SECURE PHYSICAL DISTRIBUTION OF A SECURITY TOKEN THROUGH A MOBILE TELEPHONY PROVIDER'S INFRASTRUCTURE
First Claim
1. A method for distributing public key infrastructure (PKI) certificates comprising:
- receiving an electronically submitted user request for a PKI certificate from a remotely located computing device, wherein the user request is associated with a specific user;
determining one of a plurality of storefronts geographically located proximate to the specific user;
securely conveying a PKI certificate to the determined storefront along with a message indicating an identity of the specific user of the PKI certificate;
requiring a person physically present in the storefront who is attempting to pick-up the PKI certificate to produce personal identifying information; and
selectively delivering the PKI certificate at the storefront to the person present in the storefront depending upon whether the personal identifying information confirms the person is the specified user.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses a system and method of leveraging mobile telephone provider assets and distribution network to securely deliver security tokens, such as PKI certificates. The invention is not limited to using a mobile telephony infrastructure and other pre-existing distributions can also be used. In the invention, a user requested security token can be delivered to a storefront associated with a mobile telephone provider. The storefront can be one proximate to a requesting user. An optional activation key can also be conveyed to the requesting user. The requesting user can be required to physically travel to the storefront to receive the security token. At the storefront, an identity of the requesting user can be verified, such as through photo identification. The security token can be provided when the requesting user has been successfully verified. Use of the security token can still require activation involving the activation key.
-
Citations
20 Claims
-
1. A method for distributing public key infrastructure (PKI) certificates comprising:
-
receiving an electronically submitted user request for a PKI certificate from a remotely located computing device, wherein the user request is associated with a specific user; determining one of a plurality of storefronts geographically located proximate to the specific user; securely conveying a PKI certificate to the determined storefront along with a message indicating an identity of the specific user of the PKI certificate; requiring a person physically present in the storefront who is attempting to pick-up the PKI certificate to produce personal identifying information; and selectively delivering the PKI certificate at the storefront to the person present in the storefront depending upon whether the personal identifying information confirms the person is the specified user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A PKI certificate distribution system comprising:
-
a Web server configured to receive requests for PKI certificates from users via an unsecured network connection; a certificate authority server configured to generate PKI certificates; a plurality of storefronts, each comprising at least one storefront computing device; and a distribution server configured to manage the PKI certificate request, to securely obtain PKI certificates from the certificate authority server for each received request, and to securely convey the obtained PKI certificates to one of the storefront computing devices proximately located to a requesting user, and wherein requesting users are required to physically travel to the storefronts to which the PKI certificates are delivered where the requesting users are able to receive the requested PKI certificates after presenting identification information. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method of leveraging mobile telephone provider assets to securely deliver security tokens comprising:
-
distributing a user requested security token to a storefront associated with a mobile telephone provider, said storefront being a storefront proximate to a requesting user; conveying an activation key to the requesting user; requiring the requesting user to physically travel to the storefront to receive the security token; verifying an identity of the requesting user at the storefront; and providing the security token when the requesting user has been successfully verified, wherein the provided security token requires activation involving the activation key. - View Dependent Claims (20)
-
Specification