Method of and apparatus for providing secure distributed directory services and public key infrastructure
First Claim
1. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:
- receiving at said computer a request from said client for at least one of information and services, said request including at least one digital certificate identifying said client;
checking at said computer to determine if the issuer of said digital certificate is recognized;
verifying that said digital certificate is valid; and
retrieving, if the digital certificate is valid, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client.
11 Assignments
0 Petitions
Accused Products
Abstract
In an exemplary embodiment, the server receives the client'"'"'s Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the network. A client must have a verifiable identity in order for secure communications to continue. A client'"'"'s identity can be said to be fully verifiable if the server has access to the directory service that maintains that client'"'"'s DN. The client receives the server'"'"'s DN, and the client can then determine whether or not to accept a response to a request for information (i.e., trust the response). The client determines the identity of the server using some directory service (the client can act stand-alone or as a client of other directory servers). A server is fully verifiable if the client can identify the directory service that maintains the server'"'"'s DN. In both cases, determining identity is predicated on being able to identify a directory service. Since servers and clients are issued identities (DN'"'"'s) from some directory service before they participate in secure communications, they are able to at least identify their “home” directory service. Their “home” directory service communicates with other directory services, each “serving” their lists of electronic identities to each other using secure directory services. In this manner, a client or server can verify the peer identity of a secure communicator by relying on the trusted “home” directory service. Public Key certificates, certificate revocation lists, pending certificate requests, Certification Authority policy, and other information is stored in the directory server. Access to the directory server is through secure communications; this maintains the integrity and privacy of the information.
303 Citations
28 Claims
-
1. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:
-
receiving at said computer a request from said client for at least one of information and services, said request including at least one digital certificate identifying said client;
checking at said computer to determine if the issuer of said digital certificate is recognized;
verifying that said digital certificate is valid; and
retrieving, if the digital certificate is valid, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:
-
receiving at said computer a request from said client for at least one of information and services, said request uniquely identifying said client;
checking at said computer to determine if the client is recognized by said computer;
retrieving, if the client is recognized, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client;
applying said access control rule to the communications session with said client. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:
-
receiving at said computer a request from said client of at least one of information and services, said request including at least one digital certificate identifying said client;
checking at said computer to determine if the digital signature in said digital certificate is valid; and
retreiving an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method for providing secure communications between a client at a first workstation coupled to a network including a plurality of computers comprising the steps of:
-
receiving at a first computer a request from said client for at least one of information and services, said request uniquely identifying said client;
checking at said first computer to determine if the client is recognized;
checking at a second computer coupled to said network, to determine if the client is recognized; and
retrieving from said second computer, if the client is recognized, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
Specification