Method and Hybrid System for Authenticating Communications
First Claim
1. A hybrid authentication system for securing digital communications in a network and enabling a global enterprise, comprising:
- a distributed authentication infrastructure including a plurality of nodes in communication with each other, each of said plurality of nodes having an identification and intended to perform a series of functions, one of said series of functions for verifying said identification of said plurality of nodes; and
a centralized authentication infrastructure integrated into said distributed authentication infrastructure and including a central server, said central server being coupled to said plurality of nodes and being utilized for verifying said identification of said plurality of nodes;
wherein said distributed authentication infrastructure is initially implemented and said centralized authentication infrastructure is later integrated into said distributed authenticated infrastructure;
wherein said distributed authentication infrastructure is selected from the group consisting of a threshold cryptography service model and a web-of-trust service model;
wherein said centralized authentication system is selected from the group consisting of a public key infrastructure and a kerberos service model. wherein said plurality of nodes include at least one of a personal digital assistant, a digital pager, a digital fax machine, a vide teleconferencing device, a wireless telephone, a portable computer, a desktop computer, and a communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the present invention is a hybrid authentication system (10) for securing communication. In this embodiment, the system (10) includes a distributed authentication infrastructure (12) with a series of nodes (16) in communication with each other. These nodes (16) are intended to perform a series of functions, one of these functions being the authentication of other nodes. The system further includes a centralized authentication infrastructure (14), which is later integrated into the distributed authentication infrastructure (12) after the distributed authentication infrastructure (12) has been established. The centralized authentication infrastructure (14) includes a central server (22) coupled to the nodes (16) for verifying the identification of the nodes (16) and/or granting permission to those nodes (16).
-
Citations
38 Claims
-
1. A hybrid authentication system for securing digital communications in a network and enabling a global enterprise, comprising:
-
a distributed authentication infrastructure including a plurality of nodes in communication with each other, each of said plurality of nodes having an identification and intended to perform a series of functions, one of said series of functions for verifying said identification of said plurality of nodes; and
a centralized authentication infrastructure integrated into said distributed authentication infrastructure and including a central server, said central server being coupled to said plurality of nodes and being utilized for verifying said identification of said plurality of nodes;
wherein said distributed authentication infrastructure is initially implemented and said centralized authentication infrastructure is later integrated into said distributed authenticated infrastructure;
wherein said distributed authentication infrastructure is selected from the group consisting of a threshold cryptography service model and a web-of-trust service model;
wherein said centralized authentication system is selected from the group consisting of a public key infrastructure and a kerberos service model. wherein said plurality of nodes include at least one of a personal digital assistant, a digital pager, a digital fax machine, a vide teleconferencing device, a wireless telephone, a portable computer, a desktop computer, and a communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 32, 33, 34, 35, 36, 37, 38)
-
-
23. A hybrid authentication system, comprising:
-
a distributed authentication infrastructure based on a threshold cryptography service model and including a plurality of nodes in communication with each other, each of said plurality of nodes having an identification and intended to perform a series of functions, one of said series of functions for verifying said identification of said plurality of nodes; and
a centralized authentication infrastructure based on a public key infrastructure and integrated into said distributed authentication infrastructure, said centralized authentication infrastructure including a certificate authority coupled to said plurality of nodes and utilized for verifying said identification of said plurality of nodes;
wherein said distributed authentication infrastructure is initially implemented and said centralized authentication infrastructure is later integrated into said distributed authenticated infrastructure.
-
-
24. A hybrid authentication system, comprising:
-
a distributed authentication infrastructure based on a web-of-trust service model and including a plurality of nodes in communication with each other, each of said plurality of nodes having an identification and intended to perform a series of functions, one of said series of functions for verifying said identification of said plurality of nodes; and
a centralized authentication infrastructure based on a public key infrastructure and integrated into said distributed authentication infrastructure, said centralized authentication infrastructure including a certificate authority coupled to said plurality of nodes and utilized for verifying said identification of said plurality of nodes;
wherein said distributed authentication infrastructure is initially implemented and said centralized authentication infrastructure is later integrated into said distributed authenticated infrastructure. - View Dependent Claims (25, 26, 27, 28)
-
-
29. A hybrid authentication system, comprising:
-
a distributed authentication infrastructure including a plurality of nodes in communication with each other, each of said plurality of nodes having an identification and intended to perform a series of functions, one of said series of functions for verifying said identification of said plurality of nodes; and
a centralized authentication infrastructure integrated into said distributed authentication infrastructure, said centralized authentication infrastructure including a certificate authority coupled to said plurality of nodes and utilized for verifying said identification of said plurality of nodes;
wherein said distributed authentication infrastructure is initially implemented and said centralized authentication infrastructure is later integrated into said distributed authenticated infrastructure. - View Dependent Claims (30, 31)
-
Specification