Generating PKI email accounts on a web-based email system
First Claim
Patent Images
1. A method comprising the steps of:
- a) receiving a PKI email account request from a user via a PKI email account website hosted on one or more computers in a network and displayed on a client computer, wherein the client computer does not store or recall PKI keys;
b) generating and storing, without interaction from the user and responsive to a keypair generation request by the PKI email account website, a keypair comprising a private key and a public key, wherein the keypair is generated by and stored in a keystore system comprising a keypair generation software and a data storage hosted on the one or more computers;
c) generating and sending a certificate signing request comprising the public key and a distinguished name, without interaction from the user, from the keystore system to a certificate authority, wherein the certificate authority automatically trusts one or more certificate signing requests from the keystore system and wherein the certificate authority is hosted on the one or more computers hosting the keystore system;
d) installing a signed certificate from the certificate authority, wherein the signed certificate is received, installed and stored by the keystore system; and
e) creating a PKI email account for the user, wherein the PKI email account is configured to access one or more cryptographic functions stored in the keystore system to securely receive and transmit mail, wherein the PKI email account is accessible to an email website and wherein the email website is displayed on the client computer, configured to read and send email messages and accessible to any computer connected to the Internet.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for allowing an Email User to create a Public Key Infrastructure (PKI) Email Account and thereafter to digitally sign, send, verify and receive PKI encrypted emails over a computer network, such as the Internet. The systems and methods preferably include a Web-based Email System and a Certificate Authority that coordinate their actions to make the process of creating, maintaining and using the PKI Account as easy as possible for the Email User. In a preferred embodiment, a Keystore System may also be used to enhance the management and use of digital keypairs.
24 Citations
17 Claims
-
1. A method comprising the steps of:
-
a) receiving a PKI email account request from a user via a PKI email account website hosted on one or more computers in a network and displayed on a client computer, wherein the client computer does not store or recall PKI keys; b) generating and storing, without interaction from the user and responsive to a keypair generation request by the PKI email account website, a keypair comprising a private key and a public key, wherein the keypair is generated by and stored in a keystore system comprising a keypair generation software and a data storage hosted on the one or more computers; c) generating and sending a certificate signing request comprising the public key and a distinguished name, without interaction from the user, from the keystore system to a certificate authority, wherein the certificate authority automatically trusts one or more certificate signing requests from the keystore system and wherein the certificate authority is hosted on the one or more computers hosting the keystore system; d) installing a signed certificate from the certificate authority, wherein the signed certificate is received, installed and stored by the keystore system; and e) creating a PKI email account for the user, wherein the PKI email account is configured to access one or more cryptographic functions stored in the keystore system to securely receive and transmit mail, wherein the PKI email account is accessible to an email website and wherein the email website is displayed on the client computer, configured to read and send email messages and accessible to any computer connected to the Internet. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising the steps of:
-
a) receiving a PKI email account request from a user via a PKI email account website hosted on one or more computers in a network and displayed on a client computer, wherein the client computer does not store or recall PKI keys; b) verifying the identity of the user, wherein the method is terminated if the identity of the user cannot be verified; c) generating and storing, without interaction from the user and responsive to a keypair generation request by the PKI email account website, a keypair comprising a private key and a public key wherein the keypair is generated by and stored in a keystore system comprising a keypair generation software and a data storage hosted on the one or more computers; d) generating and sending a certificate signing request comprising the public key and a distinguished name, without interaction from the user, from the keystore system to a certificate authority, wherein the certificate authority automatically trusts one or more certificate signing requests from the keystore system and wherein the certificate authority is hosted on the one or more computers hosting the keystore system; e) installing a signed certificate from the certificate authority, wherein the signed certificate is received, installed and stored by the keystore system; and f) creating a PKI email account for the user, wherein the PKI email account is configured to access one or more cryptographic functions stored in the keystore system to securely receive and transmit mail, wherein the PKI email account is accessible to an email website and wherein the email website is displayed on the client computer, configured to read and send email messages and accessible to any computer connected to the Internet. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising the steps of:
-
a) receiving a PKI email account request and an auto-renewal option from a user via a PKI email account website hosted on one or more computers in a network and displayed on a client computer, wherein the client computer does not store or recall PKI keys; b) generating and storing, without interaction from the user and responsive to a keypair generation request by the PKI email account website, a keypair comprising a private key and a public key, wherein the keypair is generated by and stored in a keystore system comprising a keypair generation software and a data storage hosted on the one or more computers; c) generating and sending a certificate signing request comprising the public key and a distinguished name, without interaction from the user, from the keystore system to a certificate authority, wherein the certificate authority automatically trusts one or more certificate signing requests from the keystore system and wherein the certificate authority is hosted on the one or more computers hosting the keystore system; d) installing a first signed certificate from the certificate authority, wherein the first signed certificate is received, installed and stored by the keystore system; and e) creating a PKI email account for the user, wherein the PKI email account is configured to access one or more cryptographic functions stored in the keystore system to securely receive and transmit mail, wherein the PKI email account is accessible to an email website and wherein the email website is displayed on the client computer, configured to read and send email messages and accessible to any computer connected to the Internet; and f) requesting and receiving a second signed certificate from the certificate authority, without interaction from the user, prior to the first signed certificate expiring. - View Dependent Claims (15, 16, 17)
-
Specification