Dynamic PKI architecture

Information

  • Patent Application
  • 20020120841
  • Publication Number
    20020120841
  • Date Filed
    December 15, 2000
    24 years ago
  • Date Published
    August 29, 2002
    22 years ago
Abstract
A architecture for implementing PKI technology is described. Individual processing modules responsive to events are initiated. These individual software module building blocks, or “beans” are placed and linked together in an assembly line-like manner. Each bean is responsive to particular events and does one particular action in the scheme. For example, individual beans are responsive to different format PKI requests from a network, and in turn generate an event corresponding to that request. The event is broadcast to other beans that take the event and perform some other operation in the defined process. Other beans include certificate generators, publishers, manipulators, broadcasters to output streams, and also beans that can act as boolean branches. When strung together, the beans form a cohesive PKI schema. The ability to place beans in the flow and remove them allows great flexibility in developing PKI implementations. Typically, the beans are written in a environment and platform neutral manner, such as the Java® programming language. Not only may the beans be used to build both defined and customized PKI schemas easily, but the schemas may be spread out among many computing devices. Additionally, the use of Java® allows for fast implementation of additions to PKI schemas. Therefore, as new certificate standards, new formats, or new dissemination methods are developed, appropriate beans may be written to implement these and dropped into place seamlessly.
Description


BACKGROUND

[0004] 1. Field of the Invention


[0005] The present invention relates to an improved data processing system, and, in particular, to a method and apparatus for multi-computer data transfer. Still more particularly, the present invention provides a method and apparatus for computer to computer user and/or data authentication.


[0006] 2. Description of Related Art


[0007] Public key infrastructure (PKI) refers to a technology defining an infrastructure that implements and delivers pervasive security structures using public key cryptography concepts and techniques. The proliferation of PKI services has mushroomed in light of the demand of users to exchange secure data or verify users and/or associated data over interconnected networks, such as the Internet.


[0008] These demands are causing end entities (EEs) to request certificates from either registration authorities (RAs) or directly from certification authorities (CAs). These certificates allow a third party to verify the identity and/or other information associated or connected with such end entity. This information is passed through interconnected networks, such as the Internet, and typically involves the use of public/private key pairings in order to facilitate such verifications.


[0009] PKI may be involved in entity to entity transactional situations, wherein one entity wants to verify and authenticate the identity of the other entity involved in the transaction. Or, such PKI infrastructure may be used for the passage of digital certificates that allow others access to computer systems and/or other resources such as software.


[0010] CAs may not actually perform all functions connected with issuing a certificate. In this case, an end entity may apply for registration for a certificate with a RA. The RA then conducts a number of checks on the end entity to determine whether the end-entity may receive a certificate, or determine any number of parameters in which the certificate may operate. These parameters may be associated with a “trust” level, a length of time that the certificate is valid for, or for any number of formal or user defined parameters.


[0011] The RA may then transmit any and/or all data and verification parameters to one or more CAs. Thus, the registration authority is typically preoccupied with the actual verification and preliminary registration of an EE request for certification, while the CA is more involved with the specifics regarding the actual issuance of digital certificates and/or revocations of any such certificates. However, the roles of CAs and RAs may become increasingly blurred as different entities perform different tasks. Or, such functionality may merge depending on the scope of a specific mission task to be implemented.


[0012] With the proliferation of PKI ideas, standards, and technology, much software has been written to enable the different aspects of such PKI methodology. Specific software exists for each player in the PKI scheme.


[0013] As such, the RA typically uses particular software designed solely to perform its particular PKI functionality. And the CA typically uses particular software designed solely to perform its particular PKI functionality.


[0014] However, many software systems tailored for these specific functions and/or users are typically monolithic in nature. For example, many vendors provide software that performs functions associated with the role of a CA. Or, software exists that performs functions associated with the role of an RA.


[0015] Typically, such software systems are very large in scope, both in terms of size and resources. The lines of code associated with such monolithic software projects may run into the tens of thousands. This monolithic strategy typically hampers any CA or RA that wishes to implement a specific procedure for the particular scheme that they have employed.


[0016] Additionally, as the roles of RA and CA blur, such monolithic programs fail to integrate the functionalities associated with each. Correspondingly, the monolithic scale of such software inhibits the rapid integration of functionality that may be split across each entity in the PKI process, including end entities, registration authorities, and certification authorities.


[0017] As well as can be imagined, some typical monolithic programs can be hard to maintain. Any changes in usage or characteristics of goal-specific or global implementations of PKI may entail a massive reworking of the legacy software.


[0018] The invention may be implemented in a platform independent manner. This may be accomplished through the use of Java® software, or other product that allows easy integration of software to multiple platforms and operating systems.


[0019] These characteristics inhibit the development and usage of many typical PKI implementations. Many other problems and disadvantages of the prior art will become apparent to one skilled in the art after comparing such prior art with the present invention as described herein.



SUMMARY OF THE INVENTION

[0020] The current invention relates to a PKI architecture. The infrastructure is composed of functional building blocks of software, or “beans”. The beans are typically written in a fashion where they are linked together through propagating events. In one embodiment they are written in an object oriented code, such as Java®. Additionally, the Java® environment, or similar type language systems, allow for the immediate implementation of the beans across a wide variety 10of computing systems and operate in a system independent manner.


[0021] Further, Java®, or its like, allows for the quick insertion and/or implementation of the codebase. As such, the beans may be readily implemented in an already operating environment, allowing for great flexibility in implementing or modifying already existent PKI systems.


[0022] Metaphorically, the beans act as the workers, distribution points, and pipelines in a PKI factory. Additional beans act as filters. Beans can perform many functions, and perform their roles based on a hierarchical event system.


[0023] Due to the building block architecture described, many widely ranging PKI components or systems may be designed and/or implemented. CA systems may be implemented, as well as RA systems. Due to the inherent flexibility and ease of operation, these functions may be distributed across machines, or may be combined. When combined, a designer may construct any number of levels of combination or repetition. New publishing steps may be added, new protocols may be supported, and a wide gamut of testing and manipulative functionalities may be performed. Additional input and output streams may be added, as well as different formatting schemes.


[0024] Typically, the beans perform one function and either generate events, consume events, or propagate events. The propagation may entail altered or unaltered events.


[0025] As such, the beans offer a highly robust, adaptable architecture under which PKI entities may construct or modify a wide range of actions of a particular PKI scheme while minimizing the effort in recalibrating it. Other aspects, advantages and novel features of the present invention will become apparent from the detailed description of the invention when considered in conjunction with the accompanying drawings.







BRIEF DESCRIPTION OF THE DRAWINGS

[0026]
FIG. 1 is a schematic diagram of a typical distributed data processing system.


[0027]
FIG. 2 is a block diagram depicting a typical manner in which an individual obtains a digital certificate.


[0028]
FIG. 3 is a functional block diagram of how the beans of the invention may be implemented in the handling of a PKI request for a certificate authority.


[0029]
FIG. 4 is a block diagram of a structure of a requesting authority built according to the invention.


[0030]
FIG. 5 is a block diagram of how the various client and server beans of the invention allow interconnectivity among the various entities across networks.


[0031]
FIG. 6 is a block diagram detailing a manner in which the invention may be adapted to provide functional expansion of preexisting monolithic systems.


[0032]
FIG. 7 is an inheritance diagram showing the particular inheritance structure of events in a particular embodiment of the invention.


[0033]
FIG. 8 is an inheritance diagram of the methods employed by the beans and using the events noted in FIG. 7.


[0034]
FIG. 9 is a block diagram further detailing the queue-like structure of the invention as implemented in one embodiment of the invention.







DETAILED DESCRIPTION OF THE INVENTION

[0035]
FIG. 1 is a schematic diagram of a typical network of data processing systems. Any of the data processing systems of FIG. 1 may implement the present invention. A distributed data processing system 100 contains a network 102. The network 102 provides communications link between all the various devices and computers connected within the distributed processing system 100. The network 102 may include permanent connections, such as wire or fiber optic cables, or other types of connections such as wireless, satellite, or infrared network technology.


[0036] The network 102 may operate under a number of different operating schemes. Communications may flow between the associated components of the distributed processing system 100 under various protocols, including TCP/IP. The network 102 may also be indicative of several interconnected networks, such as the Internet.


[0037] The network 102 connects a server 104 and a server 106. Additionally, a storage unit 108 is also connected to the network 102, thus allowing the servers 104 and 106 to communicate with and store data to and from the storage unit 108. Other typical clients on the network 102 may be stand-alone computers 110 and 112.


[0038] Additional computing components connected to the network 10 may include a personal digital assistant 114 and a remote network appliance 116. Additionally, an individual user may carry a so-called “smart card” 118. The smart card may contain sufficient data and/or processing capabilities to allow connection to and communication with other components of the distributed data processing system 100.


[0039] It should also be noted that the distributed data processing system may also include numerous different types of networks. Any one of, or any combination of, for example, an intranet, a local area network (LAN), a wide area network (WAN), or an aggregation of units may be connected to each other in a fashion.


[0040] If using the network in a secure fashion, the network may be local to the individual clients. Or such secure network may be implemented upon a public network using various security protocols, thus creating a virtual secure network (VSN) molded from the public network infrastructure. Also, the present invention may be implemented on a variety of hardware and software platforms, as described above.


[0041] Digital certificates support public key cryptography in which each party involved in a communication or transaction has a pair of keys, called the public key and the private key. Each party's public key is published while the private key is kept secret. Public keys are numbers associated with a particular entity and are intended to be known to everyone who needs to have trusted interactions with that entity. Private keys are numbers that are supposed to be known only to a particular entity, i.e. kept secret. In a typical public key cryptographic system, a private key corresponds to exactly one public key.


[0042] Within a public key cryptography system, since all communications involve only public keys and no private key is ever transmitted or shared, confidential messages can be generated using only public information and can be decrypted using only a private key that is in the sole possession of the intended recipient. Furthermore, public key cryptography can be used for authentication, i.e. digital signatures, as well as for privacy, i.e. encryption.


[0043] Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key; encryption ensures privacy by keeping the content of the information hidden from anyone for whom it is not intended, even those who can see the encrypted data. Authentication is a process whereby the receiver of a digital message can be confident of the identity of the sender and/or the integrity of the message.


[0044] For example, when a sender encrypts a message, the public key of the receiver is used to transform the data within the original message into the contents of the encrypted message. A sender uses a public key to encrypt data, and the receiver uses a private key to decrypt the encrypted message.


[0045] When authenticating data, data can be signed by computing a digital signature from the data and the private key of the signer. Once the data is digitally signed, it can be stored with the identity of the signer and the signature that proves that the data originated from the signer. A signer uses a private key to sign data, and a receiver uses the public key to verify the signature. The present invention is directed to a form of authentication using digital certificates; some encryption is also performed during the processing within the present invention.


[0046] A certificate is a digital document that vouches for the identity and key ownership of entities, such as an individual, a computer system, a specific server running on that system, etc. Certificates are issued by certificate authorities. A certificate authority (CA) is an entity, usually a trusted third party to a transaction, that is trusted to sign or issue certificates for other people or entities. The CA usually has some kind of legal responsibilities for its vouching of the binding between a public key and its owner that allow one to trust the entity that signed a certificate. There are many such certificate authorities, such as VeriSign, Entrust, etc. These authorities are responsible for verifying the identity and key ownership of an entity when issuing the certificate.


[0047] If a certificate authority issues a certificate for an entity, the entity must provide a public key and some information about the entity. A software tool, such as specially equipped Web browsers, may digitally sign this information and send it to the certificate authority. The certificate authority might be a company like VeriSign that provides trusted third-party certificate authority services. The certificate authority will then generate the certificate and return it. The certificate may contain other information, such as dates during which the certificate is valid and a serial number. One part of the value provided by a certificate authority is to serve as a neutral and trusted introduction service, based in part on their verification requirements, which are openly published in their Certification Service Practices (CSP).


[0048] Typically, after the CA has received a request for a new digital certificate, which contains the requesting entity's public key, the CA signs the requesting entity's public key with the CA's private key and places the signed public key within the digital certificate. Anyone who receives the digital certificate during a transaction or communication can then use the public key of the CA to verify the signed public key within the certificate. The intention is that an entity's certificate verifies that the entity owns a particular public key.


[0049] The X.509 standard is one of many standards that defines the information within a certificate and describes the data format of that information. The ‘version” field indicates the X.509 version of the certificate format with provision for future versions of the standard. This identifies which version of the X.509 standard applies to this certificate, which affects what information can be specified in it. Thus far, three versions are defined. Version I of the X.509 standard for public key certificates was ratified in 1988. The version 2 standard, ratified in 1993, contained only minor enhancements to the version I standard. Version 3, defined in 1996, allows for flexible extensions to certificates in which certificates can be extended in a standardized and generic fashion to include additional information.


[0050] In addition to the traditional fields in public key certificates, i.e. those defined in versions I and 2 of X.509, version 3 comprises extensions referred to as “standard extensions”. The term “‘standard extensions refers to the fact that the version 3 of the X.509 standard defines some broadly applicable extensions to the version 2 certificate. However, certificates are not constrained to only the standard extensions, and anyone can register an extension with the appropriate authorities. The extension mechanism itself is completely generic.


[0051] Other aspects of certificate processing are also standardized. The Certificate Request Message Format (RFC 2511) specifies a format recommended for use whenever a relying party is requesting a certificate from a CA. certificate Management Protocols have also been promulgated for transferring certificates. More information about the X.509 public key infrastructure (PKIX) can be obtained from the Internet Engineering Task Force (IETF) at www.ietf.org.


[0052]
FIG. 2 is a block diagram depicting a typical manner in which an individual obtains a digital certificate. User 202, operating on some type of client computer, has previously obtained or generated a public/private key pair, e.g., user public key 204 and user private key 206. User 202 generates a request for certificate 208 containing user public key 204 and sends the request to certifying authority 210, which is in possession of CA public key 212 and CA private key 214. Certifying authority 210 verifies the identity of user 202 in some manner and generates X.509 digital certificate 216 containing signed user public key 216 that was signed with CA private key 214. User 202 receives newly generated digital certificate 216, and user 202 may then publish digital certificate 216 as necessary to engage in trusted transactions or trusted communications. An entity that receives digital certificate 216 may verify the signature of the CA by using CA public key 212, which is published and available to the verifying, entity.


[0053] It should be noted that various functional aspects of the CA may be split off into an RA. The RA or multiple RAs may in turn communicate the processed requests to the CA for certificate generation. Or, a single RA may communicate information to multiple CAs, or any combination thereof.


[0054] In overview, the present invention envisions a system wherein the monolithic nature of the RA and CA software systems are replaced through the use of individualized building block software modules. These building blocks can be assembled to perform both the RA and/or CA functionality, or any combination of steps as defined by a designer to implement many different PKI schemas. Additional building blocks may be defined as new functionalities and/or standards are realized within the PKI realm.


[0055] In the schema of the invention, each building block performs a simple operation on a request and in turn passes either that request or a new request to one or more next building blocks. As such, the assembly of PKI implementations can be configured in many different ways. The building block concept allows for multiple distribution points where products (events or requests) can be sent to one or multiple different lines of processing. The efforts of assembling any particular process flow are greatly reduced due to the building block nature as envisioned by the invention.


[0056] Furthermore, the building blocks may be readily and adaptively configured to perform all levels of RA and CA functionality. Or, the building blocks may be configured to perform various user-specified functionalities within the scope of a PKI scheme.


[0057] In one example of the invention, the building blocks are made of single unitary building blocks written in Java®. Thus, each Java® unit, or bean, performs a simple operation on an incoming request and passes its product to the next bean that it is “wired” to. This results in a lightweight, highly flexible, and efficient implementation that can be used to enable PKI schemes that perform a great range of functionality.


[0058] As such, a flexible solution that permits applications to integrate the degree of PKI functionality that they desire may be readily implemented. Additionally, when requirements change in an already existing PKI schema, different beans may be used, or different pathways may be constructed between certain beans. This allows for fast modification, customization, and development of specified functionality and flow.


[0059] Furthermore, a specific PKI solution may be built from the ground up. For example, one application may need a simple CA that is able to issue certificates and manage the life cycle of these certificates. Another application used by the same entity may also issue certificates in bulk and have support for multiple applications and/or identification procedures. As such, a readily adaptable and lightweight system is described herein for the implementation of any such PKI technology.


[0060] This lightweight, flexible, and highly configurable implementation of core components of PKI may be used to provide PKI enabled applications ranging from operating systems to smart card management systems. Correspondingly, these applications may run on a range of platforms; from PCs to mainframes to any low computing devices such as network appliances and so-called “smart cards” to multi-processor based computing devices, such as an RS-6000 workstation running an AIX operating system and containing one or more microprocessors.


[0061] In the schema envisioned in the invention, each building block, or “bean”, can do one of many things in response to a request. A bean may: 1) reject a request; 2) satisfy a request, but does not propagate any request; 3) modify and propagate a request; 4) propagate a request, unmodified, with a side effect; 5) just propagate a request with no action; or 6) get a request and propagate a different type of request.


[0062] Additionally, the beans may be implemented in a queue-like structure. As such, a request eventually propagates to an end-event bean. At this end-event bean, the request is propagated back through all the previous beans in the form of a return event. This process is repeated until the initial requesting bean is notified of the determination of the initial request. As such, each path of the process is by definition a simple path with one entrance and one exit.


[0063] The beans may implement functionality (or perform no function, as the case may be) as the request is propagated forward in the queue, or they may implement completely different functionality (or non-functionality) in the reverse flow direction.


[0064]
FIG. 3 is a functional block diagram of how the beans of the invention may be implemented in the handling of a PKI request for a certificate authority. A request reaches the PKI system 300 through a connection to a network 310. A Certificate Management Protocol (CMP) server bean 320 receives a CMP request from the network 310. The CMP formatter bean formats the CMP request into a specific request to be sent to the remainder of the system 300.


[0065] Likewise, if the request from the network 300 is in the form of a Public Key Cryptography Standard #10 (PKCS10) format, a PKCS10 server bean 312 fields such a request and formats this type of request for transmittal to the remainder of the system 300.


[0066] In either case, the first request for the certificate is sent to a verifier 340. The verifier 340 may perform any of a number type of functions on the request, such as any internal verification of the request, or any types of pre-defined verification of any other external values.


[0067] The request is then sent to another bean 350, a manual approval bean. This manual approval bean 350 can blindly send the request to a database 353, in which requests for certificates are automatically stored. Or, the manual approval bean 350 may filter such requests based upon any internal or external criteria. For example, if certain parameters in the request event do not meet certain thresholds, the request may be diverted to the database 353 for later manual approval.


[0068] Should the request clear the manual approval bean 350, the request is then directed to an auditor bean 360. The auditor bean oversees the maintenance of an audit database 363. The auditor bean 360 may immediately log incoming requests to the audit database 363, or may wait until the request passes back from the terminus to do so. In this case, the auditor bean 360 is specifically constructed to oversee the audit database 363, and maintain the database 363 upon the request and/or the parameters associated with the particular certificate authority (CA).


[0069] After clearing the auditor bean 360, the request may then be sent to a Lightweight Directory Access Protocol (LDAP) publisher bean 370. This LDAP publisher bean 370 publishes any specific parameters associated with such a request to an LDAP directory structure 373. Again, this may take place as the request winds its way through the PKI request system 300 an initial time. Or the publishing of the request in the LDAP directory 373 may take place in the return path of the request after reaching the terminus bean.


[0070] It should be noted that such an LDAP publisher is not specific to the invention, but other output or dissemination methods may be employed. For example, instead of basing dissemination of the certificate upon an LDAP directory structure, other repositories may include an X.500 directory system agent, Online Certificate Status Protocol (OCSP) responders, domain name system (DNS) (with certificate and certificate revocation information supported in accordance with RFC 2383), web servers (that may contain certificates and certificate revocation information in accordance with RFC2383, which can be retrieved as hypertext transfer protocol (HTTP)), file transfer protocol (FTP)-based servers (that may contain certificates and certificate revocation information in accordance with RFC 2383), or other types of databases and accompanying protocols (that may contain certificates and certificate revocation information, and that have well-defined management and access practices).


[0071] Returning now to our exemplary system, the request now reaches an X.509 generator bean 330. This bean 330 generates the digital certificate based upon the X.509 specification that defines digital certificates containing signed user public keys.


[0072] It should be noted that other types of keys and/or generators may be employed at this step if other formats are specified. For example, the X.509 generator may be replaced with any form of digital certificate generator. Other alternative certificate generators may include Simple Public Key Infrastucture (SPKI) public key certificate format, PGPT, or Secure Electronic Transaction (SET) specifications. Or the generator bean may be one that generates a CRL.


[0073] It should be noted that the concept in which each bean is separate and fully functional unto itself allows for the interchanging of beans and/or multi-threading of the processes. The request may be propagated to single beans on independent machines or on the same machine. Or, the request may be propagated to multiple beans on the same or different computing devices. As noted before, the propagation could be a unitary broadcast to a single bean, or multicasting the request to many beans.


[0074] As such, the verifier bean 340 may send a request at the same time to the manual approval bean 350, the auditor bean 360, and the LDAP publisher bean 370. Instead of the single thread shown, the verifier bean could multicast the request to the aforementioned beans. It should also be noted that the recipient beans may exist on the same machine as the broadcasting bean, or on different computing devices. This allows for efficiencies to be generated in such machine multi-threading.


[0075] Also, each bean may operate on multiple requests at once. As such, the beans themselves may be thought of as allowing the system to multi-task as a whole.


[0076] Additionally, the independent nature of the beans allows for steps to be interchanged quite easily. For example, any of the beans 350, 360 or 370 may be interchanged, as well as any additional beans introduced anywhere in the process flow.


[0077] The two-way nature of the beans allows for further adaptability. In this case, for example, the generator bean 380 receives a request from the publisher bean 370. Upon the generation of a certificate by the generation bean 380, the request may be sent back to the publisher bean 370. Only upon the successful return of the request from the generation bean 380 will be publisher bean 370 publish the results of the successful generation of the certificate in the LDAP directory structure 373.


[0078] It should be also clear that this diagram should be illustrative that various functionalities and processing paths may be readily defined in the scope of the invention. As such, a dynamic and flexible system for implementing PKI architectures is shown in the course of defining a building-block approach to the implementation. It should be clear that the system of beans affords the ability to quickly and efficiently design, build, and modify any segment of the PKI, including RA and CA functionalities.


[0079] Additionally, this building block approach allows the construction of multiple input as well as output paths. This concept not only allows for the efficient design and implementation of hybrid RA and CA functionality, but allows for multiple RA and CA systems, or combinations of functionality thereof, to be implemented in a single instantiation.


[0080] In one embodiment, three types of beans are defined in the architecture. Source beans produce and propagate events and are usually active, meaning that they have their own thread.


[0081] Pipe beans consume and propagate events. These include distribution beans, filter beans, and other types of pipeline beans.


[0082] Sink beans consume events, and do not propagate events. Such sink beans can include certificate generation beans typically contained at the end of the request structure.


[0083]
FIG. 4 is a block diagram of a structure of an RA built according to the invention. This FIG. 4 should not only re-emphasize the ability of the architecture to implement singular RA and CA systems in an efficient and adaptable manner, but that the architecture is highly adaptable. As such, hybrid systems with multiple inputs, outputs, publishers, and certificate generators may be efficiently designed and developed.


[0084] A request to the system 400 may come in on a network 410 through any number of server beans, including a CMP server bean 420, or a PKCS server bean 422.


[0085] If the request comes through a HTTP based request, the TCP server bean 424 performs a preliminary processing of the incoming request and passes it to the HTTP server bean 426, which in turn passes the request to the HTTPToPKI bean 428. At this stage, the HTTP request is ready for further processing by the system 300.


[0086] At this stage, the incoming requests, no matter the source, is directed to the FixSubjectDN bean 430. This bean 430 sets the relative distinguished name (RDN) in the correct order.


[0087] The request is then forwarded to a switch bean 432, which determines if the received request is a signature request. If so, the request is sent to the PublishImmediately bean 434. The PublishImmediately bean 434 unconditionally marks requests as requiring immediate publication.


[0088] Next, the request is forwarded to an Approve bean 436. The Approve bean 436 approves all the individual elements of the request. Various methods of approval may be implemented within such Approve bean 436. The functionality and the parameters compared within the Approve bean 436 may be completely configurable by the operator. Such attributes for approval may be the time that the certificate is requested for, the type of certificate or level of “trust” wished by the requester, or a test of the Subject Distinguished Name, to name just a few.


[0089] The Publisher bean 438 receives the request in turn, and in turn communicates it to the LDAPCertAdder bean 440. This bean 440 adds the appropriate entry and/or information to an associated LDAP directory. In this case, the request is ignored as the request is directed to the certificate generator, described below.


[0090] As the return reply event is processed by the LDAPCertAdder bean 440 on the “return flow”, the LDAPCertAdder bean 440 performs the publishing function associated with it. However, this is not to say that all publisher beans operate in the “reverse” rather than the “forward” flow. In fact, depending upon the application, either flow model may be used.


[0091] The incoming request, at this point, is directed to the InsertKey bean 442. In the InsertKey bean 442, the appropriate key is inserted into the request. This inserted key may be any key necessary for the full processing of the request. For example, the key implemented may be one of the public key/private key keys generated, as described above. Or, the key may be one described under a certificate revocation list (CRL) scheme. Or, any other key may be used that is defined in a PKI implementation, either currently defined or to be defined in the future.


[0092] The resulting request is then directed to a switch bean 444 that directs the output to an appropriate CA. This switch bean 444 allows the RA to direct requests to many different CAs.


[0093] As a final step in this example, the request is selectively directed to a particular path or bean from a selection of beans. This takes place in an IfThenElse bean 448.


[0094] In this case, an appropriate output formatter bean is chosen. At the appropriate output bean, the request may be directed to a multitude of CAs in a multitude of formats. In this case, the outputs of the client beans 450, 452, 454, and 456 may be thought of as the progenitors of the requests coming into the system of FIG. 3.


[0095] In this building block manner, requests may be generated and acted upon. Additionally, requests may be checked, approved based on some predefined criteria, redirected based upon such criteria, published to databases, and manipulated to extract or insert various parameters as defined in the structures themselves.


[0096] Additionally, full functionality of PKI may be achieved, including generating requests for certificates, approving requests, publishing activities including those activities associated with issued, pending, and revoked lists, testing parameters in requests and certificates, manipulating parameters in certificates, to name a few.


[0097] Listed below are several exemplary types of beans along with details of the functionality associated therewith:
1TYPEFUNCTIONApproverApprove individual elementsof a request.AuditorAudit requests, replies, andexceptions.CertGenGenerate and sign acertificate, includesgenerators for all definedand specific certificates.DistributorsSend request to a differerentbean based on a filter or setof filters, such as booleanexpressions.FiltersAllow requests to pass whenthey comply with certaincriteria.DB and table managersManage persistent informationthrough manipulation of adatabase or the tablesincluded thereof.NameConstraintCheckerCheck if a subject DN isunder a given suffix.PublisherPublishes certificatessomewhere.InsertersInsert something in arequest.KeyStoreStore the certificate replyin a key store.Clients and ServersUsed to connect processes viadefined formats.


[0098] Of course, this is not a fixed set of beans. In fact, the architecture allows for numerous types of beans providing widely diverse functional aspects related to PKI.


[0099] In particular, the Client and Server beans make the architecture readily adaptable to dynamic environments. Server and Client beans read a request from an input stream and convert that request to an event to be propagated through the system. Conversely, they must also take an event and write the event to an output stream. Should new standards or formats be introduced, a new Client or Server bean may be implemented allowing other preexisting PKI schemas to readily adapt to such new standards or formats, including the underlying communications protocols or standards.


[0100]
FIG. 5 is a block diagram detailing the usage of various client and server beans and the interconnectivity among the various entities across networks. An end entity (EE) promulgates a request in a CMP format across an interconnected network to an RA system 510. There, the RA system 510 receives the incoming request via a TcpCmp Server bean 512. The Server bean 512 generates an event and propagates that event through the RA system 510, wherein it is eventually directed to the CA system 520 through the TcpXyz Client bean 514 (Xyz denoting any format, including public and proprietary formats, and those formats yet to be defined).


[0101] The request generated by the TcpXyz Client bean 514 is received by the CA system 520 via a TcpXyz Server bean 522. The request is translated into an event that propagates through the CA system 520, wherein a certificate may eventually be generated by a Generator bean 524.


[0102] The resulting certificate (or other reply) is directed back through the queue-like structure of the CA system 520 and to the RA system 510, as described above. In a manner substantially similar to that described above in relation to the CA system 520, the event (and possibly the return certificate) then retreads its way back through the RA system 510, where it is eventually output back to the EE. In this manner, the various Client and Server beans allow an easily implemented interoperability among various input or output formats resulting from the use of various protocols or standards.


[0103] Additionally, the Publisher beans allow systems to dynamically adapt to changing standards and dissemination storage formats. In a similar manner, PKI systems enabled with the beans may dynamically and easily adapt to these changing standards.


[0104] Furthermore, should the certificate standards change as well, additional certificate generator beans may be defined. The generator beans may be easily placed within an already predefined system. Again, the modular aspect of the beans allows an ease of interoperability due to changes in standards or operational needs.


[0105] The same may be said for all the functional and manipulative beans as well. Finally, the filter and distributor beans allow for easy changing, designing, or adapting of PKI systems.


[0106]
FIG. 6 is a diagram detailing the client and server beans adapting preexisting monolithic systems and providing functional expansion of these systems. A preexisting PKI system 610 contains an input 612 that only accepts CMP format requests. Assume that, for whatever reason, the operators to the system 610 wish to adapt the system 610 to accept JKL format requests. (JKL is an arbitrary designation, and can mean any presently defined public or private format related to a standard or protocol, or any other format yet to be devised.)


[0107] In this case, a JKLServer bean 620 is instantiated to accept JKL format requests. Coupled to this is one or more other beans that reformat the JKL request event initiated by the arrival of a JKL request into a CMP request event. The CMP request event is propagated to a CMPClient bean 630, which outputs a CMP format request on an output stream.


[0108] The legacy system 610 receives the CMP request and processes it in a normal manner. The CMPClient bean 630 may also be configured to receive the response back from the legacy system 610. Upon receiving the response, the beans in the adapter then renotify the users initiating the original JKL request of the status of the original request. Note that publishing functionality and granting functionality extension may also be implemented in legacy systems in a similar manner.


[0109] In this manner, the beans may provide the building blocks for additional functionality into preexisting legacy PKI systems. As such, the modular beans may also serve to extend the life and functionality of the preexisting systems.


[0110]
FIG. 7 is an inheritance diagram showing the particular inheritance structure of events in a particular embodiment of the invention. In this embodiment, the requests may be translated into events. There, the various possible request events are detailed as PkReqEvent (for “request”) and the classes that derive from it. Relatedly, reply events are noted as PkRepEvent (for “reply”) and serve to complete the communication structure both forward and back.


[0111]
FIG. 8 is a inheritance diagram of the methods employed by the beans and using the events as noted in FIG. 7. In this embodiment, it should be noted that the particular bean implements only the methods it needs.


[0112] Now in more detail, a exemplary implementation of a specific bean is detailed with respect to the inheritance methodologies described with reference to FIGS. 7 and 8. Note particularly the returned reply events, corresponding to the request events above.


[0113] As noted before, each bean in one embodiment of the schema derives from one of three types of core beans. The three different core beans—PkSource, PkPipe and PkSink. These beans relate to the-source, sink, and throughput properties of the beans as described earlier.


[0114] In this embodiment, the following methods and calling structure are used in the bean structure.
2METHOD AND CALLFUNCTIONPkRepEvent doreq (PkReqEvent req)Returns the reply for agiven request. This isthe most general form ofthe request handlermethodsPkHttpRepEventReturns the reply for adoHttpReq(PkHttpReqEvent req)given HTTP requestPkCertRepEventReturns the certificatedoPollReq(PkPollReqEvent req)reply for a givenpolling requestPkCertRepEventReturns the reply for adoCertReq(PkCertReqEvent req)given generalcertificate request.PkinitRepEventReturns the reply for adoinitReq(PkinitReqEvent req)given initializationrequest.PkSecnRepEventReturns the reply for adoSecnReq(PkSecnReqEvent req)given secondarycertificate request.PkKupdRepEventReturns the reply for adoKupdReq(PkKupdReqEvent req)given key updaterequest.PkXcerRepEventReturns the reply for adoXcerReq(PkXcerReqEvent req)givencross-certificationrequest.PkKrecRepEventReturns the reply for adoKrecReq(PkKrecReqEvent req)given key recoveryrequest.PkRevoRepEventReturns the reply for adoRevoReq(PkRevoReqEvent req)given revocationrequest.PkGnrlRepEventReturns the reply for adoGnrlReq(PkGnrlReqEvent req)given general request.PkConfRepEventReturns the reply for adoConfReq(PkConfReqEvent req)given confirm request.


[0115] Now, using PkPipe as an example, a default implementation of the above methods in a PkPipe type bean is illustrated. It should be noted that the individual beans all derive from either PkPipe, PkSource, or PkSink, and therefore would overwrite with specific methods the response that the individual bean might return. As such, the default implementation for each method is to call the method above it in the hierarchy.
3Method doReq()Returns the reply for a given request. This is the mostgeneral form of the request handier methods, it getscalled when the bean has not provided a more specificmethod to handle the request. The PkPipeimplementation simply propagates the request event tothe next listener in the chain.public PkRepEvent doReq(PkReqEvent req) throwsPkException {return propagate(req);}Method doHttpReq ()Returns the HTTP reply for a given HTTP request. Thedefault implementation is to simply invokes the doReqmethod.public PkHttpRepEvent doHttpReq(PkHttpReqEvent req)throws PkException {return (PkHttpRepEvent) propagate (req);}Method doCertReqReturns the general certificate reply for a givengeneral certificate request. There are severalsubcategories of CertReq functions, those beingdolnitreq() doSecnReq() doKupdReq(), anddoXCerReq() .The top level method implementation,doCertReq(), simply invokes the doReq() method.public PkCertRepEvent doCertReq(PkCertReqEvent req)throwsPkException {return (PkCertRepEvent)doReq(req);}Method doInitReq() returns the initialization reply fora given initialization request. This implementationsimply invokes the doCertReq() method:public PkinitRepEvent dolnitReq(PkinitReqEvent req)throws PkException { return(PkinitRepEvent)doCertReq(req);}Method doSecnReq() returns the certification reply fora given certification request. This implementationsimply invokes the doCertReq() method.public PkSecnRepEvent doSecnReq(PkSecnReqEvent req)throws PkException {return (PkSecnRepEvent)doCertReq(req);}Method PkKupdRepEvent() returns the key update replyfor a given key update request. This implementationsimply invokes the doCertReq() method.public PkKupdRepEvent doKupdReq(PkKupdReqEvent req)throws PkException {return (PkKupdRepEvent)doCertReq(req);}Method doXcerReq() returns the cross-certificate replyfor a given cross-certificate request. Thisimplementation simply invokes the doCertReq() method.public PkXcerRepEvent doXcerReq(PkXcerReqEvent req)throws PkException {return (PkXcerRepEvent)doCertReq(reg);}


[0116] In order to provide a bean that handles initial certificate requests, this bean subclasses from PkPipe and overrides the doInitReq() method.


[0117] As another example, assume we need a bean that displays the contents of a request propagating through a chain of beans, and then displays the corresponding reply that is returned. Such a bean would subclass from PkPipe and override the doReq() method illustrated above.


[0118] It should be noted that the return queue may be seen as the return of reply events to the software module making the call. Upon receiving the reply event, the calling module may determine precisely what action to undertake, if any, based upon the returned reply event.


[0119]
FIG. 9 is a block diagram further detailing the queue-like structure of the invention as implemented in one embodiment of the invention. Events are propagated down in the chain, just as each bean above may propagate Request events to callees. Upon completion or failure of the individual task within each module, the callee returns a Reply event to the caller.


[0120] Thus, an architecture for implementing a public key infrastructure with beans is described. It should be noted that such an architecture may be implemented with a computing device. The computing device may be a general purpose or specialized computing device. It should also be noted that the architecture may be implemented as software run on the computing device and within such components as magnetic media or computer memory associated with the computing device. Or, the architecture may be implemented in or as hardware implementations.


[0121] In view of the above detailed description of the present invention and associated drawings, other modifications and variations will now become apparent to those skilled in the art. It should also be apparent that such other modifications and variations may be effected without departing from the spirit and scope of the present invention as set forth in the claims which follow.


Claims
  • 1. An apparatus for implementing a request regarding a digital certificate in a distributed processing system, the apparatus comprising: a request implementation software that implements a response to the request regarding the digital certificate in response to a propagated event object; at least one reception bean, communicatively coupled to the request implementation software and the distributed processing system, that generates an event object in response to receiving the request to generate a digital certificate from the distributed processing system; and the reception software instantiated in a real time executable object-oriented language.
  • 2. The apparatus of claim 1, the at least one reception bean comprising a plurality reception beans, and each of the plurality of reception beans generating an event in response to requests of differing formats.
  • 3. The apparatus of claim 1, the request implementation software comprising at least one bean.
  • 4. The apparatus of claim 3, the at least one bean comprising a pipe bean.
  • 5. The apparatus of claim 3, the at least one bean comprising a bean implementing a test on the request.
  • 6. The apparatus of claim 3, the at least one bean comprising a bean that alters the request.
  • 7. The apparatus of claim 3, the at least one bean comprising a bean that publishes information regarding the request.
  • 9. The apparatus of claim 3, the at least one bean comprising a sink bean.
  • 10. The apparatus of claim 3, the at least one bean comprising a client bean that propagates a request in a first format.
  • 11. The apparatus of claim 10, the at least one bean comprising another client bean that propagates a request in a second format.
  • 12. The apparatus of claim 3, the certificate generation software comprising a legacy software.
  • 13. A method for implementing a request regarding a digital certificate in a distributed processing system, the method comprising: receiving the request to generate the digital certificate from the distributed processing system in an at least one reception bean; generating a reception event object in response to step of receiving; propagating the reception event object; selectively implementing a response to the request regarding the digital certificate in response to a propagated event object in a request implementation software; the reception software instantiated in a real time executable object-oriented language.
  • 14. The method of claim 13, the step of receiving comprising: receiving requests in differing formats; and the step of generating further comprising generating reception events in response to each request received.
  • 15. The method of claim 13, the request implementation software comprising at least one bean.
  • 16. The method of claim 15, the at least one bean comprising a pipe bean.
  • 17. The method of claim 15, the step of selectively implementing comprising testing a parameter of the request.
  • 18. The method of claim 15, the step of selectively implementing comprising altering a parameter of the request.
  • 19. The method of claim 15, the step of selectively implementing comprising publishing information regarding the request.
  • 20. The method of claim 15, the at least one bean comprising a sink bean.
  • 21. The method of claim 15, the step of selectively implementing comprising propagating a request in a first format.
  • 22. The method of claim 21, the step of selectively implementing comprising propagating a request in a second format.
  • 23. The method of claim 15, the certificate generation software comprising a legacy software.
  • 24. A computer program product on a computer usable medium, the computer usable medium having computer a usable program embodied therein for implementing a request regarding a digital certificate on a distributed data processing system, the computer usable program including: instructions for receiving the request to regarding the digital certificate from the distributed processing system, the instructions for receiving instantiated in an at least one reception bean; instructions for generating a reception event object in response to the instructions for receiving; instructions for propagating the reception event object; instructions for selectively implementing a response to the request regarding the digital certificate in response to a propagated event object, the instructions for selectively implementing instantiated in a request implementation software; and the instructions for receiving the request instantiated in a real time executable object-oriented language.
  • 25. The computer program product of claim 24, the at least one reception bean comprising a plurality reception beans, and each of the plurality of reception beans generating an event in response to requests of differing formats.
  • 26. The computer program product of claim 24, the request implementation software comprising at least one bean.
  • 27. The computer program product of claim 24, the at least one bean comprising a pipe bean.
  • 28. The computer program product of claim 24, the at least one bean comprising a bean implementing a test on the request.
  • 29. The computer program product of claim 24, the at least one bean comprising a bean that alters the request.
  • 30. The computer program product of claim 24, the at least one bean comprising a bean that publishes information regarding the request.
  • 31. The computer program product of claim 24, the at least one bean comprising a sink bean.
  • 32. The computer program product of claim 24, the at least one bean comprising a client bean that propagates a request in a first format.
  • 33. The computer program product of claim 10, the at least one bean comprising another client bean that propagates a request in a second format.
  • 34. The computer program product of claim 24, the certificate generation software comprising a legacy software.
  • 35. An apparatus for implementing a public key infrastructure in a distributed processing system, the apparatus comprising: a plurality of beans, the beans communicatively coupled to one another and responsive to events generated by the plurality of beans; and at least one of the plurality of beans comprising a pipe bean that propagates an event to another of the plurality of beans.
  • 36. The apparatus of claim 35 further comprising a sink bean, the sink bean responsive to propagated events and consuming such propagated events.
  • 37. The apparatus of claim 35 wherein the pipe bean passes the event to the another bean unaltered.
  • 38. The apparatus of claim 35 wherein the pipe bean passes the event to the another bean in an altered format.
  • 39. The apparatus of claim 35 further comprising a server bean, the server bean responsive to requests from the distributed processing system and generating events.
  • 40. The apparatus of claim 35 further comprising a client bean, the client bean responsive to events from the other beans and generating requests to the distributed processing system.
  • 41. The apparatus of claim 35 further comprising a generation bean, the generation bean generating a digital certificate in response to an event.
  • 42. The apparatus of claim 35 further comprising a publisher bean, the publisher bean publishing information in response to an event.
  • 43. The apparatus of claim 35 further comprising a filter bean, the filter bean filtering events based upon a predetermined criteria.
  • 44. An apparatus for implementing a public key infrastructure in a distributed processing system, the apparatus comprising: a plurality of beans, the beans communicatively coupled to one another and responsive to events generated by the plurality of beans; and the respective events generated by the plurality of beans subclassing from a base class event.
  • 45. The apparatus of claim 44 wherein the beans and events are written in a cross platform language.
  • 46. The apparatus of claim 44 wherein the cross platform language is JAVA.
  • 47. The apparatus of claim 44 wherein at least one of the beans is a publisher bean.
  • 48. The apparatus of claim 44 wherein at least one of the beans is generator bean.
  • 49. The apparatus of claim 44 wherein at least one of the beans is a server bean.
  • 50. The apparatus of claim 44 wherein at least one of the beans is a client bean.
RELATED APPLICATIONS

[0001] The following co-pending applications are all assigned to the assignee of the invention and are incorporated herein by reference: [0002] 1. U.S. Serial No. ______, entitled “Configurable PKI Architecture” filed on ______ in the names of ______; and [0003] 2. U.S. Serial No. ______, entitled “Dynamic Modular PKI Architecture” filed on ______ in the names of ______;