Claims
- 1. A method, including steps of:maintaining a base root certificate in storage at a client; and using said base root certificate to obtain a security information message, said security information message including a plurality of root certificates from a server wherein said plurality of root certificates forms a chain within said security information message, said security information message being obtained before verification of any of said root certificates, said chain linking each root certificate with a next root certificate, each root certificate being usable to verify a next root certificate, at least one root certificate being verifiable using said base root certificate, at least one root certificate being current, each root certificate including an expiration date, and each root certificate being digitally signed using a private key for a first key pair and including a public key for the first key pair and a secure digest of a public key for a second key pair for verifying the public key for the second key pair.
- 2. A method as in claim 1, wherein said security information includes a root certificate for at least one certification authority.
- 3. A method as in claim 1, wherein said security information includes information about at least one certification authority.
- 4. A method as in claim 1, wherein said security information includes a root certificate for at least one trusted entity.
- 5. A method as in claim 1, wherein said storage includes nonvolatile storage.
- 6. A method as in claim 1, wherein said storage includes sufficient storage for substantially only one said base root certificate.
- 7. A method as in claim 1, including steps for revoking one of said plurality of root certificates.
- 8. A method as in claim 7, wherein said steps for revoking said one root certificate include steps for issuing a new root certificate.
- 9. A method as in claim 1, including steps for using said current root certificate to verify security information at said client from said server.
- 10. A method as in claim 9, wherein said security information includes information about at least one trusted entity.
- 11. A method as in claim 10, wherein said trusted entity is a financial institution, information provider, or software publisher.
- 12. A system as in claim 11, wherein said trusted entity is a financial institution, information provider, or software publisher.
- 13. A system, including:a client device including storage having a base root certificate; and means for using said base root certificate to obtain a security information message, said security information message including a plurality of root certificates from a server wherein said plurality of root certificates forms a chain within said security information message, said security information message being obtained before verification of any of said root certificates, said chain linking each root certificate with a next root certificate, each root certificate being usable to verify a next root certificate, at least one root certificate being verifiable using said base root certificate, at least one root certificate being current, each root certificate including an expiration date, and each root certificate being digitally signed using a private key for a first key pair and including a public key for the first key pair and a secure digest of a public key for a second key pair for verifying the public key for the second key pair.
- 14. A system as in claim 13, wherein said security information includes a root certificate for at least one certification authority.
- 15. A system as in claim 13, wherein said security information includes information about at least one certification authority.
- 16. A system as in claim 13, wherein said security information includes a root certificate for at least one trusted entity.
- 17. A system as in claim 13, wherein said storage includes nonvolatile storage.
- 18. A system as in claim 13, wherein said storage includes sufficient storage for substantially only one said base root certificate.
- 19. A system as in claim 13, including means for revoking one of said plurality of root certificates.
- 20. A system as in claim 19, wherein said means for revoking said one root certificate includes means for issuing a new root certificate.
- 21. A system as in claim 13, including means for using said current root certificate to verify security information at said client from said server.
- 22. A system as in claim 21, wherein said security information includes information about at least one trusted entity.
- 23. In a security system, storage storing security information including:a plurality of root certificates received in a message from a server, wherein said plurality of root certificates forms a chain within said message, said security information being obtained before verification of any of said root certificates, said chain linking each root certificate with a next root certificate, each root certificate enabling a processor to verify a next root certificate, at least one root certificate being verifiable by the processor using a base root certificate, said base root certificate used to obtain said security information, at least one root certificate being current, each root certificate including an expiration date, and each root certificate being digitally signed using a private key for a first key pair and including a public key for the first key pair and a secure digest of a public key for a second key pair for verifying the public key for the second key pair, said security system using said current root certificate's public key to verify secure communications received from and to send secure communications to, a trusted entity.
- 24. Storage as in claim 23, wherein said security information includes a root certificate for at least one certification authority.
- 25. Storage as in claim 23, wherein said security information includes information about at least one certification authority.
- 26. Storage as in claim 23, wherein said security information includes a root certificate for at least one trusted entity.
- 27. Storage as in claim 23, wherein said storage includes non-volatile storage.
- 28. Storage as in claim 23, including security information from said server verifiable using said current root certificate at a client.
- 29. A Storage as in claim 28, wherein said security information includes information about at least one trusted entity.
- 30. Storage as in claim 29, wherein said trusted entity is a financial institution, information provider, or software publisher.
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims priority of the following applications: Provisional Application Ser. No. 60/046,748, filed May 16, 1997, in the name of inventors Luis Valente, Venkatachary Srinivasan, Andreas Atkins and Wei Ling Chu, titled “Client Server Architecture,” attorney docket number NAV-008P.
This is a continuation of application No. 09/080,571, filed May 18, 1998 in the name of inventor Luis Valente, titled “Security Information Acquisition”, now abandonded.
Each of these applications is hereby incorporated by reference as if fully set forth herein.
The following application also is hereby incorporated by reference as is fully set forth herein: Application No. 08/770,238, filed Dec. 20, 1996, in the name of inventors Wei Yen and Steven Weinstein, titled “Internet Multiplexer for Broadcast and Other Information,”now U.S. Pat. No. 5,991,799.
US Referenced Citations (40)
Non-Patent Literature Citations (5)
Entry |
Bussey H E Et Al: “Service Architecture, Prototype Description, And Network Implications Of A Personalized Information Grazing Service” Multiple Facets Of Integration,San Francisco,Jun. 3-7, 1990 Institute Of Electrical And Electronic Engineers, pp. 1046-1053, XP000164339 see whole document. |
Wyle M F: “A Wide Area Network Information Filter” Proceedings International Conference Artificial Intelligence On Wall Street, Oct. 9, 1991, pp. 10-15, XP000534152 see the whole document. |
Lang K: “NewsWeeder: Learning to filter netnews” Machine Learning. Proceedings Of The Twelfth International Conference On Machine Learning, Tahoe City, CA, USA, Jul. 9-12, 1995, San Francisco, CA, USA, Morgan Kaufmann Publishers, USA, pp. 331-339, XP002046557 see the whole document. |
Rosenfeld L B, et al: “Automated Filtering Of Internet Postings” Online, vol. 18, No. 3, May 1994, pp. 27-30, XP000616769 see the whole document. |
Yan T W, et al: “Sift—A Tool For Wide-Area Information Dissemination” Usenix Technical Conference, Jan. 16, 1995, pp. 177-186, XP000617276 see the whole document. |
Provisional Applications (1)
|
Number |
Date |
Country |
|
60/046748 |
May 1997 |
US |
Continuations (1)
|
Number |
Date |
Country |
Parent |
09/080571 |
May 1998 |
US |
Child |
09/162650 |
|
US |