Entity authentication in a shared hosting computer network environment
First Claim
1. Apparatus for authenticating an entity in a shared hosting computer network environment, said apparatus comprising:
- a service provider computer containing a plurality of entity sites;
connected to the service provider computer, a trusted third party computer adapted to provide a conglomerated authenticity certification to the service provider computer; and
coupled to the trusted third party computer, converting means for enabling an entity to seek to convert the conglomerated authenticity certification into an individualized authenticity certification covering that entity'"'"'s site.
7 Assignments
0 Petitions
Accused Products
Abstract
Apparati, methods, and computer readable media for authenticating an entity (9) in a shared hosting computer network (4) environment. A service provider computer (2) contains a plurality of entity sites (5). Connected to the service provider computer (2), a trusted third party computer (1) is adapted to provide a conglomerated authenticity certification to the service provider computer (2). Coupled to the trusted third party computer (1) is a means (10) for enabling an entity (9) to seek to convert the conglomerated authenticity certification into an individualized authenticity certification covering that entity'"'"'s site (5).
172 Citations
26 Claims
-
1. Apparatus for authenticating an entity in a shared hosting computer network environment, said apparatus comprising:
-
a service provider computer containing a plurality of entity sites;
connected to the service provider computer, a trusted third party computer adapted to provide a conglomerated authenticity certification to the service provider computer; and
coupled to the trusted third party computer, converting means for enabling an entity to seek to convert the conglomerated authenticity certification into an individualized authenticity certification covering that entity'"'"'s site. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method by which a trusted third party empowers a service provider to offer to entities having sites hosted on said service provider'"'"'s computer an ability to seek from the trusted third party individualized authenticity certifications covering said entities, sites, said method comprising the steps of:
-
the trusted third party providing the service provider with a conglomerated authenticity certification; and
the service provider making available to the entities a conversion means by which the entities may seek individualized authenticity certifications from the trusted third party. - View Dependent Claims (8, 9)
-
-
10. In a computer network in which a service provider computer hosts a plurality of entities, a method by which an entity desiring authentication applies for an individualized authenticity certification from a trusted third party, said method comprising the steps of:
-
the trusted third party providing a conglomerated authenticity certification to the service provider computer;
the service provider computer making available to the desirous entity an activation tool; and
the desirous entity presenting the activation tool to the trusted third party, thereby petitioning the trusted third party to convert the conglomerated authenticity certification into an individualized authenticity certification. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer readable medium containing a computer program by which a trusted third party empowers a service provider to offer to entities having sites hosted on said service provider'"'"'s computer an ability to obtain from the trusted third party individualized authenticity certifications covering said entities'"'"' sites, said computer program containing instructions for:
-
enabling the trusted third party to provide the service provider with a conglomerated authenticity certification; and
enabling the service provider to make available to the entities a conversion means by which the entities may seek individualized authenticity certifications from the trusted third party.
-
-
26. A computer readable medium containing a computer program by which an entity having a site hosted on a service provider computer that hosts a plurality of entities'"'"' sites can seek authentication from a trusted third party, said computer program containing instructions for:
-
enabling the trusted third party to provide a conglomerated authenticity certification to the service provider computer;
enabling the service provider computer to make available to the seeking entity an activation tool; and
enabling the seeking entity to present the activation tool to the trusted third party, thereby petitioning the trusted third party to convert the conglomerated authenticity certification into an individualized authenticity certification.
-
Specification