Abstract:
Disclosed is a computer system and a method for the protected distribution of certificate and keying material between a certification authority and at least one entity in the certification authority's domain, comprising the steps of sending keying material, including a password, generated by the Certifying Authority to the entity via a secure medium; generating and protecting, by the entity, a public and a private key pair using the keying material provided it by the certifying authority; generating, protecting and sending a request for a certificate to the certifying authority using the keying material provided it by the certifying authority; requesting, by the certifying authority, that the public key and address of the entity be sent to the certifying authority; protecting and sending the public key and address of the entity to the certifying authority using the keying material provided it by the certifying authority; assembling and issuing the certificate to the entity from the certifying authority and recording the public key of the entity at the certifying authority for public use within the domain of the certifying authority.
Abstract:
An authentication method (30) that permits a user (12) and a file serving workstation (13) to mutually authenticate themselves. This is accomplished by exchanging a random number that is encrypted by a password (22) that is known to the user (12) and stored in a password file on the file serving workstation (13). A logon ID (21) is sent from the client workstation (11) to the server workstation (13). The stored user password (22) corresponding to the user ID (21) is retrieved from the password file. A random number is created that is encrypted by a symmetric encryption algorithm on the server workstation (13) using the retrieved user password (22), and which provides an encrypted password (24). The user (12) is then requested to enter the password (22) into the user workstation (11). The entered password (22) is used to decrypt the encrypted password (24) received from the server workstation (13) and retrieve the random number therefrom to authenticate the server workstation (13). The random number is then used as the encryption and decryption key for communication between the user and server workstations (11, 13). An encrypted message is transmitted using the random number from the client workstation (12) to the server workstation (13). The encrypted message is decrypted at the server workstation (13) to authenticate the user (11).
Abstract:
An authentication method (30) that permits a user (12) and a file serving workstation (13) to mutually authenticate themselves. This is accomplished by exchanging a random number that is encrypted by a password (22) that is known to the user (12) and stored in a password file on the file serving workstation (13). A logon ID (21) is sent from the client workstation (11) to the server workstation (13). The stored user password (22) corresponding to the user ID (21) is retrieved from the password file. A random number is created that is encrypted by a symmetric encryption algorithm on the server workstation (13) using the retrieved user password (22), and which provides an encrypted password (24). The user (12) is then requested to enter the password (22) into the user workstation (11). The entered password (22) is used to decrypt the encrypted password (24) received from the server workstation (13) and retrieve the random number therefrom to authenticate the server workstation (13). The random number is then used as the encryption and decryption key for communication between the user and server workstations (11, 13). An encrypted message is transmitted using the random number from the client workstation (12) to the server workstation (13). The encrypted message is decrypted at the server workstation (13) to authenticate the user (11).
Abstract:
Disclosed is a computer system and a method for the protected distribution of certificate and keying material between a certification authority and at least one entity in the certification authority's domain, comprising the steps of sending keying material, including a password, generated by the Certifying Authority to the entity via a secure medium; generating and protecting, by the entity, a public and a private key pair using the keying material provided it by the certifying authority; generating, protecting and sending a request for a certificate to the certifying authority using the keying material provided it by the certifying authority; requesting, by the certifying authority, that the public key and address of the entity be sent to the certifying authority; protecting and sending the public key and address of the entity to the certifying authority using the keying material provided it by the certifying authority; assembling and issuing the certificate to the entity from the certifying authority and recording the public key of the entity at the certifying authority for public use within the domain of the certifying authority.