×

Peer-to-peer authentication and authorization

  • US 7,350,074 B2
  • Filed: 04/20/2005
  • Issued: 03/25/2008
  • Est. Priority Date: 04/20/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer storage medium having computer-executable instructions for authenticating a first computing device at a second computing device, the computer-readable instructions performing steps comprising:

  • creating a root store and a trusted people store on the second computing device wherein the trusted people store comprises certificates different from certificates in the root store;

    receiving one or more certificates from the first computing device at the second computing device;

    determining if any of the certificates of the one or more certificates contains an identifier corresponding to a certificate contained in the trusted people store;

    authenticating the first computing device if any of the certificates of the trusted people store identifies the first computing device, otherwisedetermining if a last certificate of the one or more certificates is signed by a trusted root store entity, wherein the trusted root store entity is identified by a signed certificate placed in a trusted root store of the second computing device;

    determining if a first certificate of the one or more certificates identifies the first computing device;

    determining if each certificate of the one or more certificates is authenticated by a preceding certificate of the one or more certificates; and

    authenticating the first computing device if the last certificate of the one or more certificates is signed by the trusted root store entity, if the first certificate of the one or more certificates identifies the first computing device, and if each certificate of the one or more certificates is authenticated by the preceding certificate of the one or more certificates.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×