Claims
- 1. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:receiving at said computer a request from said client for at least one of information and services, said request including at least one digital certificate identifying said client; checking at said computer to determine if the issuer of said digital certificate is recognized; verifying that said digital certificate is valid; and retrieving, if the digital certificate is valid, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client.
- 2. A method according to claim 1, further including the step of applying said access control rule to the communications session.
- 3. A method according to claim 2, wherein said client requests access to a web site via said request and wherein said step of applying said access control rules includes the step of permitting the client to perform operations at said web site only in accordance with said access control rules.
- 4. A method according to claim 1, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 5. A method according to claim 1, wherein said receiving step includes the step of receiving the client's public key.
- 6. A method according to claim 1, wherein said computer includes an internal data base and wherein said step of checking includes the step of checking to determine if the public key of an identified certifying party is stored in said internal data base.
- 7. A method according to claim 6, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 8. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:receiving at said computer a request from said client for at least one of information and services, said request uniquely identifying said client; checking at said computer to determine if the client is recognized by said computer; retrieving, if the client is recognized, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client; applying said access control rule to the communications session with said client.
- 9. A method according to claim 8, wherein said receiving step includes the step of uniquely identifying the client via a digital certificate.
- 10. A method according to claim 9, wherein said computer includes an internal data base and wherein said step of checking includes the step of checking to determine if the public key of an identified certifying party is stored in said internal data base.
- 11. A method according to claim 8, wherein said receiving step includes the step of receiving data uniquely identifying the client including the client's public key.
- 12. A method according to claim 8, wherein said client requests access to a web site via said request and wherein said step of applying said access control rules includes the step of permitting the client to perform operations at said web site only in accordance with said access control rules.
- 13. A method according to claim 8, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 14. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:receiving at said computer a request from said client of at least one of information and services, said request including at least one digital certificate identifying said client; checking at said computer to determine if the digital signature in said digital certificate is valid; and retreiving an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client.
- 15. A method according to claim 14, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 16. A method according to claim 14, further including the step of applying said access control rules to the communications session with the client.
- 17. A method according to claim 16, wherein said client requests access to a web site via said request and wherein said step of applying said access control rules includes the step of permitting the client to perform operations at said web site only in accordance with said access control rules.
- 18. A method according to claim 14, wherein said computer includes an internal data base and wherein said step of checking includes the step of checking to determine if the public key of an identified certified party is stored in said internal data base.
- 19. A method according to claim 14, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 20. A method for providing secure communications between a client at a first workstation coupled to a network including a plurality of computers comprising the steps of:receiving at a first computer a request from said client for at least one of information and services, said request uniquely identifying said client; checking at said first computer to determine if the client is recognized; checking at a second computer coupled to said network, to determine if the client is recognized; and retrieving from said second computer, if the client is recognized, an access control rule to apply to the communication session with said client during which at least one of information and services is provided to said client.
- 21. A method according to claim 20, further including the step of applying said access control rule to the communications session with said client.
- 22. A method according to claim 21, wherein said client requests access to a web site via said request and wherein said step of applying said access control rules includes the step of permitting the client to perform operations at said web site only in accordance with said access control rules.
- 23. A method according to claim 20, further including the step of identifying a second computer for operating as a server which can verify the identity of said client and interconnecting said second computer with said first computer via the Internet.
- 24. A method according to claim 20, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 25. A method according to claim 20, wherein said receiving step includes the step of uniquely identifying the client via a digital certificate.
- 26. A method according to claim 25, further including the step of accessing information related to the degree of trust which may be associated with said client.
- 27. A method according to claim 20, wherein said receiving step includes the step of receiving data uniquely identifying the client including the client's public key.
- 28. A method according to claim 20, wherein said first computer and said second computer include an internal data base and wherein said step of checking includes the step of checking to determine if the public key of an identified certifying party is stored in said internal data base.
Parent Case Info
This application is a divisional of Ser. No. 08/808,846 filed Feb. 28, 1997 now U.S. Pat. No. 5,922,074.
US Referenced Citations (9)