30 Mcafee, Inc. Query generation for a capture system
US8010689B2 (en) 2006-05-22 2011-08-30 Mcafee, Inc. Locational tagging in a capture system
US7958227B2 (en) 2006-05-22 2011-06-07 Mcafee, Inc. Attributes of captured objects in a capture system
US8942433B2 (en) * 2006-12-01 2015-01-27 Luke Small System for scheduling, recordation and biometric validation of interpersonal interactions
US8612773B2 (en) * 2007-05-03 2013-12-17 International Business Machines Corporation Method and system for software installation
US8296559B2 (en) * 2007-05-31 2012-10-23 Red Hat, Inc. Peer-to-peer SMIME mechanism
US8072967B2 (en) * 2007-07-20 2011-12-06 Cisco Technology, Inc. VoIP call routing information registry including hash access mechanism
US8223755B2 (en) * 2007-07-20 2012-07-17 Cisco Technology, Inc. Node reputation based on knowledge of PSTN calls
US8228903B2 (en) * 2007-07-20 2012-07-24 Cisco Technology, Inc. Integration of VoIP address discovery with PBXs
US8199746B2 (en) 2007-07-20 2012-06-12 Cisco Technology, Inc. Using PSTN reachability to verify VoIP call routing information
US8228902B2 (en) * 2007-07-20 2012-07-24 Cisco Technology, Inc. Separation of validation services in VoIP address discovery system
US8228904B2 (en) * 2007-07-20 2012-07-24 Cisco Technology, Inc. Using PSTN reachability in anonymous verification of VoIP call routing information
US8121114B2 (en) 2009-02-12 2012-02-21 Cisco Technology, Inc. Prevention of voice over IP spam
JP5303881B2 (en) * 2007-08-15 2013-10-02 富士通セミコンダクター株式会社 Field effect transistor and method of manufacturing field effect transistor
US8484752B2 (en) 2007-11-14 2013-07-09 Caterpillar Inc. Verifying authenticity of electronic control unit code
US8321933B2 (en) * 2007-11-14 2012-11-27 Caterpillar Inc. Securing electronic control unit code
US8301877B2 (en) * 2008-03-10 2012-10-30 Secureauth Corporation System and method for configuring a valid duration period for a digital certificate
KR20100134745A (en) * 2008-04-14 2010-12-23 코닌클리케 필립스 일렉트로닉스 엔.브이. Method for distributed identification, station in network
US8539544B2 (en) * 2008-05-30 2013-09-17 Motorola Mobility Llc Method of optimizing policy conformance check for a device with a large set of posture attribute combinations
US8205242B2 (en) 2008-07-10 2012-06-19 Mcafee, Inc. System and method for data mining and security policy management
US8380531B2 (en) 2008-07-25 2013-02-19 Invivodata, Inc. Clinical trial endpoint development process
TWI426762B (en) * 2008-08-04 2014-02-11 Ind Tech Res Inst Method and system for managing network identity
US9253154B2 (en) 2008-08-12 2016-02-02 Mcafee, Inc. Configuration management for a capture/registration system
US8751791B2 (en) * 2008-09-17 2014-06-10 Motorola Solutions, Inc. Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event
US8850591B2 (en) 2009-01-13 2014-09-30 Mcafee, Inc. System and method for concept building
US8706709B2 (en) 2009-01-15 2014-04-22 Mcafee, Inc. System and method for intelligent term grouping
US8473442B1 (en) 2009-02-25 2013-06-25 Mcafee, Inc. System and method for intelligent state management
US8667121B2 (en) 2009-03-25 2014-03-04 Mcafee, Inc. System and method for managing data and policies
US8447722B1 (en) 2009-03-25 2013-05-21 Mcafee, Inc. System and method for data mining and security policy management
DE102009027681A1 (en) * 2009-07-14 2011-01-20 Bundesdruckerei Gmbh Method and reading attributes from an ID token
US8683196B2 (en) * 2009-11-24 2014-03-25 Red Hat, Inc. Token renewal
US8806615B2 (en) 2010-11-04 2014-08-12 Mcafee, Inc. System and method for protecting specified data combinations
EP3839720B1 (en) * 2011-08-31 2023-11-29 Assa Abloy AB Mobile credential revocation
US8667569B2 (en) 2011-09-29 2014-03-04 Target Brands, Inc. Credentials management
US9280653B2 (en) * 2011-10-28 2016-03-08 GM Global Technology Operations LLC Security access method for automotive electronic control units
US10276054B2 (en) 2011-11-29 2019-04-30 Eresearchtechnology, Inc. Methods and systems for data analysis
US8700561B2 (en) 2011-12-27 2014-04-15 Mcafee, Inc. System and method for providing data protection workflows in a network environment
US9887989B2 (en) * 2012-06-23 2018-02-06 Pomian & Corella, Llc Protecting passwords and biometrics against back-end security breaches
US8489469B1 (en) 2012-08-30 2013-07-16 Elbex Video Ltd. Method and structure for simplified coding of display pages for operating a closed circuit E-commerce
DE102014204044A1 (en) * 2014-03-05 2015-09-10 Robert Bosch Gmbh Procedure for revoking a group of certificates
US9584492B2 (en) * 2014-06-23 2017-02-28 Vmware, Inc. Cryptographic proxy service
GB2527603B (en) * 2014-06-27 2016-08-10 Ibm Backup and invalidation of authentication credentials
US9460567B2 (en) * 2014-07-29 2016-10-04 GM Global Technology Operations LLC Establishing secure communication for vehicle diagnostic data
US20160164884A1 (en) * 2014-12-05 2016-06-09 Skuchain, Inc. Cryptographic verification of provenance in a supply chain
US9843452B2 (en) * 2014-12-15 2017-12-12 Amazon Technologies, Inc. Short-duration digital certificate issuance based on long-duration digital certificate validation
US9436923B1 (en) 2015-02-26 2016-09-06 Skuchain, Inc. Tracking unitization occurring in a supply chain
US9641338B2 (en) 2015-03-12 2017-05-02 Skuchain, Inc. Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
US9699202B2 (en) * 2015-05-20 2017-07-04 Cisco Technology, Inc. Intrusion detection to prevent impersonation attacks in computer networks
US9882727B1 (en) 2015-10-02 2018-01-30 Digicert, Inc. Partitioning certificate revocation lists
US10848320B2 (en) * 2016-03-25 2020-11-24 Apple Inc. Device-assisted verification
US10063536B2 (en) * 2016-03-25 2018-08-28 Ca, Inc. Short term or one-time-use X.509 digital certificates
KR101766303B1 (en) * 2016-04-19 2017-08-08 주식회사 코인플러그 Method for creating, registering, revoking certificate information and server using the same
US10104119B2 (en) * 2016-05-11 2018-10-16 Cisco Technology, Inc. Short term certificate management during distributed denial of service attacks
US10764067B2 (en) * 2016-05-23 2020-09-01 Pomian & Corella, Llc Operation of a certificate authority on a distributed ledger
KR101849918B1 (en) * 2016-10-26 2018-04-19 주식회사 코인플러그 Method for issuing and paying money in use of unspent transaction output based protocol, and server using the same
CA3055212A1 (en) * 2017-03-07 2018-09-13 Mastercard International Incorporated Method and system for recording point to point transaction processing
US10275223B2 (en) * 2017-06-22 2019-04-30 International Business Machines Corporation Distributed key-value consistency and mapping
CN111630811A (en) * 2017-10-19 2020-09-04 奥特海威公司 System and method for generating and hosting keys for multi-point authentication
US10938572B2 (en) 2018-01-10 2021-03-02 International Business Machines Corporation Revocable biometric-based keys for digital signing
US11184179B2 (en) * 2018-02-05 2021-11-23 Arris Enterprises Llc Security using self-signed certificate that includes an out-of-band shared secret
JP6952661B2 (en) * 2018-08-30 2021-10-20 株式会社東芝 Information processing equipment, communication equipment, information processing systems, information processing methods, and information processing programs
CA3112585A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020123538A1 (en) * 2018-12-10 2020-06-18 Silvio Micali Using virtual blockchain protocols to implement a fair electronic exchange
RU2706873C1 (en) * 2018-12-28 2019-11-21 Акционерное общество "Лаборатория Касперского" System and method of checking file eds
US11334881B2 (en) * 2019-01-28 2022-05-17 Bank Of America Corporation Security tool
CN114125844B (en) * 2021-11-24 2024-04-19 中国银行股份有限公司 Method and device for generating and downloading digital certificate
US12003655B1 (en) * 2021-12-07 2024-06-04 Amazon Technologies, Inc. Cryptographic assertions for certificate issuance
WO2025094184A1 (en) * 2023-11-05 2025-05-08 Claritas Software Solutions Ltd Method for long-term media sealing

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4324645A (en) * 1980-05-06 1982-04-13 Mobil Oil Corporation Upgrading residual oil
US4881264A (en) * 1987-07-30 1989-11-14 Merkle Ralph C Digital signature system and method based on a conventional encryption function
US5224163A (en) * 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5276901A (en) * 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
US5210795A (en) * 1992-01-10 1993-05-11 Digital Equipment Corporation Secure user authentication from personal computer
US5475826A (en) * 1993-11-19 1995-12-12 Fischer; Addison M. Method for protecting a volatile file using a single hash
NZ279622A (en) * 1994-01-13 1998-04-27 Certco Llc Encrypted secure and verifiable communication: cryptographic keys escrowed
US5825880A (en) * 1994-01-13 1998-10-20 Sudia; Frank W. Multi-step digital signature method and system
US6367013B1 (en) * 1995-01-17 2002-04-02 Eoriginal Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5796841A (en) * 1995-08-21 1998-08-18 Pitney Bowes Inc. Secure user certification for electronic commerce employing value metering system
US5793868A (en) * 1996-08-29 1998-08-11 Micali; Silvio Certificate revocation system
US6023506A (en) * 1995-10-26 2000-02-08 Hitachi, Ltd. Data encryption control apparatus and method
US5850442A (en) * 1996-03-26 1998-12-15 Entegrity Solutions Corporation Secure world wide electronic commerce over an open network
US5850444A (en) * 1996-09-09 1998-12-15 Telefonaktienbolaget L/M Ericsson (Publ) Method and apparatus for encrypting radio traffic in a telecommunications network
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
US5996076A (en) * 1997-02-19 1999-11-30 Verifone, Inc. System, method and article of manufacture for secure digital certification of electronic commerce
US5999919A (en) * 1997-02-26 1999-12-07 At&T Efficient micropayment system
US5982898A (en) * 1997-03-07 1999-11-09 At&T Corp. Certification process
US6044462A (en) * 1997-04-02 2000-03-28 Arcanvs Method and apparatus for managing key revocation
US6212636B1 (en) * 1997-05-01 2001-04-03 Itt Manufacturing Enterprises Method for establishing trust in a computer network via association
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
JPH10327147A (en) * 1997-05-21 1998-12-08 Hitachi Ltd Electronic authentication notary method and system
US6282295B1 (en) * 1997-10-28 2001-08-28 Adam Lucas Young Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers
US6202150B1 (en) * 1997-05-28 2001-03-13 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems
US6389136B1 (en) * 1997-05-28 2002-05-14 Adam Lucas Young Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys
US6125349A (en) 1997-10-01 2000-09-26 At&T Corp. Method and apparatus using digital credentials and other electronic certificates for electronic transactions
US6058484A (en) * 1997-10-09 2000-05-02 International Business Machines Corporation Systems, methods and computer program products for selection of date limited information
US6092201A (en) * 1997-10-24 2000-07-18 Entrust Technologies Method and apparatus for extending secure communication operations via a shared list
JP3905961B2 (en) * 1997-11-11 2007-04-18 インターナショナル・ビジネス・マシーンズ・コーポレーション Temporary signature authentication method and system
US6263446B1 (en) * 1997-12-23 2001-07-17 Arcot Systems, Inc. Method and apparatus for secure distribution of authentication credentials to roaming users
CA2313328A1 (en) 1998-01-09 1999-07-15 Matthew Hur Client side public key authentication method and apparatus with short-lived certificates
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US6233341B1 (en) * 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
US6324645B1 (en) * 1998-08-11 2001-11-27 Verisign, Inc. Risk management for public key management infrastructure using digital certificates
US6607136B1 (en) * 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
US6327578B1 (en) * 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
US6230266B1 (en) * 1999-02-03 2001-05-08 Sun Microsystems, Inc. Authentication system and process
US6484259B1 (en) * 1999-07-23 2002-11-19 Microsoft Corporation Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment
AU2087901A (en) 1999-12-13 2001-06-18 Rsa Security Inc. System and method for generating and managing attribute certificates
US7003571B1 (en) * 2000-01-31 2006-02-21 Telecommunication Systems Corporation Of Maryland System and method for re-directing requests from browsers for communication over non-IP based networks
US7353204B2 (en) * 2001-04-03 2008-04-01 Zix Corporation Certified transmission system

Also Published As

Publication number Publication date
JP2003534677A (en) 2003-11-18
EP1250774A2 (en) 2002-10-23
EP1250774B1 (en) 2005-08-10
WO2001052470A2 (en) 2001-07-19
US7010683B2 (en) 2006-03-07
DE60112546T2 (en) 2006-06-01
WO2001052470A3 (en) 2002-01-17
US20010032310A1 (en) 2001-10-18
ATE301894T1 (en) 2005-08-15
DE60112546D1 (en) 2005-09-15

Similar Documents

Publication Publication Date Title
AU2001227928A1 (en) Public key validation service
EP1117207A3 (en) Public key infrastructure
EP1117204A3 (en) Authorization infrastructure based on public key cryptography
WO2001072011A3 (en) Methods and systems for proofing identities using a certificate authority
AU2002362525A1 (en) System and method for creating a secure network using identity credentials of batches of devices
GB2399480A (en) Mechanism for supporting wired and wireless methods for client and server side authentication
CA2371584A1 (en) Network publishing authorization protocol
ATE306783T1 (en) PROCEDURE FOR CHARGING ONLINE NUMBER INSURANCE SERVICES
WO2006108907A3 (en) Utilizing generic authentication architecture for mobile internet protocol key distribution
CN110572267A (en) An Anonymous Electronic Voting Method Based on Consortium Blockchain
WO2009155129A3 (en) Obtaining digital identities or tokens through independent endpoint resolution
CA2356410A1 (en) Certificate validity authentication method and apparatus
GB2401509A (en) System,method and apparatus for federated single sign-on services
TW200511793A (en) System and method for secure remote access
WO1998026385A3 (en) Reliance server for electronic transaction system
WO2003091858A3 (en) Certificate based authentication authorization accounting scheme for loose coupling interworking
WO2009050924A1 (en) User authentication system and its method
WO2006020095A3 (en) Security systems and services to provide identity and uniform resource identifier verification
FI20001837A7 (en) Authentication
EP1501252A3 (en) Secure hierarchical namespaces in peer-to-peer networks
TW200623784A (en) Management of signing privileges for a cryptographic signing service
WO2006084036A3 (en) System and method for providing peer-to-peer communication
EP1641215A3 (en) System and method for bridging identities in a service oriented architecture
NO20023738D0 (en) Method for determining the authenticity of the identity of a service user and device for performing the method
WO2001041401A3 (en) System and method for encoding user information in domain names