Certificate issue lists
First Claim
1. A method for an authority to provide authenticated information about a plurality of issued certificates, comprising the steps of:
- (a) generating a data string that includes information identifying all the plurality of issued certificates; and
(b) having the authority authenticate the data string.
8 Assignments
0 Petitions
Accused Products
Abstract
An authority provides authenticated information about a plurality of certificate identifiers by generating a data string identifying all the plurality of certificate identifiers and by having the authority authenticate one or more of the data string alone, the data string together with date information, or the data string together with additional information. The date information may include the date of authentication. The additional information may include a date of issuance of at least one of the certificates. The additional information may include certificate information about at least some of the issued certificates. The certificate information may include one or more of: revocation information or validity information of at least some of the issued certificates.
203 Citations
48 Claims
-
1. A method for an authority to provide authenticated information about a plurality of issued certificates, comprising the steps of:
-
(a) generating a data string that includes information identifying all the plurality of issued certificates; and (b) having the authority authenticate the data string. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for an authority to generate authenticated information about a plurality of certificates, comprising the steps of:
-
(a) generating a data string indicating a first set of identifiers, where identifiers, in the first set correspond to issued certificates, and a second set of identifiers, wherein identifiers of all issued certificates are outside the second set; and (b) having the authority generate the authenticated information by authenticating the data string. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for an authority to provide authenticated information about certificate identifiers, comprising, the steps of:
-
(a) generating data indicating a set of identifiers, wherein an identifier of each issued certificate is outside the set; and (b) having the authority authenticate the data. - View Dependent Claims (12)
-
-
13. A method to provide authenticated information about one or more unissued certificate identifiers, comprising the steps of:
-
(a) generating data that includes information identifying the one or more unissued certificate identifiers; and (b) authenticating the data.
-
-
14. A method for an authority to generate authenticated issuance information about a plurality of certificate identifiers, comprising the steps of:
-
(a) mapping at least two of the plurality of certificate identifiers to predetermined bit positions in a data string and having a subset of bits at the bit positions convey issuance information about the at least two certificates, the issuance information indicating whether each of the certificate identifiers corresponds to an issued certificate; and (b) generating authenticated issuance information by having the authority authenticate the data string. - View Dependent Claims (15, 16)
-
-
17. A method to generate authenticated issuance information about a plurality of certificates, comprising the steps of:
-
(a) generating a data string containing information identifying all issued certificates among the plurality of certificates that share a given characteristic; and (b) generating the authenticated issuance information by authenticating the data string. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A method to generate authenticated issuance information about a plurality of certificate identifiers, comprising the steps of:
-
(a) generating a data string containing information identifying all unissued certificate identifiers that share a given characteristic; and (b) generating the authenticated information by authenticating the data string. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A method for an authority to generate authenticated information about a plurality of certificate identifiers, comprising the steps of:
-
(a) generating a data string containing information identifying a set containing all of the certificate identifiers that share a given characteristic and correspond to issued certificates, at least one of the issued certificates not being revoked; and (b) generating the authenticated information by having the authority authenticate the data string.
-
-
28. A method for an authority to provide authenticated issuance information about issued certificates, comprising the steps of:
-
(a) choosing a plurality of characteristics; (b) for each of the characteristics, generating a data string that contains information that identifies the characteristic and all the issued certificates possessing the characteristic, wherein at least one of the certificates is not revoked and wherein each of the certificates possess at least one of the characteristics; and (c) generating the authenticated information having the authority authenticate each of the data strings. - View Dependent Claims (29, 30)
-
-
31. A method for an authority to provide authenticated issuance information about certificate identifiers, comprising the steps of:
-
(a) choosing a plurality of characteristics wherein each of the certificate identifiers possesses at least one of the characteristics; (b) for each of the characteristics, generating a data string containing information that indicates the characteristic and a set of unissued certificate identifiers possessing the characteristic; and (c) generating the authenticated information by having the authority authenticate each of the data strings. - View Dependent Claims (32, 33)
-
-
34. A method to provide authenticated issuance information about certificate identifiers, comprising the steps of:
-
(a) choosing a plurality of characteristics wherein each of the certificate identifiers possesses at least one of the characteristics; (b) for each of the characteristics, generating a data string that identifies the characteristic, all the identifiers for issued and unissued certificates possessing the characteristic, and information distinguishing the issued certificate identifiers from the unissued certificate identifiers; and (c) generating the authenticated information by authenticating each of the data strings. - View Dependent Claims (35, 36)
-
-
37. A method for providing authenticated information about certificates, comprising the steps of:
-
(a) receiving a request for information about a certificate including a proof that the certificate is issued; (b) verifying that the proof is valid; and (c) in response to the proof being valid, providing the requested information. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44)
-
-
45. A method for providing authenticated information about certificates to a requestor, comprising the steps of:
-
(a) receiving a request for a first type of information about at least one certificate including a proof that the requestor knows at least a second type of information about the certificate; (b) verifying that the proof is valid; and (c) in response to the proof being valid, providing the first type of information to the requestor. - View Dependent Claims (46, 47)
-
-
48. A method of providing to a user authenticated information about an identifier for a certificate, comprising the steps of:
-
(a) having the user provide the identifier to an intermediary; and (b) having the intermediary cause the user to receive authenticated information indicating that the identifier does not correspond to an issued certificate.
-
Specification