Validation for requests
First Claim
1. A computer-implemented method, comprising:
- receiving, by a certificate authority, a request for a certificate for a domain name;
generating, utilizing a public key cryptography protocol, a request for information regarding the domain name;
submitting, by the certificate authority, the request for information to a domain service hosting the domain name;
receiving, from the domain service, a response including a public key and including data for the domain name, with the data encrypted under an associated private key for the domain name; and
issuing, by the certificate authority, a certificate specifying the domain name and encrypted with the received public key, the certificate unable to be validated without access to the associated private key.
0 Assignments
0 Petitions
Accused Products
Abstract
A customer can demonstrate control over an element, such as a domain, by receiving a certificate from a certificate authority. After receiving a request for a certificate for a certain domain name, the certificate authority uses a public key cryptography protocol to generate a request for information regarding the domain name. The request for information is submitted to a domain service which hosts that domain name, and the domain service will provide a response to the certificate authority which includes a public key and data for the domain name, with the data encrypted under an associated private key for the domain name. The certificate authority will issue a certificate specifying the domain name and utilizing the received public key, and the certificate is unable to be validated without access to the associated private key.
37 Citations
17 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a certificate authority, a request for a certificate for a domain name; generating, utilizing a public key cryptography protocol, a request for information regarding the domain name; submitting, by the certificate authority, the request for information to a domain service hosting the domain name; receiving, from the domain service, a response including a public key and including data for the domain name, with the data encrypted under an associated private key for the domain name; and issuing, by the certificate authority, a certificate specifying the domain name and encrypted with the received public key, the certificate unable to be validated without access to the associated private key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing system, comprising:
-
at least one processor; and memory having stored therein a set of instructions, which when performed by the at least one processor, cause the computing system to; receive, by a certificate authority, a request for a certificate for a domain name; utilize public key cryptography protocol, generate a request for information regarding the domain name; submit, by the certificate authority, the request for information to a domain service hosting the domain name; receive, from the domain service, a response including a public key and including data for the domain name, with the data encrypted under an associated private key for the domain name; and issue, by the certificate authority, a certificate specifying the domain name and encrypted with the received public key, the certificate unable to be validated without access to the associated private key. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computing device-readable medium comprising computing device-executable instructions, wherein the instructions, in response to execution by a computing device, cause the computing device to:
-
receive, by a certificate authority, a request for a certificate for a domain name; utilize public key cryptography protocol, generate a request for information regarding the domain name; submit, by the certificate authority, the request for information to a domain service hosting the domain name; receive, from the domain service, a response including a public key and including data for the domain name, with the data encrypted under an associated private key for the domain name; and issue, by the certificate authority, a certificate specifying the domain name and encrypted with the received public key, the certificate unable to be validated without access to the associated private key. - View Dependent Claims (14, 15, 16, 17)
-
Specification