Content Control Method Using Certificate Chains
First Claim
Patent Images
1. A method for authenticating a first entity by a second entity, comprising:
- receiving at the second entity a chain of certificates for authenticating the first entity to the second entity, said chain of certificates including a plurality of continuous strings of certificates, the strings individually including at least one certificate;
said second entity verifying in a sequence the strings of certificates in said chain of certificates, wherein said strings of the certificates in the chain are received at the second entity in said sequence; and
detecting at the second entity whether the complete chain of certificates has been received.
3 Assignments
0 Petitions
Accused Products
Abstract
Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.
175 Citations
36 Claims
-
1. A method for authenticating a first entity by a second entity, comprising:
-
receiving at the second entity a chain of certificates for authenticating the first entity to the second entity, said chain of certificates including a plurality of continuous strings of certificates, the strings individually including at least one certificate; said second entity verifying in a sequence the strings of certificates in said chain of certificates, wherein said strings of the certificates in the chain are received at the second entity in said sequence; and detecting at the second entity whether the complete chain of certificates has been received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for authenticating a first entity by a second entity, comprising:
-
sending to the second entity a chain of certificates for authenticating the first entity to the second entity, said chain of certificates including a plurality of continuous strings of certificates, the strings individually including at least one certificate; said second entity verifying consecutively in a sequence the strings of certificates in said chain of certificates, wherein the strings of certificates in the chain are sent consecutively in said sequence. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for mutual authentication between a first and a second entity, comprising:
-
(a) receiving at the second entity a first chain of certificates for authenticating the first entity to the second entity, said first chain of certificates including a plurality of continuous strings of certificates, the strings in said first chain individually including at least one certificate, said second entity verifying consecutively the strings of certificates in said first chain of certificates in a first sequence, wherein said strings of the certificates in the first chain are received at the second entity consecutively in said first sequence; (b) detecting at the second entity whether the complete first chain of certificates has been received from the first entity; (c) receiving at the first entity a second chain of certificates for authenticating the second entity to the first entity, said second chain of certificates including a plurality of continuous strings of certificates, each of the strings in said second chain including at least one certificate, said first entity verifying consecutively the strings of certificates in said second chain of certificates in a second sequence, wherein the strings of the certificates in second chain are received consecutively in the second sequence; and (d) detecting at the first entity whether the complete second chain of certificates has been received from the second entity. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification