Claims
- 1. A system comprising:
a client service executing within an enterprise; and a trust server to receive validation requests from the client service and perform security credential validation within the enterprise.
- 2. The system of claim 1, wherein the trust server intercepts validation requests intended for external validation services.
- 3. The system of claim 1, wherein the trust server obtains security credential information for use in the security credential validation from within the enterprise.
- 4. The system of claim 3, wherein the trust server obtains the security credential information from one of a local certificate revocation list (CRL), an online certificate status protocol (OCSP) response, and a cache.
- 5. The system of claim 1, further comprising a bridge service provider to link the trust server with trust servers of other enterprises.
- 6. The system of claim 5, wherein the trust server queries the bridge service provider to obtain security credential information for use in validation within the enterprise.
- 7. The system of claim 6, wherein the trust server queries the bridge service provider when the security credential information is not found within the enterprise.
- 8. The system of claim 5, wherein the bridge service provider maintains a member directory and accesses the member directory to obtain the security credential information.
- 9. The system of claim 8, wherein the member directory includes a unique identifier, a certificate number, and a reference for a location of security credential information for each of the members.
- 10. The system of claim 9, wherein the reference for the location of security credential information includes a lightweight directory access protocol (LDAP) directory.
- 11. The system of claim 5, wherein the bridge service provider queries one of the trust servers of another enterprise for the security credential information.
- 12. The system of claim 11, wherein the enterprise of the querying trust server and the enterprise of the other trust server operate in different trust environments.
- 13. The system of claim 12, wherein the different trust environments include Public Key Infrastructure (PKI), Pretty Good Privacy (PGP), and Kerberos.
- 14. The system of claim 5, wherein the bridge service provider queries another bridge service provider for the security credential information.
- 15. The system of claim 5, wherein the bridge service provider relays the security credential information to the trust server that initiated the query.
- 16. The system of claim 1, wherein the trust server validates certificates from various Certification Authorities.
- 17. The system of claim 1, wherein the trust server logs validations to provide an audit trail.
- 18. The system of claim 1, wherein the client service includes a secure electronic mail (email) service, securely exchanging information, such as electronic mail, electronic file sharing, network storage, secure web folders, secure web access, and the like.
- 19. A method comprising:
receiving a validation request from a client service within an enterprise; and performing security credential validation within the enterprise using a trust server.
- 20. The method of claim 19, wherein receiving the validation request from the client service includes intercepting a validation request from the client service to an external validation services.
- 21. The method of claim 19, further comprising obtaining security credential information for use in performing security credential validation.
- 22. The method of claim 20, wherein obtaining security credential information for use in performing security credential validation includes obtaining security credential information within the enterprise.
- 23. The method of claim 22, wherein obtaining security credential information within the enterprise includes obtaining security credential information from one of a local certificate revocation list (CRL), an online certificate status protocol (OCSP) response, and a cache.
- 24. The method of claim 23, further comprising coupling the trust server to a bridge service provider to link the trust server with trust servers of other enterprises.
- 25. The method of claim 24, further comprising querying the bridge service provider to obtain security credential information for performing security credential validation.
- 26. The method of claim 24, wherein the bridge service provider obtains security credential information from a member directory.
- 27. The method of claim 26, wherein the member directory includes a unique identifier, a certificate number, and a reference for a location of security credential information for each of the members.
- 28. The method of claim 24, further comprising forwarding the query to one of the trust servers of another enterprise to obtain security credential information
- 29. The method of claim 28, wherein the enterprise of the querying trust server and the enterprise of the other trust server operate in different trust environments.
- 30. The method of claim 29, wherein the different trust environments include Pretty Good Privacy (PGP) and Kerberos.
- 31. The method of claim 24, further comprising forwarding the query to another bridge service provider to obtain credential information.
- 32. The method of claim 24, further comprising relaying the security credential information to the trust server that initiated the query.
- 33. The method of claim 19, further comprising:
parsing the security credential information; and processing the parsed security credential information to answer the validation request.
- 34. The method of claim 19, further comprising logging validation requests to provide an audit trail.
- 35. The method of claim 19, wherein performing security credential validation includes performing security credential validation for certificates from various Certification Authorities.
- 36. The method of claim 19, wherein the trust server is associated with the client service.
- 37. The method of claim 19, wherein the client service includes a secure electronic mail (email) service, securely exchanging information, such as electronic mail, electronic file sharing, network storage, secure web folders, secure web access, and the like.
- 38. The method of claim 19, wherein the client service executes on a network device.
Parent Case Info
[0001] This application claims priority from U.S. Provisional Application Serial No. 60/334,312, filed Nov. 28, 2001, the entire content of which is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60334312 |
Nov 2001 |
US |