Token-Based Management System for PKI Personalization Process
First Claim
1. A system for token-based management of a PKI personalization process comprising:
- a token request and management system (TRMS) configured to gather request information from a requester;
a token personalization system (TPS) configured to personalize a hardware token such that usage of said hardware token is constrained by said request information; and
a workstation configured to receive said hardware token and use data contained within said hardware token to request PKI data from a PKI server;
said workstation personalizing a manufactured product with said PKI data.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for token-based management of a PKI personalization process includes a token request and management system (TRMS) configured to gather request information from a requestor; and a token personalization system (TPS) configured to personalize a hardware token such that usage of the hardware token is constrained by the request information. A method for token-based management of a PKI personalization process includes: requesting a hardware token; personalizing a hardware token such that the hardware token is confined to operation within limiting parameters; binding the hardware token to a workstation which is configured receive the hardware token and use credentials within the hardware token to request and download PKI data from a PKI server, the workstation being further configured to personalize an end user product by loading the PKI data into internal memory contained within the end user product; and monitoring usage of the hardware token and the PKI data.
-
Citations
20 Claims
-
1. A system for token-based management of a PKI personalization process comprising:
-
a token request and management system (TRMS) configured to gather request information from a requester; a token personalization system (TPS) configured to personalize a hardware token such that usage of said hardware token is constrained by said request information; and a workstation configured to receive said hardware token and use data contained within said hardware token to request PKI data from a PKI server;
said workstation personalizing a manufactured product with said PKI data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for token-based management of a PKI personalization process comprising:
-
a token request and management system (TRMS) configured to gather request information from a requester;
options for selecting said request information being limited by said requester'"'"'s identity and location;
said request information comprising a location based trust domain, PKI data type, and a workstation identifier;a token personalization system (TPS) configured to personalize a hardware token such that usage of said hardware token is constrained by said request information; a workstation corresponding to said workstation identifier being configured to receive said hardware token and using credentials contained within said hardware token to request PKI data from a PKI server, said workstation personalizing a manufactured product with said PKI data; wherein said PKI server compares credential information supplied by said hardware token to an access control list, said access control list comprising a list of workstations authorized to download said PKI data type; a token monitor server (TMS), said TMS monitoring actual usage of said hardware token, said TMS maintaining a global active connection list and a global blacklist of tokens that have been suspended or revoked;
wherein connections requested by workstations using credentials of a said hardware token that has been suspended or revoked are rejected.
-
-
16. A method for token-based management of a PKI personalization process comprising:
-
requesting a hardware token; personalizing said hardware token such that the use of credentials contained within said hardware token is confined within limiting parameters; binding said hardware token to a workstation within a product personalization facility, said workstation being configured receive said hardware token and use said credentials within said hardware token to request and download PKI data from a PKI server, said workstation being further configured to personalize an end user product by loading said PKI data into internal memory contained within said end user product; and monitoring usage of said hardware token and said PKI data. - View Dependent Claims (17, 18, 19, 20)
-
Specification