Verification system for creating a secure link
First Claim
1. A system for accessing secure applications provided by an organization, the system comprising:
- one or more memory devices having computer readable code store thereon; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to;
access an organization application, through an organization system or a third party system;
access two or more digital signatures associated with the organization application, wherein the two or more digital signatures are included within a single certificate on the organization application;
attempt to verify at least one of the two or more digital signatures as being signed by a certification authority that is trusted, wherein attempting to verify the at least one of the two or more digital signatures comprises;
attempting to verify a first digital signature, wherein the first digital signature indicating validation of the organization providing the organization application is provided by a first certification authority;
failing to verify the first digital signature;
attempting to verify a second digital signature, wherein the second digital signature indicating validation of the organization providing the organization application is provided by a second certification authority; and
verifying the second digital signature; and
receive and send information from and to the organization application after verifying the organization application using the at least one of the two or more digital signatures;
wherein the two or more digital signatures are provided on the single certificate by the first certification authority and the second certification authority.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer products, and methods are described herein for an improved secure certificate system that utilizes multiple digital signatures, and in some cases multiple public keys within one or more certificates. The improved secure certificate systems allows for additional security by having multiple certification authorities validate the organization as the owner of the organization application (e.g., website, dedicated application, or the like), as well as allowing for the use of the multiple digital signatures and/or certificates to provide seamless verification of the organization application should one or more of the digital signatures and/or certificates become compromised. Moreover, security may be improved by utilizing multiple public keys to encrypt a session key for use in sending and receiving data.
97 Citations
20 Claims
-
1. A system for accessing secure applications provided by an organization, the system comprising:
-
one or more memory devices having computer readable code store thereon; and one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to; access an organization application, through an organization system or a third party system; access two or more digital signatures associated with the organization application, wherein the two or more digital signatures are included within a single certificate on the organization application; attempt to verify at least one of the two or more digital signatures as being signed by a certification authority that is trusted, wherein attempting to verify the at least one of the two or more digital signatures comprises; attempting to verify a first digital signature, wherein the first digital signature indicating validation of the organization providing the organization application is provided by a first certification authority; failing to verify the first digital signature; attempting to verify a second digital signature, wherein the second digital signature indicating validation of the organization providing the organization application is provided by a second certification authority; and verifying the second digital signature; and receive and send information from and to the organization application after verifying the organization application using the at least one of the two or more digital signatures; wherein the two or more digital signatures are provided on the single certificate by the first certification authority and the second certification authority. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method for accessing secure applications provided by an organization, the method comprising:
-
accessing, by one or more processors, an organization application, through an organization system or a third party system; accessing, by the one or more processors, two or more digital signatures associated with the organization application, wherein the two or more digital signatures are included within a single certificate on the organization application; attempting, by the one or more processors, to verify at least one of the two or more digital signatures as being signed by a certification authority that is trusted, wherein attempting to verify the at least one of the two or more digital signatures comprises; attempting to verify a first digital signature, wherein the first digital signature indicating validation of the organization providing the organization application is provided by a first certification authority; failing to verify the first digital signature; attempting to verify a second digital signature, wherein the second digital signature indicating validation of the organization providing the organization application is provided by a second certification authority; and verifying the second digital signature; and receiving and sending, by the one or more processors, information from and to the organization application after verifying the organization application using the at least one of the two or more digital signatures; wherein the two or more digital signatures are provided on the single certificate by the first certification authority and the second certification authority. - View Dependent Claims (9, 10, 11, 12, 19, 20)
-
-
13. A computer program product for accessing secure applications provided by an organization, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured to access an organization application, through an organization system or a third party system; an executable portion configured to access two or more digital signatures associated with the organization application, wherein the two or more digital signatures are included within a single certificate on the organization application; an executable portion configured to attempt to verify at least one of the two or more digital signatures as being signed by a certification authority that is trusted, wherein attempting to verify the at least one of the two or more digital signatures comprises; attempting to verify a first digital signature, wherein a first digital signature indicating validation of the organization providing the organization application is provided by a first certification authority; failing to verify the first digital signature; attempting to verify a second digital signature, wherein a second digital signature indicating validation of the organization providing the organization application is provided by a second certification authority; and verifying the second digital signature; and an executable portion configured to receive and send information from and to the organization application after verifying the organization application using the at least one of the two or more digital signatures; wherein the two or more digital signatures are provided on the single certificate by the first certification authority and the second certification authority. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification