Method and apparatus for centralized processing of hardware tokens for PKI solutions
First Claim
1. A method for centralized processing of hardware tokens for PKI solutions comprising:
- receiving a commercially available token at a secure processing facility;
installing an operating system on the token;
creating a unique key encipherment certificate that comprises a public key for the token;
writing the unique key encipherment certificate onto the token;
writing a Root Certificate Authority certificate onto the token;
writing a unique private key onto the token, the unique private key being the matching key for the unique key encipherment certificate; and
loading a software package onto the token, the software package capable of cryptologically validating future keys and certificates, decrypting the keys and certificates, and installing the keys and certificates in the token.
2 Assignments
0 Petitions
Accused Products
Abstract
Method and apparatus for centralized processing of hardware tokens for a public key infrastructure (PKI). A commercially available token is received at a secure processing facility. An operating system is installed on the token. A unique key encipherment certificate is created that includes a public key for the token. The unique key encipherment certificate is written onto the token. A Root Certificate Authority certificate is also written onto the token. A unique private key is written onto the token where the unique private key is the matching key for the unique key encipherment certificate. A software package is loaded onto the token. The software package is capable of cryptologically validating future keys and certificates, decrypting the keys and certificates, and installing the keys and certificates in the token.
56 Citations
24 Claims
-
1. A method for centralized processing of hardware tokens for PKI solutions comprising:
-
receiving a commercially available token at a secure processing facility;
installing an operating system on the token;
creating a unique key encipherment certificate that comprises a public key for the token;
writing the unique key encipherment certificate onto the token;
writing a Root Certificate Authority certificate onto the token;
writing a unique private key onto the token, the unique private key being the matching key for the unique key encipherment certificate; and
loading a software package onto the token, the software package capable of cryptologically validating future keys and certificates, decrypting the keys and certificates, and installing the keys and certificates in the token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for centralized processing of hardware tokens for PKI solutions comprising:
-
a token;
a token initialization machine, the token being connectable to the token initialization machine;
a secure processing facility; and
a Root Certificate Authority, the Root Certificate Authority signing certificates of the secure processing facility, the secure processing facility receiving the token and using the token initialization machine to install an operating system on the token, write a unique key encipherment certificate onto the token, write a certificate of the Root Certificate Authority onto the token, write a unique private key onto the token, and load a software package onto the token where the software package is capable of cryptologically validating future keys and certificates, decrypting the keys and certificates, and installing the keys and certificates in the token. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. An apparatus comprising a storage medium containing instructions stored therein, the instructions when executed causing a computing device to perform:
-
receiving a commercially available token;
installing an operating system on the token;
writing the unique key encipherment certificate onto the token;
writing a Root Certificate Authority certificate onto the token;
writing a unique private key onto the token, the unique private key being the matching key for the unique key encipherment certificate; and
loading a software package onto the token, the software package capable of cryptologically validating future keys and certificates, decrypting the keys and certificates, and installing the keys and certificates in the token. - View Dependent Claims (24)
-
Specification