Content Control Method Using Certificate Revocation Lists
First Claim
1. A method for verifying a certificate using a certificate revocation list, wherein portions of said certificate revocation list are received from an entity at a device, comprising:
- processing said portions of a certificate revocation list sequentially using said device; and
searching for a reference to the certificate on said list using said device, wherein said processing and searching are performed concurrently.
3 Assignments
0 Petitions
Accused Products
Abstract
Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the memory device. The certificate revocation lists for authenticating host devices to memory devices may be stored in an unsecured area of the memory device for convenience of users.
139 Citations
11 Claims
-
1. A method for verifying a certificate using a certificate revocation list, wherein portions of said certificate revocation list are received from an entity at a device, comprising:
-
processing said portions of a certificate revocation list sequentially using said device; and searching for a reference to the certificate on said list using said device, wherein said processing and searching are performed concurrently. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for authenticating a host to a memory system configured to be removably connected to the host, said memory system comprising:
-
a non-volatile memory storing at least one certificate revocation list, said non-volatile memory capable of storing data; and a controller controlling access by the host to said data through an authentication process, in which the host presents at least one certificate to the memory system;
said method comprising;providing said at least one certificate revocation list to the host in response to a request from the host without authenticating the host; receiving said at least one certificate presented by the host and said at least one certificate revocation list; checking whether the at least one certificate presented by the host is on the at least one certificate revocation list, and failing the authentication process when the at least one certificate presented by the host is on the at least one certificate revocation list.
-
-
8. A method for mutual authentication between a non-volatile memory device and a host, said non-volatile memory device removably connected to said host, wherein:
-
presenting to the memory device by the host a first certificate and a certificate revocation list for verification of the first certificate by the memory device; and presenting to the host by the memory device a second certificate for verification by the host without a certificate revocation list. - View Dependent Claims (9, 10)
-
-
11. A method for authenticating a host device by a memory system, comprising:
-
removably connecting the memory system to the host device; and sending a certificate and a certificate revocation list from the host device to the memory system.
-
Specification