Digital certificate validation using untrusted data
First Claim
1. A method for authenticating a target recipient for a digital certificate, the method comprising:
- receiving, at a certificate authority authentication system, a request for a digital certificate, the request including a public key of a public-private key pair, an identification of a target certificate recipient, and untrusted certificate validation data;
verifying a relationship between at least a first portion of the untrusted certificate validation data and the target certificate recipient to provide verified untrusted certificate validation data, wherein verifying the relationship between the at least a first portion of the untrusted certificate validation data and the target certificate recipient comprises automatically initiating a communication link using the at least a first portion of the untrusted certificate validation data;
following, or concurrently with, verifying the relationship between the at least a first portion of the untrusted certificate validation data and the target certificate recipient, comparing a second portion of the untrusted certificate validation data or the verified untrusted certificate validation data with entity specific data of the target certificate recipient to provide trusted certificate validation data, wherein the entity specific data is obtained from a confirmation computing system;
comparing the trusted certificate validation data with the verified untrusted certificate validation data;
based at least in part on an identification of a match between the trusted certificate validation data and the verified untrusted certificate validation data, authenticating the target certificate recipient; and
issuing the requested digital certificate for the target certificate recipient.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system and apparatus for authenticating target recipients for digital certificates. A certificate authority authentication system receives a request from an entity for a digital certificate including untrusted certificate validation data. The authentication system initiates a communication link using to untrusted certificate validation data to generate verified untrusted certificate validation data. Subsequently or concurrently, the system obtains, from a confirmation computing system, trusted certificate validation data. The authentication system compares the verified untrusted certificate validation data with the trusted certificate validation data and, based on the comparison, authenticates the entity and issues the requested digital certificate.
52 Citations
19 Claims
-
1. A method for authenticating a target recipient for a digital certificate, the method comprising:
-
receiving, at a certificate authority authentication system, a request for a digital certificate, the request including a public key of a public-private key pair, an identification of a target certificate recipient, and untrusted certificate validation data; verifying a relationship between at least a first portion of the untrusted certificate validation data and the target certificate recipient to provide verified untrusted certificate validation data, wherein verifying the relationship between the at least a first portion of the untrusted certificate validation data and the target certificate recipient comprises automatically initiating a communication link using the at least a first portion of the untrusted certificate validation data; following, or concurrently with, verifying the relationship between the at least a first portion of the untrusted certificate validation data and the target certificate recipient, comparing a second portion of the untrusted certificate validation data or the verified untrusted certificate validation data with entity specific data of the target certificate recipient to provide trusted certificate validation data, wherein the entity specific data is obtained from a confirmation computing system; comparing the trusted certificate validation data with the verified untrusted certificate validation data; based at least in part on an identification of a match between the trusted certificate validation data and the verified untrusted certificate validation data, authenticating the target certificate recipient; and issuing the requested digital certificate for the target certificate recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Non-transitory computer-readable media including computer-executable instructions that, when executed by a computing system, cause the computing system to:
-
receive, at a certificate authority authentication system, a request for a digital certificate, the request including a public key of a public-private key pair, an identification of a target certificate recipient, and untrusted certificate validation data; verify a relationship between at least a first portion of the untrusted certificate validation data and the target certificate recipient to provide verified untrusted certificate validation data, wherein, to verify the relationship between the at least a first portion of the untrusted certificate validation data and the target certificate recipient, the computer-executable instructions further cause the computing system to automatically initiate a communication link using the at least a first portion of the untrusted certificate validation data; following, or concurrently with, verifying the relationship between the at least a first portion of the untrusted certificate validation data and the target certificate recipient, compare a second portion of the untrusted certificate validation data or the verified untrusted certificate validation data with entity specific data of the target certificate recipient to provide trusted certificate validation data, wherein the entity specific data is obtained from a confirmation computing system; compare the trusted certificate validation data with the verified untrusted certificate validation data; based at least in part on an identification of a match between the trusted certificate validation data and the verified untrusted certificate validation data, authenticate the target certificate recipient; and issue the requested digital certificate for the target certificate recipient. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method for authenticating a target recipient for a digital certificate, the method comprising:
-
receiving, at a certificate authority authentication system, a request for a digital certificate from the target recipient, the request including a public key of a public-private key pair, an identification of the target recipient, and untrusted certificate validation data, the untrusted certificate validation data including contact information associated with the target recipient; sending, from the certificate authority authentication system, a verification request message to the target recipient using the contact information of the untrusted certificate validation data, wherein the verification request message is sent to the target recipient to verify a relationship between at least the contact information of the untrusted certificate validation data and the target recipient to provide verified untrusted certificate validation data, wherein the certificate authority authentication system sends the verification request message before comparing the untrusted certificate validation data or the verified untrusted certificate validation data with entity specific data of the target recipient to provide trusted certificate validation data, wherein the entity specific data is obtained from a confirmation computing system; receiving, at the certificate authority authentication system, a response to the verification request message; and determining, based on the response, the verified untrusted certificate validation data. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification