Abstract:
Disclosed is a computer system and a method for the protected distribution of certificate and keying material between a certification authority and at least one entity in the certification authority's domain, comprising the steps of sending keying material, including a password, generated by the Certifying Authority to the entity via a secure medium; generating and protecting, by the entity, a public and a private key pair using the keying material provided it by the certifying authority; generating, protecting and sending a request for a certificate to the certifying authority using the keying material provided it by the certifying authority; requesting, by the certifying authority, that the public key and address of the entity be sent to the certifying authority; protecting and sending the public key and address of the entity to the certifying authority using the keying material provided it by the certifying authority; assembling and issuing the certificate to the entity from the certifying authority and recording the public key of the entity at the certifying authority for public use within the domain of the certifying authority.
Abstract:
The invention is an improved distributed information system which automatically provides for the transmission of security protocol data units between end-users of a distributed information system. The invention includes a processor (14) that compares the adress and security key of a received security protocol data unit to stored end-system addresses and security key information stored in memory (10, 12) and, in the absence of an existing end-system (B) address and security key, includes a processor (20, 24) to automatically initiate negotiation of a security key between end-systems (A, B) and then confirms the negotiated security key and initiates a security protocol transmission of the data unit using transmitters and receivers (18, 20) and protocol processors (19, 28).
Abstract:
Disclosed is a computer system and a method for the protected distribution of certificate and keying material between a certification authority and at least one entity in the certification authority's domain, comprising the steps of sending keying material, including a password, generated by the Certifying Authority to the entity via a secure medium; generating and protecting, by the entity, a public and a private key pair using the keying material provided it by the certifying authority; generating, protecting and sending a request for a certificate to the certifying authority using the keying material provided it by the certifying authority; requesting, by the certifying authority, that the public key and address of the entity be sent to the certifying authority; protecting and sending the public key and address of the entity to the certifying authority using the keying material provided it by the certifying authority; assembling and issuing the certificate to the entity from the certifying authority and recording the public key of the entity at the certifying authority for public use within the domain of the certifying authority.
Abstract:
The invention is an improved distributed information system which automatically provides for the transmission of security protocol data units between end-users of a distributed information system. The invention includes a processor (14) that compares the adress and security key of a received security protocol data unit to stored end-system addresses and security key information stored in memory (10, 12) and, in the absence of an existing end-system (B) address and security key, includes a processor (20, 24) to automatically initiate negotiation of a security key between end-systems (A, B) and then confirms the negotiated security key and initiates a security protocol transmission of the data unit using transmitters and receivers (18, 20) and protocol processors (19, 28).
Abstract:
Cette invention se rapporte à un système informatique décentralisé amélioré qui permet la transmission automatique d'unités de données à protocole de sécurité entre les utilisateurs finaux d'un système informatique décentralisé. Cette invention comprend un processeur (14) qui compare l'adresse et la clé de sécurité d'une unité de données à protocole de sécurité reçue, à des informations relatives à des adresses et à une clé de sécurité de système final enregistrées dans les mémoires (10, 12) et, en l'absence d'une clé de sécurité et d'une adresse de système final (B) existant, comprend un processor (20, 24) servant à effectuer automatiquement la négociation d'une clé de sécurité entre des systèmes finaux (A, B) et à confirmer par la suite la clé de sécurité négociée, après quoi il déclenche une transmission avec protocole de sécurité de cette unité de données par l'intermédiaire d'émetteurs et de récepteurs (18, 20) et de processeurs de protocole (19, 28).