Managing database for identifying to recipients security features of devices generating digital signatures
First Claim
1. A method of managing a database by a first party for identification of security features of a device that generates digital signatures, the database existing outside of the device, comprising the steps of:
- (a) recording in the database for each of a plurality of devices, (i) a public key of a public-private key pair of the device, the private key being stored only within the device, and (ii) information including security features of the device, the security features being associated with the public key in the database, the security features including security characteristics of the device that safeguard against discovery of the private key stored within the device and/or authentication capabilities of the device that safeguard against unauthorized use of the device in generating a digital signature; and
(b) identifying by the first party, without use of a digital certificate, security features from the database to a second party recipient of an electronic message for which a digital signature was originated utilizing a private key of the public-private key pair of a particular one of the devices, the security features being for the particular device.
8 Assignments
0 Petitions
Accused Products
Abstract
Managing a database for identification of security features of a device that generates digital signatures includes (a) recording in the database for each of a plurality of devices, (i) a public key of a pair of public-private keys of the device, and (ii) information including security features of the device, the security features being associated with the public key in the database, and (b) identifying security features from the database to a recipient of an electronic message for which a digital signature was originated utilizing a private key of the public-private key pair of a particular one of the devices, the security features being for the particular device.
-
Citations
20 Claims
-
1. A method of managing a database by a first party for identification of security features of a device that generates digital signatures, the database existing outside of the device, comprising the steps of:
-
(a) recording in the database for each of a plurality of devices, (i) a public key of a public-private key pair of the device, the private key being stored only within the device, and (ii) information including security features of the device, the security features being associated with the public key in the database, the security features including security characteristics of the device that safeguard against discovery of the private key stored within the device and/or authentication capabilities of the device that safeguard against unauthorized use of the device in generating a digital signature; and
(b) identifying by the first party, without use of a digital certificate, security features from the database to a second party recipient of an electronic message for which a digital signature was originated utilizing a private key of the public-private key pair of a particular one of the devices, the security features being for the particular device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of managing a database for identification of security features of a device that generates digital signatures, the database existing outside of the device, comprising the steps of:
-
(a) recording in the database for each of a plurality of devices, (i) a public key of a public-private key pair of the device, the private key being stored within the device and not accessible from the device, and (ii) information including security features of the device, the security features being associated with the public key in the database, the security features including security characteristics of the device that safeguard against discovery of the private key stored within the device and/or authentication capabilities of the device safeguard against unauthorized use of the device in generating a digital signature; and
(b) identifying security features from the database by a recipient of an electronic message for which a digital signature was originated utilizing a private key of the public-private key pair of a particular one of the devices, the security features being for the particular device. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of managing a database by a first party for identification of security features of devices that generate digital signatures, the database existing outside of the devices, comprising the steps of:
-
(a) recording in the database for each of a plurality of devices, (i) a public key of a public-private key pair of the device, the private key being stored within the device, and (ii) information including security features of the device, the security features being associated with the public key in the database, the security features including security characteristics of the device that safeguard against discovery of the private key stored within the device and/or authentication capabilities of the device that safeguard against unauthorized use of the device in generating a digital signature; and
(b) identifying security features, without use of a digital certificate, by, (i) identifying by the first party security features from the database to a second party recipient of an electronic message for which a digital signature was originated utilizing a private key of the public-private key pair of a particular one of the devices, the security features being for the particular one of the devices; and
(ii) identifying by the first party security features from the database to a third party recipient of an electronic message for which a digital signature was originated utilizing a private key of the public-private key pair of another particular one of the devices, the security features being for this other particular one of the devices. - View Dependent Claims (20)
-
Specification