×

Method and apparatus for public key management

  • US 6,370,249 B1
  • Filed: 07/25/1997
  • Issued: 04/09/2002
  • Est. Priority Date: 07/25/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for public key management, the method comprises the steps of:

  • a) from time to time, providing, in a trustworthy manner by an associated authority, a list of at least a plurality of trusted public keys of a plurality of different trusted certification authorities to at least one client, wherein at least one of the plurality of trusted certification authorities is not associated with a locale that the at least one client is associated with and wherein a certificate chain is not necessary to trust the plurality of trusted public keys on the list; and

    providing trusted public keys via an on-line communication path or a stored and forward communication path;

    b) by maintaining, by the at least one client, the trusted public keys of the trusted certification authorities in a storage medium associated with a client cryptographic engine;

    c) evoking the client cryptographic engine by a client application to perform a security related operation;

    d) determining, by the client cryptographic engine, whether a public key certificate associated with the security related operation is verified as authentic based on the trusted public keys of the trusted certification authorities;

    e) when the public key certificate associated with the security related operation was verified as authentic, performing the security related operation using a subject public key of the public key certificate associated with the security related operation;

    f) providing, by the client cryptographic engine to the client application, an indication that the security operation was performed successfully; and

    g) when the public key certificate associated with the security related operation was not verified as authentic, providing, by the client cryptographic engine to the client application, an indication that the security operation was not performed successfully.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×