Method and system for the authentication of a public key certificate
First Claim
1. A method for authentication of a public key certificate as a service to a relying party (RP) in response to a request for said authentication by the RP who desires to determine a level of trust in a Certificate Authority (CA) that issued the certificate, said method comprising:
- accessing a first quality level of each quality characteristic of a first set of quality characteristics required of the CA by the RP, said CA being a member of a Public Key Infrastructure (PKI) having a Certificate Policy (CP);
ascertaining a second quality level of each quality characteristic of a second set of quality characteristics possessed by the CA, each ascertained quality characteristic of the second set corresponding to an accessed quality characteristic of the first set on a one-to-one basis, at least one quality characteristic of the second set relating to at least one element of the CP;
a digital computer comparing the ascertained second quality level of each quality characteristic of the second set with the accessed quality level of each corresponding quality characteristic of the first set; and
said digital computer communicating a first result of said comparing to the RP, said first result being that the certificate is authenticated if said comparing has determined that each first quality level is not greater than each corresponding second quality level, otherwise said first result being that the certificate is not authenticated, said accessing, ascertaining, comparing, and communicating being performed by a certificate classification service,wherein the at least one element of the CP to which the at least one quality characteristic of the second set is related comprises items selected from the group consisting of;
disaster recovery plans for the CA;
allowed or intended application areas for certificates issued by the CA;
liabilities and responsibilities of the CA and of the customers of the CA;
a legal environment and jurisdiction in which the CA operates;
privacy statements used by the CA;
economical conditions pertaining to the CA;
requirements and procedures for identification and authentication in connection with certificate issuing and naming by the C;
requirements and procedures and rules for certificate revocation by the CA;
operational requirements for certificate issuing, revocation, logging procedures, archival, and key management by the CA;
procedures for termination of the CA'"'"'s service or transfer of the CA'"'"'s service to another CA;
physical, logical, and administrative security related to operation of the CA'"'"'s service; and
technical security measures used by the CA relating to generation, storage, and destruction of private keys and public keys.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system of authenticating a public key certificate for a relying party (RP). A Certificate Authority (CA), who issued the certificate, is a member of a Public Key Infrastructure (PKI) having a Certificate Policy (CP). First quality levels required of the CA by the RP are accessed by a certificate classification service (CCS) and corresponding second quality levels possessed by the CA are ascertained by the CCS. At least one quality characteristic pertaining to the second quality levels relates to at least one element of the CP. The ascertained second quality levels are compared by the CCS with the corresponding accessed first quality levels. A result of the comparing, communicated by the CCS to the RP, is that the certificate is authenticated if the comparing has determined that each first quality level is not less than each corresponding second quality level.
22 Citations
25 Claims
-
1. A method for authentication of a public key certificate as a service to a relying party (RP) in response to a request for said authentication by the RP who desires to determine a level of trust in a Certificate Authority (CA) that issued the certificate, said method comprising:
-
accessing a first quality level of each quality characteristic of a first set of quality characteristics required of the CA by the RP, said CA being a member of a Public Key Infrastructure (PKI) having a Certificate Policy (CP); ascertaining a second quality level of each quality characteristic of a second set of quality characteristics possessed by the CA, each ascertained quality characteristic of the second set corresponding to an accessed quality characteristic of the first set on a one-to-one basis, at least one quality characteristic of the second set relating to at least one element of the CP; a digital computer comparing the ascertained second quality level of each quality characteristic of the second set with the accessed quality level of each corresponding quality characteristic of the first set; and said digital computer communicating a first result of said comparing to the RP, said first result being that the certificate is authenticated if said comparing has determined that each first quality level is not greater than each corresponding second quality level, otherwise said first result being that the certificate is not authenticated, said accessing, ascertaining, comparing, and communicating being performed by a certificate classification service, wherein the at least one element of the CP to which the at least one quality characteristic of the second set is related comprises items selected from the group consisting of; disaster recovery plans for the CA; allowed or intended application areas for certificates issued by the CA; liabilities and responsibilities of the CA and of the customers of the CA; a legal environment and jurisdiction in which the CA operates; privacy statements used by the CA; economical conditions pertaining to the CA; requirements and procedures for identification and authentication in connection with certificate issuing and naming by the C; requirements and procedures and rules for certificate revocation by the CA; operational requirements for certificate issuing, revocation, logging procedures, archival, and key management by the CA; procedures for termination of the CA'"'"'s service or transfer of the CA'"'"'s service to another CA; physical, logical, and administrative security related to operation of the CA'"'"'s service; and technical security measures used by the CA relating to generation, storage, and destruction of private keys and public keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system, comprising a digital computer, said computer comprising an internal memory storing software code configured to be executed on the computer to perform a method for authentication of a public key certificate as a service to a relying party (RP) in response to a request for said authentication by the RP who desires to determine a level of trust in a Certificate Authority (CA) that issued the certificate, said method comprising:
-
accessing a first quality level of each quality characteristic of a first set of quality characteristics required of the CA by the RP, said CA being a member of a Public Key Infrastructure (PKI) having a Certificate Policy (CP); ascertaining a second quality level of each quality characteristic of a second set of quality characteristics possessed by the CA, each ascertained quality characteristic of the second set corresponding to an accessed quality characteristic of the first set on a one-to-one basis, at least one quality characteristic of the second set relating to at least one element of the CP; comparing the ascertained second quality level of each quality characteristic of the second set with the accessed quality level of each corresponding quality characteristic of the first set; and communicating a first result of said comparing to the RP, said first result being that the certificate is authenticated if said comparing has determined that each first quality level is not greater than each corresponding second quality level, otherwise said first result being that the certificate is not authenticated, said accessing, ascertaining, comparing, and communicating being performed by a certificate classification service, wherein the at least one element of the CP to which the at least one quality characteristic of the second set is related comprises items selected from the group consisting of; disaster recovery plans for the CA; allowed or intended application areas for certificates issued by the CA; liabilities and responsibilities of the CA and of the customers of the CA; a legal environment and jurisdiction in which the CA operates; privacy statements used by the CA; economical conditions pertaining to the CA; requirements and procedures for identification and authentication in connection with certificate issuing and naming by the C; requirements and procedures and rules for certificate revocation by the CA; operational requirements for certificate issuing, revocation, logging procedures, archival, and key management by the CA; procedures for termination of the CA'"'"'s service or transfer of the CA'"'"'s service to another CA; physical, logical, and administrative security related to operation of the CA'"'"'s service; and technical security measures used by the CA relating to generation, storage, and destruction of private keys and public keys.
-
-
25. A computer program product, comprising software code stored in an internal memory of a digital computer, wherein the software code is configured to be executed on the computer to perform a method for authentication of a public key certificate as a service to a relying party (RP) in response to a request for said authentication by the RP who desires to determine a level of trust in a Certificate Authority (CA) that issued the certificate, said method comprising:
-
accessing a first quality level of each quality characteristic of a first set of quality characteristics required of the CA by the RP, said CA being a member of a Public Key Infrastructure (PKI) having a Certificate Policy (CP); ascertaining a second quality level of each quality characteristic of a second set of quality characteristics possessed by the CA, each ascertained quality characteristic of the second set corresponding to an accessed quality characteristic of the first set on a one-to-one basis, at least one quality characteristic of the second set relating to at least one element of the CP; comparing the ascertained second quality level of each quality characteristic of the second set with the accessed quality level of each corresponding quality characteristic of the first set; and communicating a first result of said comparing to the RP, said first result being that the certificate is authenticated if said comparing has determined that each first quality level is not greater than each corresponding second quality level, otherwise said first result being that the certificate is not authenticated, said accessing, ascertaining, comparing, and communicating being performed by a certificate classification service, wherein the at least one element of the CP to which the at least one quality characteristic of the second set is related comprises items selected from the group consisting of; disaster recovery plans for the CA; allowed or intended application areas for certificates issued by the CA; liabilities and responsibilities of the CA and of the customers of the CA; a legal environment and jurisdiction in which the CA operates; privacy statements used by the CA; economical conditions pertaining to the CA; requirements and procedures for identification and authentication in connection with certificate issuing and naming by the C; requirements and procedures and rules for certificate revocation by the CA; operational requirements for certificate issuing, revocation, logging procedures, archival, and key management by the CA; procedures for termination of the CA'"'"'s service or transfer of the CA'"'"'s service to another CA; physical, logical, and administrative security related to operation of the CA'"'"'s service; and technical security measures used by the CA relating to generation, storage, and destruction of private keys and public keys.
-
Specification