DIGITAL CERTIFICATE
Public Key Infrastructure1 ("PKI") now permeates the Internet, operating systems such as Microsoft's Windows, and application software such as Microsoft's Outlook. A core component to this infrastructure is a hierarchical trust model, where a third party "binds" a human...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | WIEBE, PAUL |
description | Public Key Infrastructure1 ("PKI") now permeates the Internet, operating systems such as Microsoft's Windows, and application software such as Microsoft's Outlook. A core component to this infrastructure is a hierarchical trust model, where a third party "binds" a human identity to a data token - a digital certificate. There exists a fundamental flaw in this trust model, and as a result this infrastructure is the proverbial "house of cards". The reasons are several-fold; 1. Current procedures widely in use to establish the validity of this binding are fraught with means to circumvent2; 2. Even if the procedures mentioned above are carefully designed and stringently executed, the "consumer" of the digital certificate3 cannot perform an independent, robust trust decision. Rather, they must choose to accept or decline the third party's (usually a certificate and or registration authority) assertion as to the binding of a true human identity and the data token; 3. Even if the consumer chooses to accept the third party trust assertion, the issue as to whether or not the "bound" entity is the same entity which is involved in the current PKI transaction4 cannot be resolved. A TrueCert, is an x509 version 3 compliant digital certificate5 which is intended to overcome this flaw, by combining PKI and Biometric technologies, facilitating; 1. A more rigorous means of binding a human identity to the digital certificate (data token); 2. Provide a robust, low cost, scalable, easy to use means for the consumer of the digital certificate to perform an independent trust assertion; 3. As in 2 above, but on a per PKI transaction basis - i.e. evaluate every private key operation. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CA2368961A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CA2368961A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CA2368961A13</originalsourceid><addsrcrecordid>eNrjZBB28XT3DHH0UXB2DQrxdPN0dgxx5WFgTUvMKU7lhdLcDApuriHOHrqpBfnxqcUFicmpeakl8c6ORsZmFpZmho6GxkQoAQAXXh3H</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DIGITAL CERTIFICATE</title><source>esp@cenet</source><creator>WIEBE, PAUL</creator><creatorcontrib>WIEBE, PAUL</creatorcontrib><description>Public Key Infrastructure1 ("PKI") now permeates the Internet, operating systems such as Microsoft's Windows, and application software such as Microsoft's Outlook. A core component to this infrastructure is a hierarchical trust model, where a third party "binds" a human identity to a data token - a digital certificate. There exists a fundamental flaw in this trust model, and as a result this infrastructure is the proverbial "house of cards". The reasons are several-fold; 1. Current procedures widely in use to establish the validity of this binding are fraught with means to circumvent2; 2. Even if the procedures mentioned above are carefully designed and stringently executed, the "consumer" of the digital certificate3 cannot perform an independent, robust trust decision. Rather, they must choose to accept or decline the third party's (usually a certificate and or registration authority) assertion as to the binding of a true human identity and the data token; 3. Even if the consumer chooses to accept the third party trust assertion, the issue as to whether or not the "bound" entity is the same entity which is involved in the current PKI transaction4 cannot be resolved. A TrueCert, is an x509 version 3 compliant digital certificate5 which is intended to overcome this flaw, by combining PKI and Biometric technologies, facilitating; 1. A more rigorous means of binding a human identity to the digital certificate (data token); 2. Provide a robust, low cost, scalable, easy to use means for the consumer of the digital certificate to perform an independent trust assertion; 3. As in 2 above, but on a per PKI transaction basis - i.e. evaluate every private key operation.</description><edition>7</edition><language>eng ; fre</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2003</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20030722&DB=EPODOC&CC=CA&NR=2368961A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76318</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20030722&DB=EPODOC&CC=CA&NR=2368961A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WIEBE, PAUL</creatorcontrib><title>DIGITAL CERTIFICATE</title><description>Public Key Infrastructure1 ("PKI") now permeates the Internet, operating systems such as Microsoft's Windows, and application software such as Microsoft's Outlook. A core component to this infrastructure is a hierarchical trust model, where a third party "binds" a human identity to a data token - a digital certificate. There exists a fundamental flaw in this trust model, and as a result this infrastructure is the proverbial "house of cards". The reasons are several-fold; 1. Current procedures widely in use to establish the validity of this binding are fraught with means to circumvent2; 2. Even if the procedures mentioned above are carefully designed and stringently executed, the "consumer" of the digital certificate3 cannot perform an independent, robust trust decision. Rather, they must choose to accept or decline the third party's (usually a certificate and or registration authority) assertion as to the binding of a true human identity and the data token; 3. Even if the consumer chooses to accept the third party trust assertion, the issue as to whether or not the "bound" entity is the same entity which is involved in the current PKI transaction4 cannot be resolved. A TrueCert, is an x509 version 3 compliant digital certificate5 which is intended to overcome this flaw, by combining PKI and Biometric technologies, facilitating; 1. A more rigorous means of binding a human identity to the digital certificate (data token); 2. Provide a robust, low cost, scalable, easy to use means for the consumer of the digital certificate to perform an independent trust assertion; 3. As in 2 above, but on a per PKI transaction basis - i.e. evaluate every private key operation.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2003</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBB28XT3DHH0UXB2DQrxdPN0dgxx5WFgTUvMKU7lhdLcDApuriHOHrqpBfnxqcUFicmpeakl8c6ORsZmFpZmho6GxkQoAQAXXh3H</recordid><startdate>20030722</startdate><enddate>20030722</enddate><creator>WIEBE, PAUL</creator><scope>EVB</scope></search><sort><creationdate>20030722</creationdate><title>DIGITAL CERTIFICATE</title><author>WIEBE, PAUL</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CA2368961A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>2003</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>WIEBE, PAUL</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WIEBE, PAUL</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DIGITAL CERTIFICATE</title><date>2003-07-22</date><risdate>2003</risdate><abstract>Public Key Infrastructure1 ("PKI") now permeates the Internet, operating systems such as Microsoft's Windows, and application software such as Microsoft's Outlook. A core component to this infrastructure is a hierarchical trust model, where a third party "binds" a human identity to a data token - a digital certificate. There exists a fundamental flaw in this trust model, and as a result this infrastructure is the proverbial "house of cards". The reasons are several-fold; 1. Current procedures widely in use to establish the validity of this binding are fraught with means to circumvent2; 2. Even if the procedures mentioned above are carefully designed and stringently executed, the "consumer" of the digital certificate3 cannot perform an independent, robust trust decision. Rather, they must choose to accept or decline the third party's (usually a certificate and or registration authority) assertion as to the binding of a true human identity and the data token; 3. Even if the consumer chooses to accept the third party trust assertion, the issue as to whether or not the "bound" entity is the same entity which is involved in the current PKI transaction4 cannot be resolved. A TrueCert, is an x509 version 3 compliant digital certificate5 which is intended to overcome this flaw, by combining PKI and Biometric technologies, facilitating; 1. A more rigorous means of binding a human identity to the digital certificate (data token); 2. Provide a robust, low cost, scalable, easy to use means for the consumer of the digital certificate to perform an independent trust assertion; 3. As in 2 above, but on a per PKI transaction basis - i.e. evaluate every private key operation.</abstract><edition>7</edition><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre |
recordid | cdi_epo_espacenet_CA2368961A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | DIGITAL CERTIFICATE |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T16%3A39%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WIEBE,%20PAUL&rft.date=2003-07-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECA2368961A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |