Method and apparatus for extending secure communication operations via a shared list
First Claim
1. A method for extending secure communication operation via a shared list, the method comprises the steps of:
- a) determining whether shared list authorization is enabled;
b) when the shared list authorization is enabled, identifying at least one user to be added to the shared list to produce at least one identified user;
c) verifying trust with the at least one identified user; and
d) when the trust is established with the at least one identified user, adding secure communication parameters of the at least one identified user to the shared list.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for extending secure communication operations via shared lists is accomplished by creating a shared list in accordance with authorization parameters by one user and subsequently accessing the shared list via the authorization parameters by this and other users. To create the list, a user within the secured communication system determines whether it has been enabled, or authorized, to create a shared list. If so, the user identifies at least one other user to be added to the shared list. Having identified another user, the user creating the shared list verifies that the secure communication parameters (which includes a public key certificate of an end-user or of a certification authority) it has received regarding the another user is trustworthy. If the secure communication parameters are identified as trustworthy, the secure communication parameters of the another user are added to the shared list. To authenticate the shared list, the user creating the list digitally signs it. Once the shared list is created, other users, if authorized, may access the shared list to obtain certificates (e.g., encryption and/or signature verification certificates) of the users contained in the list.
-
Citations
29 Claims
-
1. A method for extending secure communication operation via a shared list, the method comprises the steps of:
-
a) determining whether shared list authorization is enabled; b) when the shared list authorization is enabled, identifying at least one user to be added to the shared list to produce at least one identified user; c) verifying trust with the at least one identified user; and d) when the trust is established with the at least one identified user, adding secure communication parameters of the at least one identified user to the shared list. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for extending secure communication operation via a shared list, the method comprises the steps of:
-
a) authorizing at least one of a plurality of users to process the shared list, wherein the shared list includes secure communication parameters of at least one user; and b) authorizing at least some of the plurality of users to utilize the shared list, wherein the authorizing includes at least one of;
using the secure communication parameters of the at least one user and redistributing the shared list to another end user. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for extending secure communication operation via a shared list, the method comprises the steps of:
-
a) utilizing the shared list, wherein the shared list was created by at least one of a plurality of users and wherein the shared list includes secure communication parameters; b) verifying validity of the shared list; and c) when the shared list is valid, utilizing at least one entry in the shared list to process a secure communication. - View Dependent Claims (15, 16, 17)
-
-
18. A digital storage medium for storing programming instructions that, when read by a processing unit, causes the processing unit to extend secure communication operation via a shared list, the digital storage medium comprises:
-
first storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to determine whether shared list authorization is enabled; second storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to identify at least one user to be added to the shared list to produce at least one identified user when the shared list authorization is enabled; third storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to verify trust with the at least ore identified user; and fourth storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to add secure communication parameters of the at least one identified user to the shared list when the trust is established with the at least one identified user. - View Dependent Claims (19, 20, 21)
-
-
22. A digital storage medium for storing programming instructions that, when read by a processing unit, causes the processing unit to extend secure communication operation via a shared list, the digital storage medium comprises:
-
first storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to authorize at least one of a plurality of users to process the shared list, wherein the shared list includes secure communication parameters of at least one user; and second storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to authorize at least some of the plurality of users to utilize the shared list, wherein the authorizing includes at least one of using the secure communication parameters of the at least one user and redistributing the shared list to another end user. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A digital storage medium for storing programming instructions that, when read by a processing unit, causes the processing unit to extend secure communication operation via a shared list, the digital storage medium comprises:
-
first storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to utilize the shared list, wherein the shared list was created by at least one of a plurality of users and wherein the shared list includes secure communication parameters; second storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to verify validity of the shared list; third storage means for storing programming instructions that, when read by the processing unit, causes the processing unit to utilize at least one entry in the shared list to process a secure communication when the shared list is valid. - View Dependent Claims (28, 29)
-
Specification