Binding a digital certificate to multiple trust domains
First Claim
1. A public key infrastructure comprising a participant that issues a digital certificate, wherein the digital certificate can be relied upon in at least two different trust domains, wherein:
- said public key infrastructure does not employ policy mapping between or among the trust domains; and
said public key infrastructure does not link any pair of trust domains via cross-certificates.
1 Assignment
0 Petitions
Accused Products
Abstract
A public key infrastructure comprising a participant that issues digital certificates. Each digital certificate can be relied upon in at least two different trust domains. The public key infrastructure does not employ policy mapping between or among the trust domains. Furthermore, the public key infrastructure does not link any pair of trust domains via cross-certificates. Just one trust domain is bound to the digital certificate at any given moment. The current trust domain that is to be bound to the digital certificate is elected by a relying party at the time of reliance, based upon a specific certificate validation methodology selected by the relying party.
128 Citations
13 Claims
-
1. A public key infrastructure comprising a participant that issues a digital certificate, wherein the digital certificate can be relied upon in at least two different trust domains, wherein:
-
said public key infrastructure does not employ policy mapping between or among the trust domains; and said public key infrastructure does not link any pair of trust domains via cross-certificates. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification