AU2001227928A1 - Public key validation service - Google Patents
Public key validation serviceInfo
- Publication number
- AU2001227928A1 AU2001227928A1 AU2001227928A AU2792801A AU2001227928A1 AU 2001227928 A1 AU2001227928 A1 AU 2001227928A1 AU 2001227928 A AU2001227928 A AU 2001227928A AU 2792801 A AU2792801 A AU 2792801A AU 2001227928 A1 AU2001227928 A1 AU 2001227928A1
- Authority
- AU
- Australia
- Prior art keywords
- public key
- unsigned
- pkvc
- subject
- disposable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000010200 validation analysis Methods 0.000 title abstract 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A public key validation agent (PKVA) includes a registration authority which issues a first unsigned public key validation certificate (unsigned PKVC) off-line to a subject that binds a public key of the subject to a first public key serial number (PKVN). The registration authority maintains a certificate database of unsigned PKVCs in which it stores the first unsigned PKVC. A credentials server issues a disposable public key validation certificate (disposable PKVC) on-line to the subject. The disposable PKVC binds the public key of the subject from the first unsigned PKVC to the first PKVN from the first unsigned PKVC. The credentials server maintains a table that contains entries corresponding to valid unsigned PKVCs stored in the certificate database. The PKVA can be employed in a public key validation service to validate the public key of the subject before a private/public key pair of the subject is used for authentication purposes.
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17615700P | 2000-01-14 | 2000-01-14 | |
| US60176157 | 2000-01-14 | ||
| US09/759,443 US7010683B2 (en) | 2000-01-14 | 2001-01-13 | Public key validation service |
| US09759443 | 2001-01-13 | ||
| PCT/US2001/001520 WO2001052470A2 (en) | 2000-01-14 | 2001-01-16 | Public key validation service |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2001227928A1 true AU2001227928A1 (en) | 2001-07-24 |
Family
ID=26871941
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2001227928A Abandoned AU2001227928A1 (en) | 2000-01-14 | 2001-01-16 | Public key validation service |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US7010683B2 (en) |
| EP (1) | EP1250774B1 (en) |
| JP (1) | JP2003534677A (en) |
| AT (1) | ATE301894T1 (en) |
| AU (1) | AU2001227928A1 (en) |
| DE (1) | DE60112546T2 (en) |
| WO (1) | WO2001052470A2 (en) |
Families Citing this family (114)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004104750A (en) * | 2002-07-17 | 2004-04-02 | Hitachi Ltd | Digital signature verification method |
| US7873589B2 (en) * | 2001-04-02 | 2011-01-18 | Invivodata, Inc. | Operation and method for prediction and management of the validity of subject reported data |
| US6854057B2 (en) * | 2001-09-06 | 2005-02-08 | America Online, Inc. | Digital certificate proxy |
| US20030084298A1 (en) * | 2001-10-25 | 2003-05-01 | Messerges Thomas S. | Method for efficient hashing of digital content |
| KR100843494B1 (en) * | 2001-11-06 | 2008-07-04 | 인터내셔널 비지네스 머신즈 코포레이션 | Methods and systems for supplying data, methods and systems for providing digital signatures, methods and systems for transferring ownership of electronic property, methods and systems for electronic voting, and computer-readable recording media recording computer programs |
| FR2840748B1 (en) * | 2002-06-05 | 2004-08-27 | France Telecom | METHOD AND SYSTEM FOR VERIFYING ELECTRONIC SIGNATURES AND MICROCIRCUIT CARD FOR IMPLEMENTING THE METHOD |
| JP4304362B2 (en) * | 2002-06-25 | 2009-07-29 | 日本電気株式会社 | PKI-compliant certificate confirmation processing method and apparatus, and PKI-compliant certificate confirmation processing program |
| US7484089B1 (en) * | 2002-09-06 | 2009-01-27 | Citicorp Developmemt Center, Inc. | Method and system for certificate delivery and management |
| DE60220959T2 (en) * | 2002-09-17 | 2008-02-28 | Errikos Pitsos | Method and apparatus for providing a list of public keys in a public key system |
| US7318155B2 (en) * | 2002-12-06 | 2008-01-08 | International Business Machines Corporation | Method and system for configuring highly available online certificate status protocol responders |
| US7703128B2 (en) | 2003-02-13 | 2010-04-20 | Microsoft Corporation | Digital identity management |
| CA2422334C (en) * | 2003-03-17 | 2009-06-09 | British Telecommunications Public Limited Company | Authentication of network users |
| GB2400461B (en) * | 2003-04-07 | 2006-05-31 | Hewlett Packard Development Co | Control of access to of commands to computing apparatus |
| CN1902853B (en) * | 2003-10-28 | 2012-10-03 | 塞尔蒂卡姆公司 | A method and device for verifiably generating public keys |
| US7546373B2 (en) * | 2003-11-14 | 2009-06-09 | Microsoft Corporation | Secure dynamic credential distribution over a network |
| US7814327B2 (en) | 2003-12-10 | 2010-10-12 | Mcafee, Inc. | Document registration |
| US7899828B2 (en) | 2003-12-10 | 2011-03-01 | Mcafee, Inc. | Tag data structure for maintaining relational data over captured objects |
| US7984175B2 (en) | 2003-12-10 | 2011-07-19 | Mcafee, Inc. | Method and apparatus for data capture and analysis system |
| US8656039B2 (en) | 2003-12-10 | 2014-02-18 | Mcafee, Inc. | Rule parser |
| US7774604B2 (en) | 2003-12-10 | 2010-08-10 | Mcafee, Inc. | Verifying captured objects before presentation |
| US8548170B2 (en) * | 2003-12-10 | 2013-10-01 | Mcafee, Inc. | Document de-registration |
| WO2005071877A1 (en) * | 2004-01-09 | 2005-08-04 | Corestreet, Ltd. | Signature-efficient real time credentials for ocsp and distributed ocsp |
| US7930540B2 (en) | 2004-01-22 | 2011-04-19 | Mcafee, Inc. | Cryptographic policy enforcement |
| US7984488B2 (en) * | 2004-04-09 | 2011-07-19 | Microsoft Corporation | Credential roaming in electronic computing systems |
| WO2005106658A1 (en) | 2004-04-26 | 2005-11-10 | Google Inc. | Methods and systems for dynamically composing distributed interactive applications from high-level programming languages |
| JP4314152B2 (en) * | 2004-05-21 | 2009-08-12 | 株式会社東芝 | Electronic information assurance system, business terminal |
| US7461012B2 (en) * | 2004-06-08 | 2008-12-02 | Elbex Video Ltd. | Method and apparatus for simplified e-commerce shopping via home shopping terminals |
| US7962591B2 (en) | 2004-06-23 | 2011-06-14 | Mcafee, Inc. | Object classification in a capture system |
| US8607334B2 (en) * | 2004-07-08 | 2013-12-10 | Research In Motion Limited | System and method for secure message processing |
| US8560534B2 (en) | 2004-08-23 | 2013-10-15 | Mcafee, Inc. | Database for a capture system |
| US7949849B2 (en) | 2004-08-24 | 2011-05-24 | Mcafee, Inc. | File system for a capture system |
| US8049594B1 (en) * | 2004-11-30 | 2011-11-01 | Xatra Fund Mx, Llc | Enhanced RFID instrument security |
| JP4305854B2 (en) * | 2005-01-19 | 2009-07-29 | 富士フイルム株式会社 | Image management apparatus and method |
| US7653696B2 (en) * | 2005-07-29 | 2010-01-26 | Research In Motion Limited | Method and apparatus for processing digitally signed messages to determine address mismatches |
| US7907608B2 (en) | 2005-08-12 | 2011-03-15 | Mcafee, Inc. | High speed packet capture |
| US7818326B2 (en) | 2005-08-31 | 2010-10-19 | Mcafee, Inc. | System and method for word indexing in a capture system and querying thereof |
| US20070071243A1 (en) * | 2005-09-23 | 2007-03-29 | Microsoft Corporation | Key validation service |
| US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
| US7730011B1 (en) | 2005-10-19 | 2010-06-01 | Mcafee, Inc. | Attributes of captured objects in a capture system |
| JP4736722B2 (en) * | 2005-11-04 | 2011-07-27 | コニカミノルタホールディングス株式会社 | Authentication method, information processing apparatus, and computer program |
| US7657104B2 (en) | 2005-11-21 | 2010-02-02 | Mcafee, Inc. | Identifying image type in a capture system |
| US7600123B2 (en) * | 2005-12-22 | 2009-10-06 | Microsoft Corporation | Certificate registration after issuance for secure communication |
| KR100714124B1 (en) * | 2006-02-21 | 2007-05-02 | 한국전자통신연구원 | Certificate issuing device and method using user consent information |
| EP1833222A1 (en) * | 2006-03-10 | 2007-09-12 | Abb Research Ltd. | Access control protocol for embedded devices |
| US8504537B2 (en) | 2006-03-24 | 2013-08-06 | Mcafee, Inc. | Signature distribution in a document registration system |
| PT2011301E (en) * | 2006-04-10 | 2011-09-23 | Trust Integration Services B V | Arrangement of and method for secure data transmission. |
| US7689614B2 (en) | 2006-05-22 | 2010-03-30 | Mcafee, Inc. | Query generation for a capture system |
| US8010689B2 (en) | 2006-05-22 | 2011-08-30 | Mcafee, Inc. | Locational tagging in a capture system |
| US7958227B2 (en) | 2006-05-22 | 2011-06-07 | Mcafee, Inc. | Attributes of captured objects in a capture system |
| US8942433B2 (en) * | 2006-12-01 | 2015-01-27 | Luke Small | System for scheduling, recordation and biometric validation of interpersonal interactions |
| US8612773B2 (en) * | 2007-05-03 | 2013-12-17 | International Business Machines Corporation | Method and system for software installation |
| US8296559B2 (en) * | 2007-05-31 | 2012-10-23 | Red Hat, Inc. | Peer-to-peer SMIME mechanism |
| US8072967B2 (en) * | 2007-07-20 | 2011-12-06 | Cisco Technology, Inc. | VoIP call routing information registry including hash access mechanism |
| US8223755B2 (en) * | 2007-07-20 | 2012-07-17 | Cisco Technology, Inc. | Node reputation based on knowledge of PSTN calls |
| US8228903B2 (en) * | 2007-07-20 | 2012-07-24 | Cisco Technology, Inc. | Integration of VoIP address discovery with PBXs |
| US8199746B2 (en) | 2007-07-20 | 2012-06-12 | Cisco Technology, Inc. | Using PSTN reachability to verify VoIP call routing information |
| US8228902B2 (en) * | 2007-07-20 | 2012-07-24 | Cisco Technology, Inc. | Separation of validation services in VoIP address discovery system |
| US8228904B2 (en) * | 2007-07-20 | 2012-07-24 | Cisco Technology, Inc. | Using PSTN reachability in anonymous verification of VoIP call routing information |
| US8121114B2 (en) | 2009-02-12 | 2012-02-21 | Cisco Technology, Inc. | Prevention of voice over IP spam |
| JP5303881B2 (en) * | 2007-08-15 | 2013-10-02 | 富士通セミコンダクター株式会社 | Field effect transistor and method of manufacturing field effect transistor |
| US8484752B2 (en) | 2007-11-14 | 2013-07-09 | Caterpillar Inc. | Verifying authenticity of electronic control unit code |
| US8321933B2 (en) * | 2007-11-14 | 2012-11-27 | Caterpillar Inc. | Securing electronic control unit code |
| US8301877B2 (en) * | 2008-03-10 | 2012-10-30 | Secureauth Corporation | System and method for configuring a valid duration period for a digital certificate |
| KR20100134745A (en) * | 2008-04-14 | 2010-12-23 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Method for distributed identification, station in network |
| US8539544B2 (en) * | 2008-05-30 | 2013-09-17 | Motorola Mobility Llc | Method of optimizing policy conformance check for a device with a large set of posture attribute combinations |
| US8205242B2 (en) | 2008-07-10 | 2012-06-19 | Mcafee, Inc. | System and method for data mining and security policy management |
| US8380531B2 (en) | 2008-07-25 | 2013-02-19 | Invivodata, Inc. | Clinical trial endpoint development process |
| TWI426762B (en) * | 2008-08-04 | 2014-02-11 | Ind Tech Res Inst | Method and system for managing network identity |
| US9253154B2 (en) | 2008-08-12 | 2016-02-02 | Mcafee, Inc. | Configuration management for a capture/registration system |
| US8751791B2 (en) * | 2008-09-17 | 2014-06-10 | Motorola Solutions, Inc. | Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event |
| US8850591B2 (en) | 2009-01-13 | 2014-09-30 | Mcafee, Inc. | System and method for concept building |
| US8706709B2 (en) | 2009-01-15 | 2014-04-22 | Mcafee, Inc. | System and method for intelligent term grouping |
| US8473442B1 (en) | 2009-02-25 | 2013-06-25 | Mcafee, Inc. | System and method for intelligent state management |
| US8667121B2 (en) | 2009-03-25 | 2014-03-04 | Mcafee, Inc. | System and method for managing data and policies |
| US8447722B1 (en) | 2009-03-25 | 2013-05-21 | Mcafee, Inc. | System and method for data mining and security policy management |
| DE102009027681A1 (en) * | 2009-07-14 | 2011-01-20 | Bundesdruckerei Gmbh | Method and reading attributes from an ID token |
| US8683196B2 (en) * | 2009-11-24 | 2014-03-25 | Red Hat, Inc. | Token renewal |
| US8806615B2 (en) | 2010-11-04 | 2014-08-12 | Mcafee, Inc. | System and method for protecting specified data combinations |
| EP3839720B1 (en) * | 2011-08-31 | 2023-11-29 | Assa Abloy AB | Mobile credential revocation |
| US8667569B2 (en) | 2011-09-29 | 2014-03-04 | Target Brands, Inc. | Credentials management |
| US9280653B2 (en) * | 2011-10-28 | 2016-03-08 | GM Global Technology Operations LLC | Security access method for automotive electronic control units |
| US10276054B2 (en) | 2011-11-29 | 2019-04-30 | Eresearchtechnology, Inc. | Methods and systems for data analysis |
| US8700561B2 (en) | 2011-12-27 | 2014-04-15 | Mcafee, Inc. | System and method for providing data protection workflows in a network environment |
| US9887989B2 (en) * | 2012-06-23 | 2018-02-06 | Pomian & Corella, Llc | Protecting passwords and biometrics against back-end security breaches |
| US8489469B1 (en) | 2012-08-30 | 2013-07-16 | Elbex Video Ltd. | Method and structure for simplified coding of display pages for operating a closed circuit E-commerce |
| DE102014204044A1 (en) * | 2014-03-05 | 2015-09-10 | Robert Bosch Gmbh | Procedure for revoking a group of certificates |
| US9584492B2 (en) * | 2014-06-23 | 2017-02-28 | Vmware, Inc. | Cryptographic proxy service |
| GB2527603B (en) * | 2014-06-27 | 2016-08-10 | Ibm | Backup and invalidation of authentication credentials |
| US9460567B2 (en) * | 2014-07-29 | 2016-10-04 | GM Global Technology Operations LLC | Establishing secure communication for vehicle diagnostic data |
| US20160164884A1 (en) * | 2014-12-05 | 2016-06-09 | Skuchain, Inc. | Cryptographic verification of provenance in a supply chain |
| US9843452B2 (en) * | 2014-12-15 | 2017-12-12 | Amazon Technologies, Inc. | Short-duration digital certificate issuance based on long-duration digital certificate validation |
| US9436923B1 (en) | 2015-02-26 | 2016-09-06 | Skuchain, Inc. | Tracking unitization occurring in a supply chain |
| US9641338B2 (en) | 2015-03-12 | 2017-05-02 | Skuchain, Inc. | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items |
| US9699202B2 (en) * | 2015-05-20 | 2017-07-04 | Cisco Technology, Inc. | Intrusion detection to prevent impersonation attacks in computer networks |
| US9882727B1 (en) | 2015-10-02 | 2018-01-30 | Digicert, Inc. | Partitioning certificate revocation lists |
| US10848320B2 (en) * | 2016-03-25 | 2020-11-24 | Apple Inc. | Device-assisted verification |
| US10063536B2 (en) * | 2016-03-25 | 2018-08-28 | Ca, Inc. | Short term or one-time-use X.509 digital certificates |
| KR101766303B1 (en) * | 2016-04-19 | 2017-08-08 | 주식회사 코인플러그 | Method for creating, registering, revoking certificate information and server using the same |
| US10104119B2 (en) * | 2016-05-11 | 2018-10-16 | Cisco Technology, Inc. | Short term certificate management during distributed denial of service attacks |
| US10764067B2 (en) * | 2016-05-23 | 2020-09-01 | Pomian & Corella, Llc | Operation of a certificate authority on a distributed ledger |
| KR101849918B1 (en) * | 2016-10-26 | 2018-04-19 | 주식회사 코인플러그 | Method for issuing and paying money in use of unspent transaction output based protocol, and server using the same |
| CA3055212A1 (en) * | 2017-03-07 | 2018-09-13 | Mastercard International Incorporated | Method and system for recording point to point transaction processing |
| US10275223B2 (en) * | 2017-06-22 | 2019-04-30 | International Business Machines Corporation | Distributed key-value consistency and mapping |
| CN111630811A (en) * | 2017-10-19 | 2020-09-04 | 奥特海威公司 | System and method for generating and hosting keys for multi-point authentication |
| US10938572B2 (en) | 2018-01-10 | 2021-03-02 | International Business Machines Corporation | Revocable biometric-based keys for digital signing |
| US11184179B2 (en) * | 2018-02-05 | 2021-11-23 | Arris Enterprises Llc | Security using self-signed certificate that includes an out-of-band shared secret |
| JP6952661B2 (en) * | 2018-08-30 | 2021-10-20 | 株式会社東芝 | Information processing equipment, communication equipment, information processing systems, information processing methods, and information processing programs |
| CA3112585A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
| WO2020123538A1 (en) * | 2018-12-10 | 2020-06-18 | Silvio Micali | Using virtual blockchain protocols to implement a fair electronic exchange |
| RU2706873C1 (en) * | 2018-12-28 | 2019-11-21 | Акционерное общество "Лаборатория Касперского" | System and method of checking file eds |
| US11334881B2 (en) * | 2019-01-28 | 2022-05-17 | Bank Of America Corporation | Security tool |
| CN114125844B (en) * | 2021-11-24 | 2024-04-19 | 中国银行股份有限公司 | Method and device for generating and downloading digital certificate |
| US12003655B1 (en) * | 2021-12-07 | 2024-06-04 | Amazon Technologies, Inc. | Cryptographic assertions for certificate issuance |
| WO2025094184A1 (en) * | 2023-11-05 | 2025-05-08 | Claritas Software Solutions Ltd | Method for long-term media sealing |
Family Cites Families (42)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4324645A (en) * | 1980-05-06 | 1982-04-13 | Mobil Oil Corporation | Upgrading residual oil |
| US4881264A (en) * | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
| US5224163A (en) * | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
| US5276901A (en) * | 1991-12-16 | 1994-01-04 | International Business Machines Corporation | System for controlling group access to objects using group access control folder and group identification as individual user |
| US5210795A (en) * | 1992-01-10 | 1993-05-11 | Digital Equipment Corporation | Secure user authentication from personal computer |
| US5475826A (en) * | 1993-11-19 | 1995-12-12 | Fischer; Addison M. | Method for protecting a volatile file using a single hash |
| NZ279622A (en) * | 1994-01-13 | 1998-04-27 | Certco Llc | Encrypted secure and verifiable communication: cryptographic keys escrowed |
| US5825880A (en) * | 1994-01-13 | 1998-10-20 | Sudia; Frank W. | Multi-step digital signature method and system |
| US6367013B1 (en) * | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
| US5796841A (en) * | 1995-08-21 | 1998-08-18 | Pitney Bowes Inc. | Secure user certification for electronic commerce employing value metering system |
| US5793868A (en) * | 1996-08-29 | 1998-08-11 | Micali; Silvio | Certificate revocation system |
| US6023506A (en) * | 1995-10-26 | 2000-02-08 | Hitachi, Ltd. | Data encryption control apparatus and method |
| US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
| US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
| US6029150A (en) * | 1996-10-04 | 2000-02-22 | Certco, Llc | Payment and transactions in electronic commerce system |
| US5903882A (en) * | 1996-12-13 | 1999-05-11 | Certco, Llc | Reliance server for electronic transaction system |
| US5996076A (en) * | 1997-02-19 | 1999-11-30 | Verifone, Inc. | System, method and article of manufacture for secure digital certification of electronic commerce |
| US5999919A (en) * | 1997-02-26 | 1999-12-07 | At&T | Efficient micropayment system |
| US5982898A (en) * | 1997-03-07 | 1999-11-09 | At&T Corp. | Certification process |
| US6044462A (en) * | 1997-04-02 | 2000-03-28 | Arcanvs | Method and apparatus for managing key revocation |
| US6212636B1 (en) * | 1997-05-01 | 2001-04-03 | Itt Manufacturing Enterprises | Method for establishing trust in a computer network via association |
| US6202151B1 (en) * | 1997-05-09 | 2001-03-13 | Gte Service Corporation | System and method for authenticating electronic transactions using biometric certificates |
| JPH10327147A (en) * | 1997-05-21 | 1998-12-08 | Hitachi Ltd | Electronic authentication notary method and system |
| US6282295B1 (en) * | 1997-10-28 | 2001-08-28 | Adam Lucas Young | Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers |
| US6202150B1 (en) * | 1997-05-28 | 2001-03-13 | Adam Lucas Young | Auto-escrowable and auto-certifiable cryptosystems |
| US6389136B1 (en) * | 1997-05-28 | 2002-05-14 | Adam Lucas Young | Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys |
| US6125349A (en) | 1997-10-01 | 2000-09-26 | At&T Corp. | Method and apparatus using digital credentials and other electronic certificates for electronic transactions |
| US6058484A (en) * | 1997-10-09 | 2000-05-02 | International Business Machines Corporation | Systems, methods and computer program products for selection of date limited information |
| US6092201A (en) * | 1997-10-24 | 2000-07-18 | Entrust Technologies | Method and apparatus for extending secure communication operations via a shared list |
| JP3905961B2 (en) * | 1997-11-11 | 2007-04-18 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Temporary signature authentication method and system |
| US6263446B1 (en) * | 1997-12-23 | 2001-07-17 | Arcot Systems, Inc. | Method and apparatus for secure distribution of authentication credentials to roaming users |
| CA2313328A1 (en) | 1998-01-09 | 1999-07-15 | Matthew Hur | Client side public key authentication method and apparatus with short-lived certificates |
| US6233577B1 (en) * | 1998-02-17 | 2001-05-15 | Phone.Com, Inc. | Centralized certificate management system for two-way interactive communication devices in data networks |
| US6233341B1 (en) * | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
| US6324645B1 (en) * | 1998-08-11 | 2001-11-27 | Verisign, Inc. | Risk management for public key management infrastructure using digital certificates |
| US6607136B1 (en) * | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
| US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
| US6230266B1 (en) * | 1999-02-03 | 2001-05-08 | Sun Microsystems, Inc. | Authentication system and process |
| US6484259B1 (en) * | 1999-07-23 | 2002-11-19 | Microsoft Corporation | Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment |
| AU2087901A (en) | 1999-12-13 | 2001-06-18 | Rsa Security Inc. | System and method for generating and managing attribute certificates |
| US7003571B1 (en) * | 2000-01-31 | 2006-02-21 | Telecommunication Systems Corporation Of Maryland | System and method for re-directing requests from browsers for communication over non-IP based networks |
| US7353204B2 (en) * | 2001-04-03 | 2008-04-01 | Zix Corporation | Certified transmission system |
-
2001
- 2001-01-13 US US09/759,443 patent/US7010683B2/en not_active Expired - Fee Related
- 2001-01-16 AT AT01902090T patent/ATE301894T1/en not_active IP Right Cessation
- 2001-01-16 JP JP2001552572A patent/JP2003534677A/en active Pending
- 2001-01-16 AU AU2001227928A patent/AU2001227928A1/en not_active Abandoned
- 2001-01-16 DE DE60112546T patent/DE60112546T2/en not_active Expired - Lifetime
- 2001-01-16 EP EP01902090A patent/EP1250774B1/en not_active Expired - Lifetime
- 2001-01-16 WO PCT/US2001/001520 patent/WO2001052470A2/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| JP2003534677A (en) | 2003-11-18 |
| EP1250774A2 (en) | 2002-10-23 |
| EP1250774B1 (en) | 2005-08-10 |
| WO2001052470A2 (en) | 2001-07-19 |
| US7010683B2 (en) | 2006-03-07 |
| DE60112546T2 (en) | 2006-06-01 |
| WO2001052470A3 (en) | 2002-01-17 |
| US20010032310A1 (en) | 2001-10-18 |
| ATE301894T1 (en) | 2005-08-15 |
| DE60112546D1 (en) | 2005-09-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2001227928A1 (en) | Public key validation service | |
| EP1117207A3 (en) | Public key infrastructure | |
| EP1117204A3 (en) | Authorization infrastructure based on public key cryptography | |
| WO2001072011A3 (en) | Methods and systems for proofing identities using a certificate authority | |
| AU2002362525A1 (en) | System and method for creating a secure network using identity credentials of batches of devices | |
| GB2399480A (en) | Mechanism for supporting wired and wireless methods for client and server side authentication | |
| CA2371584A1 (en) | Network publishing authorization protocol | |
| ATE306783T1 (en) | PROCEDURE FOR CHARGING ONLINE NUMBER INSURANCE SERVICES | |
| WO2006108907A3 (en) | Utilizing generic authentication architecture for mobile internet protocol key distribution | |
| CN110572267A (en) | An Anonymous Electronic Voting Method Based on Consortium Blockchain | |
| WO2009155129A3 (en) | Obtaining digital identities or tokens through independent endpoint resolution | |
| CA2356410A1 (en) | Certificate validity authentication method and apparatus | |
| GB2401509A (en) | System,method and apparatus for federated single sign-on services | |
| TW200511793A (en) | System and method for secure remote access | |
| WO1998026385A3 (en) | Reliance server for electronic transaction system | |
| WO2003091858A3 (en) | Certificate based authentication authorization accounting scheme for loose coupling interworking | |
| WO2009050924A1 (en) | User authentication system and its method | |
| WO2006020095A3 (en) | Security systems and services to provide identity and uniform resource identifier verification | |
| FI20001837A7 (en) | Authentication | |
| EP1501252A3 (en) | Secure hierarchical namespaces in peer-to-peer networks | |
| TW200623784A (en) | Management of signing privileges for a cryptographic signing service | |
| WO2006084036A3 (en) | System and method for providing peer-to-peer communication | |
| EP1641215A3 (en) | System and method for bridging identities in a service oriented architecture | |
| NO20023738D0 (en) | Method for determining the authenticity of the identity of a service user and device for performing the method | |
| WO2001041401A3 (en) | System and method for encoding user information in domain names |