Credentials and digitally signed objects
First Claim
1. A method for managing objects through credentials, the method comprising actions of:
- signing an object with a credential to produce a signed object;
storing at least one entry in a database, the at least one entry linking an object identifier representing the signed object to at least one aspect of the credential;
accessing the database at the at least one entry using the object identifier to retrieve the at least one aspect of the credential; and
causing the credential to be revoked using the at least one aspect of the credential.
2 Assignments
0 Petitions
Accused Products
Abstract
Object management is facilitated by signing objects with credentials and through noting and/or using an association between the signed objects and the signing credentials. In an exemplary method implementation, actions include: signing an object with a credential to produce a signed object and noting an association between an object identifier that represents the signed object and the credential. In another exemplary method implementation, actions include: receiving a revocation request for a signed object; accessing a database at an entry for the signed object to retrieve an associated credential, the associated credential having been used to sign an object to produce the signed object; and causing the associated credential to be revoked. In an exemplary electronically-accessible media implementation, a data structure thereof includes: at least one entry that associates a credential with an object identifier, the object identifier representing a signed object that was signed by the credential.
55 Citations
87 Claims
-
1. A method for managing objects through credentials, the method comprising actions of:
-
signing an object with a credential to produce a signed object;
storing at least one entry in a database, the at least one entry linking an object identifier representing the signed object to at least one aspect of the credential;
accessing the database at the at least one entry using the object identifier to retrieve the at least one aspect of the credential; and
causing the credential to be revoked using the at least one aspect of the credential. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more electronically-accessible media comprising a data structure, the data structure comprising:
-
a plurality of fields that are directed to multiple credentials; and
a plurality of fields that are directed to multiple object identifiers, each object identifier of the multiple object identifiers corresponding to a signed object that has been signed by a credential of the multiple credentials;
wherein each field of the plurality of fields that are directed to the multiple object identifiers is associated with a field of the plurality of fields that are directed to the multiple credentials. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. One or more electronically-accessible media comprising a data structure, the data structure comprising:
at least one entry that associates a credential with an object identifier, the object identifier representing a signed object that was signed by the credential. - View Dependent Claims (18)
-
19. A method for enabling object management, the method comprising actions of:
-
signing an object with a credential to produce a signed object; and
noting an association between an object identifier that represents the signed object and the credential. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for enabling object management, the method comprising actions of:
-
receiving a sign object request from a submitter;
signing an object with a credential to produce a signed object responsive to the sign object request;
storing at least one entry in a database, the at least one entry linking the signed object to the credential; and
providing the signed object to the submitter. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method for enabling object management, the method comprising actions of:
-
receiving a revocation request for a signed object;
accessing a database at an entry for the signed object to retrieve an associated credential, the associated credential having been used to sign an object to produce the signed object; and
causing the associated credential to be revoked. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. An arrangement for creating a signed object, the arrangement comprising:
-
signing means for signing an object with a credential to produce a signed object; and
storing means for storing an object identifier that represents the signed object in association with the credential. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61)
-
-
62. An arrangement for managing objects, the arrangement comprising:
-
ascertaining means for ascertaining a credential that is associated with a signed object, the credential associated with the signed object because the credential was used to sign an object to produce the signed object; and
revoking means for causing the credential to be revoked. - View Dependent Claims (63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72. A system for managing object viability through credentials, the system comprising:
-
one or more media, the one or more media including signed-object-canceller electronically-executable instructions and a database linking credentials to signed objects; and
one or more processors, the one or more processors capable of executing the electronically-executable instructions to perform actions comprising;
accessing the database using an object identifier that represents a signed object to retrieve a credential that is linked thereto; and
causing the credential to be revoked. - View Dependent Claims (73, 74, 75, 76, 77, 78)
-
-
79. A method for individual signed object management, the method comprising actions of:
-
removing a sign object request from a request queue, the sign object request including or referencing an object;
minting a new credential, the new credential including a credential identifier;
signing the object with the new credential to produce a signed object; and
recording the signed object in association with the new credential in a data structure. - View Dependent Claims (80, 81, 82, 83, 84, 85, 86, 87)
-
Specification