Secured centralized public key infrastructure
First Claim
1. A system for providing public key infrastructure security in a wide area computer network comprising:
- a user terminal coupled to the computer network including a client system;
a private key, and a public key assigned to a user when the user registers with the system using the user terminal;
a database remote from the user terminal for securely storing the private key and the public key;
a server system remote from the user terminal and coupled to the computer network including a computer executable code for performing a cryptographic function as a user transaction data on behalf of the user.
7 Assignments
0 Petitions
Accused Products
Abstract
An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a central database is disclosed. The cryptographic modules are capable of implementing the USPS Information Based Indicia Program Postal Security Device Performance Criteria and other required VBI standards. The modules encipher the information stored in the central database for all of the on-line VBI system customers and are capable of preventing access to the database by unauthorized users. Additionally, the cryptographic module is capable of preventing unauthorized and undetected modification, including the unauthorized modification, substitution, insertion, and deletion of VBI related data and cryptographically critical security parameters.
-
Citations
37 Claims
-
1. A system for providing public key infrastructure security in a wide area computer network comprising:
-
a user terminal coupled to the computer network including a client system;
a private key, and a public key assigned to a user when the user registers with the system using the user terminal;
a database remote from the user terminal for securely storing the private key and the public key;
a server system remote from the user terminal and coupled to the computer network including a computer executable code for performing a cryptographic function as a user transaction data on behalf of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for providing public key infrastructure security in a wide area computer network comprising the steps of:
-
assigning a private key and a public key certificate to a user when the user registers with the system using a user terminal coupled to the computer network;
storing the private key and the public key in a database remote from the user terminal; and
performing a cryptographic function as a user transaction data on behalf of the user utilizing the stored private key. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification