Server-client PKI for applied key management system and process
First Claim
Patent Images
1. A method for obtaining a public key for an application of a communication device, the method comprising:
- receiving a request from the communication device to obtain the public key;
evaluating the request based on at least one policy;
requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized;
receiving the public key from the PKI;
identifying one or more key attributes associated with the public key;
evaluating the one or more key attributes based on at least one second policy;
determining acceptability of the public key based on the one or more key attributes indicating that cryptographic considerations of the public key conforms to the at least one second policy; and
sending the public key to the communication device;
wherein the sending of the public key to the communication device is in response to determining that the public key is acceptable based on the at least one second policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
196 Citations
21 Claims
-
1. A method for obtaining a public key for an application of a communication device, the method comprising:
-
receiving a request from the communication device to obtain the public key; evaluating the request based on at least one policy; requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized; receiving the public key from the PKI; identifying one or more key attributes associated with the public key; evaluating the one or more key attributes based on at least one second policy; determining acceptability of the public key based on the one or more key attributes indicating that cryptographic considerations of the public key conforms to the at least one second policy; and sending the public key to the communication device; wherein the sending of the public key to the communication device is in response to determining that the public key is acceptable based on the at least one second policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 21)
-
-
10. An applied key management system for providing a public key to an application of a communication device, the system comprising:
-
a memory; and a processor, the processor is configured to; receive a request from the communication device to obtain the public key; evaluate the request based on at least one policy; request the public key from a public key infrastructure (PKI) in response to determine that the request is authorized; receive the public key from the PKI; identify one or more key attributes associated with the public key; evaluate the one or more key attributes based on at least one second policy; determine acceptability of the public key based on the one or more key attributes indicating that cryptographic considerations of the public key conforms to the at least one second policy; and send the public key to the communication device in response to determining that the public key is acceptable based on the at least one second policy. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory processor-readable medium having processor-readable instructions, such that, when executed, causes a processor to:
-
receive a request from the communication device to obtain the public key for an application of the communication device; evaluate the request based on at least one policy; request the public key from a public key infrastructure (PKI) in response to determine that the request is authorized; receive the public key from the PKI; identify one or more key attributes associated with the public key; evaluate the one or more key attributes based on at least one second policy; determine acceptability of the public key based on the one or more key attributes indicating that cryptographic considerations of the public key conforms to the at least one second policy; and send the public key to the communication device in response to determining that the public key is acceptable based on the at least one second policy. - View Dependent Claims (20)
-
Specification