IDENTITY MANAGEMENT CERTIFICATE OPERATIONS
First Claim
Patent Images
1. A method, implemented by a computing system programmed to perform operations, comprising:
- establishing a secure connection with a client computing system using an authentication protocol that uses symmetric-key cryptography;
receiving, by an identity management system of the computing system, a request from a client agent of the client computing system over the secure connection to perform a certificate operation associated with a certificate;
determining whether to approve the request from the client agent; and
sending the request to a certificate authority (CA) to perform the certificate operation when approved, wherein the identity management system is a trusted manager of the CA.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for identity management certificate operations is described.
54 Citations
20 Claims
-
1. A method, implemented by a computing system programmed to perform operations, comprising:
-
establishing a secure connection with a client computing system using an authentication protocol that uses symmetric-key cryptography; receiving, by an identity management system of the computing system, a request from a client agent of the client computing system over the secure connection to perform a certificate operation associated with a certificate; determining whether to approve the request from the client agent; and sending the request to a certificate authority (CA) to perform the certificate operation when approved, wherein the identity management system is a trusted manager of the CA. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An identity management system, comprising:
-
a key distribution center (KDC), wherein the KDC is configured to establish a secure connection with a client computing system using an authentication protocol that uses symmetric-key cryptography; and a registration authority (RA) coupled to receive a request from a client agent of the client computing system over the secure connection to perform a certificate operation associated with a certificate, wherein the RA is configured to determine whether to approve the request from the client agent and to send the request to a certificate authority (CA) to perform the certificate operation when approved, wherein the RA is a trusted manager of the CA. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A machine-readable storage medium having instructions, which when executed, cause a computing device to perform a method comprising:
-
establishing a secure connection with a client computing system using an authentication protocol that uses symmetric-key cryptography; receiving a request from a client agent of the client computing system over the secure connection to perform a certificate operation associated with a certificate; determining whether to approve the request from the client agent; and sending the request to a certificate authority (CA) to perform the certificate operation when approved. - View Dependent Claims (19, 20)
-
Specification