SERVER-CLIENT PKI FOR APPLIED KEY MANAGEMENT SYSTEM AND PROCESS
First Claim
Patent Images
1. A method for obtaining a public key for an application of a communication device, the method comprising:
- receiving a request from the communication device to obtain the public key;
evaluating the request based on at least one policy;
requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized;
receiving the public key from the PKI; and
sending the public key to the communication device.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
16 Citations
20 Claims
-
1. A method for obtaining a public key for an application of a communication device, the method comprising:
-
receiving a request from the communication device to obtain the public key; evaluating the request based on at least one policy; requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized; receiving the public key from the PKI; and sending the public key to the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An applied key management system for providing a public key to an application of a communication device, the system comprising:
-
a memory; and a processor, the processor is configured to; receive a request from the communication device to obtain the public key; evaluate the request based on at least one policy; request the public key from a public key infrastructure (PKI) in response to determine that the request is authorized; receive the public key from the PKI; and send the public key to the communication device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory processor-readable medium having processor-readable instructions, such that, when executed, causes a processor to:
-
receive a request from the communication device to obtain the public key for an application of the communication device; evaluate the request based on at least one policy; request the public key from a public key infrastructure (PKI) in response to determine that the request is authorized; receive the public key from the PKI; and send the public key to the communication device. - View Dependent Claims (20)
-
Specification