Efficient retrieval of cryptographic evidence
First Claim
Patent Images
1. A method for making a selection of a preferred cryptographic evidence retrieval scheme for use in validating a cryptographic statement, the method comprising:
- examining a policy for validating the cryptographic statement;
identifying at least one factor relevant to the selection of the preferred cryptographic evidence retrieval scheme; and
selecting the preferred cryptographic evidence retrieval scheme in accordance with both the policy and the factor.
2 Assignments
0 Petitions
Accused Products
Abstract
An efficient protocol for retrieving cryptographic evidence may be selected by evaluating a local policy and a number of relevant factors. Furthermore, updated cryptographic evidence may be prefetched during a time period in which there is a low volume of requests for cryptographic evidence. This low volume time period may be defined, approximately, as an overlapping window in which both a first cryptographic evidence publication and a second cryptographic evidence publication are valid.
-
Citations
20 Claims
-
1. A method for making a selection of a preferred cryptographic evidence retrieval scheme for use in validating a cryptographic statement, the method comprising:
-
examining a policy for validating the cryptographic statement;
identifying at least one factor relevant to the selection of the preferred cryptographic evidence retrieval scheme; and
selecting the preferred cryptographic evidence retrieval scheme in accordance with both the policy and the factor. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for efficiently prefetching cryptographic evidence, comprising:
-
identifying a next update time at which a first cryptographic evidence publication ceases to be valid;
identifying a next publish time at which a second cryptographic evidence publication becomes valid; and
selecting a prefetch time that is a time between the next publish time and the next update time; and
prefetching the cryptographic evidence at the prefetch time. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for selecting a cryptographic evidence retrieval scheme for validating a cryptographic statement, comprising:
-
calculating a quantity of cached online certificate status protocol responses from an issuer of the cryptographic statement; and
determining whether to request the cryptographic evidence using online certificate status protocol or a certificate revocation list based, at least in part, on a relationship between the quantity of responses and a threshold number. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification