Systems and methods for managing digital certificates

Information

  • Patent Grant
  • 8473735
  • Patent Number
    8,473,735
  • Date Filed
    Monday, May 19, 2008
    16 years ago
  • Date Issued
    Tuesday, June 25, 2013
    11 years ago
Abstract
A method of managing a digital certificate by a computer system can include the steps of receiving, the at the computer system, a business request for a digital certificate from a requester and transmitting, by the computer system, the request to a first approver. The method can further include, upon approval by the first approver, transmitting, by the computer system, the request to a second approver, upon approval by the second approver, transmitting, by the computer system, the request to a certificate manager, transmitting, by the computer system, the request to an implementer and receiving, by the computer system, from the implementer, technical information related to the request and transmitting, by the computer system, a certificate to a certificate supplier.
Description
FIELD OF THE INVENTION

Embodiments of the invention relate generally to digital security, and, more particularly, to systems and methods for managing digital certificates.


BACKGROUND OF THE INVENTION

In today's business environment, many systems employ communications over digital networks such as company intranets and the Internet. When these systems are used, the security of communications between parties is always a concern. To establish secure communications, a secure channel can be established, through which data can be securely passed.


A digital certificate can be used to establish a secure communication channel. A digital certificate (or identity certificate) is an electronic document which incorporates a digital signature to bind together a public key with an identity (i.e., information such as the name of a person or an organization, or an address). The certificate can be used to verify that a public key belongs to an individual or organization.


A certificate typically includes the public key being signed, a name, which can refer to a person, a computer or an organization, a validity period, the location (universal resource locator) (URL) of a revocation center and the digital signature of the certificate, produced by a certificate authority's private key.


The certificate authority or certification authority is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. A certificate authority issues digital certificates which contain public key and private key pairs. The certificate authority also attests that the public key contained in the certificate belongs to the person, organization, server or other entity noted in the certificate. A certificate authority's obligation in such schemes is to verify an applicant's credentials, so that users and relying parties can trust the information in the certificate authority's certificates. Examples of certificate authorities include organizations such as VeriSign, Comodo and Entrust.


Large organizations can find themselves managing tens of thousands of digital certificates every year. Each of these digital certificates has a lifecycle that includes a request for the certificate, authorization to use the certificate, management and use of the certificate, expiration of the certificate, and the request of a replacement certificate. Management of the lifecycles is further complicated by the fact that certificates typically expire a year after they are issued, with the issuance of certificates occurring on a continuous rolling basis. Managing tens of thousands of certificates that are expiring on a rolling basis is an arduous and complex task.


A typical problem that occurs with such certificate management includes the difficulty of manually managing the certificates. This is because requests for certificates, related authorizations and distribution of the certificates are typically accomplished via a series of e-mail exchanges that are performed in an ad hoc manner. Such management of certificates can lead to a lack of accountability and a lack of appropriate escalation when the intended recipient of a certificate does not respond to an e-mail communication.


Thus, there is a need for an improved system and method for managing digital certificates within an organization.


SUMMARY OF THE INVENTION

Embodiments of the invention satisfy this and other needs by providing improved systems and methods for managing digital certificates.


Embodiments of the invention provide for methods and systems that manage the lifecycle of certificates. The methods and systems can provide one or more functionalities such as automating the certificate lifecycle management system, avoiding negative impact on clients due to expiring certificates, improving accountability and escalation, aligning with line of business (LOB) operational models, providing greater transparency to LOBs via self-administration and accommodating un-managed certificates (i.e., self-signed) in the firm.


A method of managing a digital certificate by a computer system can include the steps of receiving, the at the computer system, a business request for a digital certificate from a requester and transmitting, by the computer system, the request to a first approver. The method can further include, upon approval by the first approver, transmitting, by the computer system, the request to a second approver, upon approval by the second approver, transmitting, by the computer system, the request to a certificate manager, transmitting, by the computer system, the request to an implementer and receiving, by the computer system, from the implementer, technical information related to the request and transmitting, by the computer system, a certificate to a certificate supplier.


Thus, by way of embodiments of the invention, a large organization can efficiently manage the life cycle of digital certificates.





BRIEF DESCRIPTION OF THE DRAWINGS

Objects and advantages of the invention will become apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:



FIG. 1 is a high level block diagram of a certificate management system, in accordance with certain embodiments of the invention;



FIG. 2 is a high level block diagram showing the flow of information through a certificate management system, in accordance with certain embodiments of the invention;



FIG. 3 is a flow diagram illustrating a process of certificate creation, in accordance with certain embodiments of the invention;



FIG. 4 is a system diagram showing an information flow between entities, in accordance with certain embodiments of the invention;



FIG. 5 is an exemplary screenshot of a home page of a certificate management system, in accordance with certain embodiments of the invention;



FIG. 6 is an exemplary screenshot of a certificate request page of a certificate management system, in accordance with certain embodiments of the invention;



FIG. 7 is an exemplary screenshot of a requestor information page of a certificate management system, in accordance with certain embodiments of the invention;



FIG. 8 is an exemplary screenshot of a deployment information page of a certificate management system, in accordance with certain embodiments of the invention;



FIG. 9 is an exemplary screenshot of a create new request page of a certificate management system, in accordance with certain embodiments of the invention; and



FIG. 10 is a schematic diagram of an exemplary hardware implementation of a certificate management system, in accordance with certain embodiments of the invention.





It is to be understood that the above-mentioned drawing figures are provided solely to assist in describing the concepts of embodiments of the present invention.


DETAILED DESCRIPTION

With reference to FIG. 1, there is shown a high level logical block diagram of a certificate management system 100 in accordance with certain embodiments.


A user of the system 100 can access the system via a user workstation 110. Workstation 110 can be a personal or other computer, communicatively coupled to a network such as an intranet or the Internet. The user accesses the system via a Web browser at workstation 110. In one embodiment, the application is intranet-based with access by a user through a Web browser, with no other special tools or software required.


Workstation 110 allows a user to access, and communicate with, certificate lifecycle management module 120. The lifestyle management module 120 comprises two sub-modules or tiers, a client tier 122, and a business/middle tier 124. Client tier 122 presents information (e.g., user entry forms, data) to the users providing a common look and feel across the system 100. In one embodiment, the technology at this tier includes standard technologies (e.g., the HTML JavaScript programming languages). The client tier 124 is responsible for rendering user display and input pages and performing client side validations while offloading the complex business rules and database queries to the business/middle tier 124. In this embodiment, the client tier 122 interacts with the business/middle tier 124 using the industry standard Struts framework.


The business/middle tier 124 enforces all of the business logic employed by system 100, including, for example, workflow, form/data validations and processing. In one embodiment, business/middle tier 124 utilizes industry standard technologies for applications (e.g., Java and the Spring Framework programming systems). The business/middle tier 124 acts as the bond between the data tier 130 and the client tier 122. The business/middle tier 124 performs functions such as pooling, transaction support, as well as other functions. The business/middle tier 124 receives data requests from the client tier 122, processes the data, and responds back to the client tier 122. To satisfy a request from the client tier 122, the business/middle tier 124 communicates with the data tier 130


In one embodiment, client tier 122 and business/middle tier 124 can reside on the same server. In other embodiments, each tier can reside on a different server.


Business/middle tier 124 can be communicatively coupled to data tier 130. Data tier 130 provides the storage medium for any data that is retained by system 100. In some embodiments, data tier 130 can include one or more databases stored at one or more servers. The database can use database technology, such as systems provided by Oracle. An industry standard communication framework, such as that provided by iBatis, can provide communication between the business/middle tier 124 and data tier 130. Data stored at data tier 130 can include user information, business organizational hierarchy information, certificate information, certificate status, creation and termination dates, as well as other system information.


The business/middle tier 124 interfaces and integrates with external systems 140. External systems 140 can include certificate services providers (e.g., VeriSign VICE). Services and/or data (e.g., internal reference data, authentication/authorization rights, and mail services) can be shared with external systems 140. Examples of data that is shared with external systems 140 can include User standard identification (SID), e-mail messages, line of business information, job title information, as well as other relevant data. The sharing of data with external systems can require authorization information, such as a VeriSign authorization and related password information.


With reference to FIG. 2, there is shown a certificate management system application work flow 200.


A user 220, using a Web browser, can access certificate lifecycle management system 210. When accessing system 210, a user can access any one of three main modules: certificate lifecycle management module 214; reporting module 216; and administration module 212.


Certificate lifecycle management module 214 provides a facility for businesses or business units to request, renew, replace and revoke certificates. Reporting module 216 provides aggregated and detailed information about a certificate lifecycle to users. In one embodiment, reporting is accomplished via Java reports built within system 200. Data is stored at an Oracle database. Administration module 212 provides configuration management for components of the application (e.g., general user and certificate information, line of business specific information, user entitlements, notifications, workflow, as well as other components). In some embodiments, notifications (e.g., via email or other communication channels) can be sent to appropriate parties to alert the parties of impending deadlines, such as the expiration of a certificate, or a delay in the certificate requesting process. The alerts can be issued at predetermined times, such as, for example, at 90 days before the expiration of a certificate. As discussed in further detail below, if appropriate action is not taken, an escalation process can cause alerts to be sent to additional parties at predetermined times, such as, for example, five day prior to expiration of a certificate, to facilitate resolution of the process.


With reference to FIGS. 3 and 4, an exemplary certificate creation flow 300, by way of entities 400, in accordance with some embodiments, is illustrated. First, a requestor (410) creates a business request (430). Step S302. As used herein, a requestor is any authenticated user who requests and/or owns a certificate at a given instance. The business request (430) is then saved as a draft. Step S304. As used herein, a draft is a business request that is saved but not submitted. This business request may have fields that are not yet filled. The user can enter the available information and then save the business request as a draft to fill it at a later time. A business request can be saved as a draft for a maximum of some predetermined number of days (e.g., 30 days) after which it is removed from the certificate management system. If the draft remains on the system for more than a predetermined amount of time (e.g., more than thirty days), the draft request is deleted from the system. Step S306.


If the requestor (410) submits the request (430) to an approver (450), and the approver (450) does not approve the request (430) (step S308), then, the request (430) is returned to the requestor (410), returning to step S302. As used herein, an approver is an information owner or an alternate authority who is accountable for the verification, validation, and authorization of the requestor's business request, based on the business need.


If, however, the approver (450) approves the request (430) (step S308), the request (430) is passed on along the process, to step S310.


At step S310, if the related business purpose has an information risk manager (IRM) approver (440), then the request (430) is passed to the IRM approver (440) at step S312. As used herein, an Information Risk Manager (IRM) is a person assigned to review the potential risk impact of a particular certificate request prior to the fulfillment of the request. The information risk manager is responsible for coordinating all business compliance requirements in accordance with the company's information technology (IT) risk management policies and standards to ensure compliance. In some embodiments, the use of an IRM approver is optional. If the IRM approver (440) does not approve the request (430) at step S312, then the request (430) is returned to the requestor (410) at step S302. If the IRM approver (440) approves the request (430) at step S312, the request (430) is passed along to a certificate manager (420) at step S314. As used herein, a certificate manager is a person who can assign implementers and monitor certificate lifecycle events for his specific line of business (LOB), or certificate type.


Also, if there was no IRM approver (440) for the related business purpose (at step S310), then the request (430) is passed directly to the certificate manager (420) (at step S314), without passing through an IRM approver (440).


Then, at step S314, the certificate manager (420) selects an implementer and the request is passed to the implementer at step S316. As used herein, an implementer is a person responsible for generating the key, CSR (i.e., a file that contains the certificate details such as the distinguished name), and updating the certificate request details with technical metadata.


If the implementer has entered technical information (step S316), then a certificate (460) is sent to a certificate supplier. Step S322. As used herein, technical information (or deployment information) includes information such as CSR, server name and IP address, deployment configuration, and environment that is entered by the implementer for each certificate. As used herein, a certificate supplier is a certificate vendor, as described above.


If the implementer has not entered technical information (step S316), then the request remains in a queue for a predetermined period of time (e.g., 90 days). Step S318. If the technical information is entered during the predetermined period (step S318), then a certificate (460) is sent to the certificate supplier. Step S322. If, on the other hand, technical information is not entered during the predetermined period (step S318), the request (430) becomes a void request. Step S320.


The security administrator 470 is the administrator of the system facilitating the certificate lifecycle management functions.


In some embodiments, the system can include an escalation coordinator, a person responsible for maintaining the escalation profile/attributes of various certificates. Contact information, such as e-mail addresses, for requestors 410, approvers, 450, implementers 418, as well as an escalation coordinator can be stored by the system. If the system determines that action by a party is needed, such as, for example, renewal of a certificate, or response to a certificate request, the system can alert, for example, via e-mail or other communications, the responsible party. If the responsible party does not respond within a predetermined amount of time, another party, such as the escalation coordinator, can be alerted, to facilitate smooth operation of the certificate management process.


When a certificate is issued, it is expected to be in use for its entire validity period. However, various circumstances may cause a certificate to become invalid prior to the expiration of the validity period, thus causing the certificate to be revoked. Certificates can be revoked for several reasons, as are known to those of skill in the art. An example of a reason for certificate revocation is that a certificate is no longer being used by a business unit, because a corresponding Web site has been decommissioned. In addition, a certificate can be revoked because the certificate has become corrupted, or requested incorrectly with incomplete or incorrect request information.


In some embodiments, a security administrator 470 can be alerted by the system about circumstances warranting revocation of a certificate. The security administrator can then take certain steps to revoke the certificate.


When a request for a certificate has been approved, a certificate can be issued from a certificate authority 414.


In some embodiments, actions taken during the certificate management process can be time stamped with the date and time the actions are performed.


With reference again to FIGS. 1 and 2, in some embodiments, external systems 140 of system 100 can include an automated provisioning module. Upon approval of a certificate, the provisioning module can facilitate the automatic insertion of a certificate on the appropriate computer system, without the need for human interaction. The provisioning module can include one or more software modules located at servers of the certificate management system 100. In some embodiments, the provisioning module obtains certificate information stored at data tier 130 about a requested certificate, and correlates the certificate information with an appropriate receiving server or other computer, to insure that the correct certificate is being installed on the appropriate system. In some embodiments, the provisioning module can be used to automatically de-provision or remove a certificate from a server or computer, if the certificate is revoked or it is otherwise determined that the certificate is to be removed. In some embodiments, the provisioning module can deliver a certificate to an agent module, which then performs the local installation of a certificate.


In some embodiments, external systems 140 of system 100 can include a discovery module. The discovery module can include one or more software modules configured to probe servers and other computers used within the business environment of a company, business unit, institutional clients and/or internal clients. The discovery module can probe servers and/or computers of the client and detect certificates on the computers. The discovery module can then compare information about detected certificates with information about the status of known certificates stored at the data tier 130. By way of such detection and comparison, the discovery module can automatically determine, for example, if certificates exist that are not in the inventory stored at data tier 130, or if one or more certificates have a different status (e.g., revoked) than is indicated in the inventory information at data tier 130.


In some embodiments, system 100 can keep track of the relative priority of different certificates, and include the certificate priority information in communications and alerts described above. In addition, certain operational parameters, such as predetermined times for transmitting communications and alerts, as well as predetermined times and circumstances to trigger escalation of communications can be based, at least in part, on the relative priority of a certificate, with the processing of higher priority certificates generally involving more frequent communications, and more aggressive escalation and alerting communications.


As described above, users employ the certificate management system by accessing and interfacing with various user interface screens via a Web browser. Certain exemplary user interface screens are discussed below.


With reference to FIG. 5, in certain embodiments, the home page 500 is the first page that appears after a user is authenticated by the system. Options that appear on this page are based on the role and permissions of the user. One or more of the following information fields can appear on the home page: user name; broadcast message; current date and time. From this screen, a user can to search for specific certificates and view their details. A user can search for certificates based on criteria such as business requestor standard identification (STD), and application name.


The left navigation pane can contain links that allow a user to navigate to various pages within a module. The links that appear on this pane depend on the role and permissions of the user. The summary section contains links and the number of certificates or business requests in different category sections, including the following: Certificates I Request, Certificates I am Approver for, Certificates I am Implementer for, Certificates I am Certificate Manager for, and Certificates I have de-provisioned. These sections contain details on business requests or certificates. Selecting the appropriate section bar allows a user to view more details, as follows.


Certificates I Request: selecting this link opens the Certificates I Request section. The Certificates I Request section contains the Submitted, Draft, and Need to Assign Implementer sub-sections.


Certificates I am Approver for: selecting this link opens the Certificates I am Approver for section. The Certificates I am Approver for section contains the Waiting for My Approval, On Hold, Approved, and Rejected sub-sections.


Certificates I am Implementer for: selecting this link opens the Certificates I am Implementer for section. The Certificates I am Implementer for section contains the Implemented and Waiting for MY Implementation sub-sections.


Certificates I am Certificate Manager for: selecting this link opens the Certificates I am Certificate Manager for section. The Certificates I am Certificate Manager for section contains the Submitted and Need to Assign Implementer sub-sections. This section appears only for a Certificate Manager and a Security Administrator.


Certificates I have de-provisioned: selecting this link opens the Certificates I have de-provisioned section.


With reference to FIG. 6, a Certificates Request screen 600 is shown. The Certificates I Request section contains the certificates that a user has requested. This section contains three sub-sections: Submitted, Draft, and Need to Assign Implementer.



FIG. 7 shows a requestor information screen 700. The requestor information screen can include one or more of the following sections: Requestor's Information; Application Information; LOB Information; Certificate Request Information; Approver Information; IRM Approver Information; Authorized Contact Information; Deployment Information; and Requestor's Information.


The Requestor's Information section contains details of the requestor.


The Application Information section contains details of the application. The Application Information section contains two options: App Quest Application and Non App Quest Application. To select the application name, a user selects the Click here to Select Application link.


With reference to FIG. 8, there is shown a Deployment Information screen 800. The Security Administrator or LOB Administrator specifies whether it is mandatory, optional, or not required for a user to enter deployment information when creating the request. If it is mandatory to enter the deployment information, then a business request cannot be submitted unless the deployment information for all certificates is completed.


In some embodiments, a user can fill deployment information for certificates only after a user selects the business purpose in the Business Purpose list box. To fill the deployment information for each certificate, select the Add Technical Info check box and then click Add. If a user click Add without selecting the business purpose in the Business Purpose list box, an error message appears.


A Create a Business Request for Certificates screen 900 is shown in FIG. 9. Any authenticated user can submit a request for certificates. To create a business request for one or more certificates, on the Certificate Management tab, a user selects the Initiate Certificate Request link on the left navigation pane. The Create New Request page can include one or more of the following sections: Requestor's Information; Application Information; LOB Information; Certificate Request Information; Approver Information; IRM Approver Information; Authorized Contact Information; Deployment Information; and Requestor's Information.


The Requestor's Information section contains details of the Requestor. Some of the mandatory fields are system-populated and read-only.


The Application Information section contains details of the application. The Application Information section contains two options: App Quest Application and Non App Quest Application. The App Quest Application option is selected by default. To select the application name: Click the Click here to Select Application link.


The Total Cost box shows the total cost for the requested licenses. The Certificate Request Information section contains details of the certificate request. The Approver Information section contains details of the Approver.


The IRM Approver Information section contains details of the IRM Approver. If the selected business purpose does not require an IRM Approver's approval, then the IRM Approver Information section bar is disabled. The name of section changes to IRM Approver Information is not required and the section is hidden.


The Security Administrator or LOB Administrator specifies whether it is mandatory, optional, or not required for a user to enter deployment information when creating the request. To save the business request as a draft before adding technical information, click OK.


With reference to FIG. 10, there is shown an exemplary hardware implementation 1000 of certain embodiments, as described above. A user accesses the certificate management system from a user computer 1040 such as a desktop computer, laptop computer, notebook computer, or handheld device. The user computer 1040 is communicatively coupled to an application server 1020 running software to execute the certificate management system 1000. The communicative coupling can be via a network connection such as the Internet, an intranet, and/or a wireless communication channel. The application server 1020 is likewise communicatively coupled to database server 1030, which runs database management software and facilitates the transfer of data from and to one or more databases. Embodiments of the certificate management system 1000 can be implemented with more or less servers and/or user computers, in similar or different configurations, as would be known to one or skill in the art, as informed by the present disclosure.


In certain embodiments of the invention, all of the steps of the method can be performed by a computer, or computerized system, as described above. In alternative embodiments, one or more of the steps can be performed manually, by a person.


In alternate embodiments of the methods described herein, additional steps may be added, certain steps may be excluded, certain steps may be performed multiple times, and/or the steps may be performed in a different order and/or simultaneously.


While certain systems and methods have been described herein relative to the tracking and management of digital certificates, the systems and methods can also be used to manage, track, install and/or un-install other types of electronic documents or information, such as, for example, digital keys, password management information, secure shell (SSH) protocol communication information, as well as others, as would be known to one of skill in the art, as informed by the present disclosure.


It is to be understood that the exemplary embodiments are merely illustrative of the invention and that many variations of the above-described embodiments can be devised by one skilled in the art without departing from the scope of the invention. It is therefore intended that all such variations be included within the scope of the following claims and their equivalents.

Claims
  • 1. A method of managing a digital certificate within an organization, by a computer system, the method comprising the steps of: receiving, at the computer system, a business request for a digital certificate from a requester within the organization;providing, by the computer system, the request for a digital certificate to an approver within the organization;receiving, by the computer system from the approver, an approval of the request for a digital certificate;providing, following approval of the request for a digital certificate by the approver, an approved request to a certificate manager within the organization;receiving, by the computer system from the certificate manager, a selection of an implementer within the organization;providing, by the computer system, the approved request to the selected implementer within the organization;receiving, by the computer system, from the implementer, technical information related to the approved request;generating a digital certificate comprising the technical information;transmitting, by the computer system, the digital certificate comprising the technical information to a certificate supplier for verification;transmitting, by the computer system, a first alert to the approver at a first predetermined time before an expiration date of the digital certificate; anddetermining, by the computer system, if the approver has responded to the first alert by a second predetermined time before the expiration date, and, if the approver has not responded, transmitting a second alert to another party.
  • 2. The method of claim 1, further comprising the step of: storing certificate information comprising the expiration date in a database.
  • 3. The method of claim 2, further comprising the steps of: determining, from the certificate information, a computer on which the digital certificate is to be installed; andautomatically installing the digital certificate on the computer.
  • 4. The method of claim 2, further comprising the steps of: determining, from the certificate information, a computer on which the digital certificate is to be installed;automatically transmitting the digital certificate to an agent; andautomatically installing, by the agent, the digital certificate on the computer.
  • 5. The method of claim 2, further comprising the steps of: probing, by the computer system, computers for installed digital certificates;retrieving, by the computer system, information about the installed digital certificates; andcomparing, by the computer system, the information about the installed digital certificates to the stored certificate information to determine if any installed digital certificates include information different from the stored certificate information.
  • 6. The method of claim 5, further comprising the step of: transmitting, by the computer system, an alert regarding any installed digital certificates that include information different from the stored certificate information.
  • 7. A method of managing a digital certificate within an organization, by a computer system, the method comprising the steps of: receiving, at the computer system, a business request for a digital certificate from a requester within the organization;providing, by the computer system, the request for a digital certificate to a first approver within the organization for a business related approval;upon the business related approval by the first approver, providing, by the computer system, a business-approved request to a second approver within the organization for an information risk related approval;upon the information risk related approval by the second approver, transmitting, by the computer system, an approved request to a certificate manager within the organization;receiving, by the computer system from the certificate manager, a selection of an implementer within the organization;providing, by the computer system, the request to the selected implementer within the organization;receiving, by the computer system, from the implementer, technical information related to the approved request;generating a digital certificate comprising the technical information;transmitting, by the computer system, the digital certificate comprising the technical information to a certificate supplier for verification;transmitting, by the computer system, a first alert to the approver at a first predetermined time before an expiration date of the digital certificate; anddetermining, by the computer system, if the approver has responded to the first alert by a second predetermined time before the expiration date, and, if the approver has not responded, transmitting a second alert to another party.
  • 8. A computerized system for managing a digital certificate within an organization, the computerized system comprising: one or more communicatively coupled processors, the one or more processors forming a computer system configured to perform the steps of: receiving, at the computer system, a business request for a digital certificate from a requester within the organization;providing, by the computer system, the request for a digital certificate to an approver within the organization;receiving, by the computer system from the approver, an approval of the request for a digital certificate;providing, following approval of the request for a digital certificate by the approver, an approved request to a certificate manager within the organization;receiving, by the computer system from the certificate manager, a selection of an implementer within the organization;providing, by the computer system, the approved request to the selected implementer within the organization;receiving, by the computer system, from the implementer, technical information related to the approved request;generating a digital certificate comprising the technical information;transmitting, by the computer system, the digital certificate comprising the technical information to a certificate supplier for verification;transmitting, by the computer system, a first alert to the approver at a first predetermined time before an expiration date of the digital certificate; anddetermining, by the computer system, if the approver has responded to the first alert by a second predetermined time before the expiration date, and, if the approver has not responded, transmitting a second alert to another party.
  • 9. The system of claim 8, the one or more processors further configured to perform the steps of: storing certificate information comprising the expiration date in a database.
  • 10. The system of claim 9, the one or more processors further configured to perform the steps of: determining, from the certificate information, a computer on which the digital certificate is to be installed; andautomatically installing the digital certificate on the computer.
  • 11. The system of claim 9, the one or more processors further configured to perform the steps of: determining, from the certificate information, a computer on which the digital certificate is to be installed;automatically transmitting the digital certificate to an agent; andautomatically installing, by the agent, the digital certificate on the computer.
  • 12. The system of claim 9, further comprising the steps of: probing, by the computer system, computers for installed digital certificates;retrieving, by the computer system, information about the installed digital certificates; andcomparing, by the computer system, the information about the installed digital certificates to the stored certificate information to determine if any installed digital certificates include information different from the stored certificate information.
  • 13. The system of claim 12, the one or more processors further configured to perform the steps of: transmitting, by the computer system, an alert regarding any installed digital certificates that include information different from the stored certificate information.
  • 14. A method of managing a digital certificate within an organization, by a computer system, the method comprising the steps of: receiving, at the computer system, a business request for a digital certificate from a requester within the organization;providing, by the computer system, the request for a digital certificate to an approver within the organization;receiving, by the computer system from the approver, an approval of the request for a digital certificate;providing, following approval of the request for a digital certificate by the approver, an approved request to a certificate manager within the organization;receiving, by the computer system from the certificate manager, a selection of an implementer within the organization;transmitting providing, by the computer system, the approved request to the selected implementer within the organization, wherein the implementer is selected by the certificate manager;receiving, by the computer system, from the implementer, technical information related to the approved request;generating a digital certificate comprising the technical information;transmitting, by the computer system, the digital certificate comprising the technical information to a certificate supplier for verification;storing certificate information related to a verified digital certificate in a database, wherein the certificate information includes an expiration date of the verified digital certificate;determining, by the computer system, if the approver has responded to an alert by a predetermined time before the expiration date, and, if the approver has not responded, transmitting, by the computer system, a second alert to another party;determining, from the certificate information, a computer on which the verified digital certificate is to be installed;automatically installing the verified digital certificate on the computer;probing, by the computer system, computers for installed digital certificates;retrieving, by the computer system, information about the installed digital certificates;comparing, by the computer system, the information about the installed digital certificates to the stored certificate information to determine if any installed digital certificates include information different from the stored certificate information; andtransmitting, by the computer system, an alert regarding any installed digital certificates that include information different from the stored certificate information.
CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional Patent Application No. 60/938,575, filed May 17, 2007, the contents of which are hereby incorporated by reference herein.

US Referenced Citations (591)
Number Name Date Kind
3705385 Batz Dec 1972 A
3860870 Furuya Jan 1975 A
3896266 Waterbury Jul 1975 A
3938091 Atalla et al. Feb 1976 A
4013962 Beseke et al. Mar 1977 A
4321672 Braun et al. Mar 1982 A
4567359 Lockwood Jan 1986 A
4633397 Macco Dec 1986 A
4695880 Johnson et al. Sep 1987 A
4696491 Stenger Sep 1987 A
4713761 Sharpe et al. Dec 1987 A
4725719 Oncken et al. Feb 1988 A
4745468 Von Kohorn May 1988 A
4799156 Shavit Jan 1989 A
4801787 Suzuki Jan 1989 A
4823264 Deming Apr 1989 A
4882675 Nichtberger et al. Nov 1989 A
4926255 Von Kohorn May 1990 A
4941090 McCarthy Jul 1990 A
4964043 Galvin Oct 1990 A
4992940 Dworkin Feb 1991 A
5016270 Katz May 1991 A
5050207 Hitchcock Sep 1991 A
5084816 Boese Jan 1992 A
5117355 McCarthy May 1992 A
5157717 Hitchcock Oct 1992 A
5189606 Burns et al. Feb 1993 A
5202826 McCarthy Apr 1993 A
5233654 Harvey et al. Aug 1993 A
5235509 Mueller et al. Aug 1993 A
5241594 Kung Aug 1993 A
5265033 Vajk Nov 1993 A
5287268 McCarthy Feb 1994 A
5297026 Hoffman Mar 1994 A
5317683 Hager et al. May 1994 A
5321841 East Jun 1994 A
5351186 Bullock Sep 1994 A
5381332 Wood Jan 1995 A
5412708 Katz May 1995 A
5420405 Chasek May 1995 A
5446740 Yien Aug 1995 A
5450134 Legate Sep 1995 A
5450537 Hirai et al. Sep 1995 A
5465206 Hilt et al. Nov 1995 A
5467269 Flaten Nov 1995 A
5473143 Vak Dec 1995 A
5473732 Change Dec 1995 A
5479530 Nair et al. Dec 1995 A
5511117 Zazzera Apr 1996 A
5513102 Auriemma Apr 1996 A
5532920 Hartrick Jul 1996 A
5534855 Shockley et al. Jul 1996 A
5537314 Kanter Jul 1996 A
5537473 Saward Jul 1996 A
5544086 Davis et al. Aug 1996 A
5551021 Harada Aug 1996 A
5557334 Legate Sep 1996 A
5557518 Rosen Sep 1996 A
5560008 Johnson et al. Sep 1996 A
5568489 Yien Oct 1996 A
5570295 Isenberg Oct 1996 A
5570465 Tsakanikas Oct 1996 A
5576951 Lockwood Nov 1996 A
5583778 Wind Dec 1996 A
5590199 Krajewski et al. Dec 1996 A
5592378 Cameron Jan 1997 A
5592553 Guski et al. Jan 1997 A
5592560 Deaton et al. Jan 1997 A
5594837 Noyes Jan 1997 A
5598557 Doner Jan 1997 A
5602936 Lynn Feb 1997 A
5603025 Tabb Feb 1997 A
5604490 Blakley et al. Feb 1997 A
5606496 D'Agostino Feb 1997 A
5611052 Dykstra Mar 1997 A
5621201 Langhans Apr 1997 A
5621789 McCalmont Apr 1997 A
5621812 Deaton et al. Apr 1997 A
5625767 Bartell Apr 1997 A
5634101 Blau May 1997 A
5638457 Deaton et al. Jun 1997 A
5640577 Scharmer Jun 1997 A
5642419 Rosen Jun 1997 A
5644493 Motai Jul 1997 A
5653914 Holmes et al. Aug 1997 A
5657383 Gerber Aug 1997 A
5659165 Jennings Aug 1997 A
5661807 Guski et al. Aug 1997 A
5664115 Fraser Sep 1997 A
5666493 Wojcik et al. Sep 1997 A
5671285 Newman Sep 1997 A
5675637 Szlam et al. Oct 1997 A
5675662 Deaton et al. Oct 1997 A
5677955 Doggett et al. Oct 1997 A
5678046 Cahill et al. Oct 1997 A
5682524 Freund Oct 1997 A
5684870 Maloney Nov 1997 A
5687322 Deaton et al. Nov 1997 A
5689100 Carrithers et al. Nov 1997 A
5692132 Hogan Nov 1997 A
5699528 Hogan Dec 1997 A
5703344 Bezy et al. Dec 1997 A
5710886 Christensen et al. Jan 1998 A
5710887 Chelliah Jan 1998 A
5710889 Clark et al. Jan 1998 A
5715298 Rogers Feb 1998 A
5715314 Payne Feb 1998 A
5715399 Bezos Feb 1998 A
5715402 Popolo Feb 1998 A
5715450 Ambrose Feb 1998 A
5724424 Gifford Mar 1998 A
5727163 Bezos Mar 1998 A
5734838 Robinson Mar 1998 A
5737414 Walker et al. Apr 1998 A
5740231 Cohn et al. Apr 1998 A
5754840 Rivette May 1998 A
5758126 Daniels et al. May 1998 A
5758328 Giovannoli May 1998 A
5761288 Pinard et al. Jun 1998 A
5761647 Boushy Jun 1998 A
5761661 Coussenns Jun 1998 A
5764789 Pare et al. Jun 1998 A
5765141 Spector Jun 1998 A
5765143 Sheldon Jun 1998 A
5768382 Schneier et al. Jun 1998 A
5774122 Kojima Jun 1998 A
5778178 Arunachalam Jul 1998 A
5781909 Logan et al. Jul 1998 A
5784562 Diener Jul 1998 A
5787403 Randle Jul 1998 A
5787404 Fernandez-Holman Jul 1998 A
5790650 Dunn Aug 1998 A
5790785 Klug et al. Aug 1998 A
5793861 Haigh Aug 1998 A
5794178 Caid Aug 1998 A
5794207 Walker Aug 1998 A
5794259 Kikinis Aug 1998 A
5796395 De Hond Aug 1998 A
5797127 Walker et al. Aug 1998 A
5798508 Walker et al. Aug 1998 A
5802498 Comesanas Sep 1998 A
5802502 Gell Sep 1998 A
5805719 Pare et al. Sep 1998 A
5815657 Williams et al. Sep 1998 A
5815665 Teper et al. Sep 1998 A
5815683 Vogler Sep 1998 A
5818936 Mashayekhi Oct 1998 A
5819092 Ferguson Oct 1998 A
5819285 Damico Oct 1998 A
5825863 Walker Oct 1998 A
5825870 Miloslavsky Oct 1998 A
5826241 Stein Oct 1998 A
5826245 Sandberg-Diment Oct 1998 A
5826250 Trefler Oct 1998 A
5828734 Katz Oct 1998 A
5828751 Walker et al. Oct 1998 A
5828812 Khan et al. Oct 1998 A
5828833 Belville et al. Oct 1998 A
5832211 Blakley, III et al. Nov 1998 A
5832460 Bednar Nov 1998 A
5832476 Tada Nov 1998 A
5835580 Fraser Nov 1998 A
5835603 Coutts Nov 1998 A
5838903 Blakely, III et al. Nov 1998 A
5838906 Doyle Nov 1998 A
5842178 Giovannoli Nov 1998 A
5842211 Horadan Nov 1998 A
5844553 Hao Dec 1998 A
5845259 West et al. Dec 1998 A
5845260 Nakano et al. Dec 1998 A
5847709 Card Dec 1998 A
5848400 Chang Dec 1998 A
5848427 Hyodo Dec 1998 A
5852812 Reeder Dec 1998 A
5857079 Claus et al. Jan 1999 A
5862223 Walker Jan 1999 A
5862323 Blakely, III et al. Jan 1999 A
5864830 Armetta et al. Jan 1999 A
RE36116 McCarthy Feb 1999 E
5866889 Weiss et al. Feb 1999 A
5870718 Spector Feb 1999 A
5870725 Belinger et al. Feb 1999 A
5871398 Schneier et al. Feb 1999 A
5873072 Kight Feb 1999 A
5873096 Lim Feb 1999 A
5880769 Nemirofsky Mar 1999 A
5884032 Bateman Mar 1999 A
5884270 Walker et al. Mar 1999 A
5884272 Walker et al. Mar 1999 A
5884274 Walker et al. Mar 1999 A
5884288 Chang Mar 1999 A
5889863 Weber Mar 1999 A
5892900 Ginter et al. Apr 1999 A
5898780 Liu et al. Apr 1999 A
5899982 Randle May 1999 A
5903881 Schrader May 1999 A
5909486 Walker et al. Jun 1999 A
5910988 Ballard Jun 1999 A
5913202 Motoyama Jun 1999 A
5914472 Foladare et al. Jun 1999 A
5915244 Jack et al. Jun 1999 A
5918214 Perkowski Jun 1999 A
5918217 Maggioncalda Jun 1999 A
5918239 Allen et al. Jun 1999 A
5920847 Kolling et al. Jul 1999 A
5921864 Walker et al. Jul 1999 A
5923763 Walker et al. Jul 1999 A
5926796 Walker et al. Jul 1999 A
5926812 Hilsenrath Jul 1999 A
5930764 Melchione Jul 1999 A
5933816 Zeanah Aug 1999 A
5933817 Hucal Aug 1999 A
5933823 Cullen Aug 1999 A
5933827 Cole Aug 1999 A
5940812 Tengel et al. Aug 1999 A
5943656 Crooks Aug 1999 A
5944824 He Aug 1999 A
5945653 Walker et al. Aug 1999 A
5946388 Walker et al. Aug 1999 A
5947747 Walker et al. Sep 1999 A
5949044 Walker et al. Sep 1999 A
5949875 Walker et al. Sep 1999 A
5950173 Perkowski Sep 1999 A
5950174 Brendzel Sep 1999 A
5950206 Krause Sep 1999 A
5952639 Ohki Sep 1999 A
5952641 Korshun Sep 1999 A
5953710 Fleming Sep 1999 A
5956695 Carrithers et al. Sep 1999 A
5958007 Lee et al. Sep 1999 A
5960411 Hartman et al. Sep 1999 A
5961593 Gabber et al. Oct 1999 A
5963635 Szlam et al. Oct 1999 A
5963925 Kolling et al. Oct 1999 A
5963952 Smith Oct 1999 A
5963953 Cram et al. Oct 1999 A
5966695 Melchione et al. Oct 1999 A
5966699 Zandi Oct 1999 A
5967896 Jorasch et al. Oct 1999 A
5969318 Mackenthun Oct 1999 A
5970143 Schneier et al. Oct 1999 A
5970470 Walker et al. Oct 1999 A
5970478 Walker et al. Oct 1999 A
5970482 Pham Oct 1999 A
5970483 Evans Oct 1999 A
5978467 Walker et al. Nov 1999 A
5983196 Wendkos Nov 1999 A
5987434 Libman Nov 1999 A
5987454 Hobbs Nov 1999 A
5987498 Athing et al. Nov 1999 A
5991736 Ferguson et al. Nov 1999 A
5991738 Ogram Nov 1999 A
5991748 Taskett Nov 1999 A
5991751 Rivette et al. Nov 1999 A
5991780 Rivette Nov 1999 A
5995948 Whitford Nov 1999 A
5995976 Walker et al. Nov 1999 A
5999596 Walker et al. Dec 1999 A
5999907 Donner Dec 1999 A
6000033 Kelley et al. Dec 1999 A
6001016 Walker et al. Dec 1999 A
6003762 Hayashida Dec 1999 A
6005939 Fortenberry et al. Dec 1999 A
6006205 Loeb et al. Dec 1999 A
6006249 Leong Dec 1999 A
6009415 Shurling et al. Dec 1999 A
6009442 Chen et al. Dec 1999 A
6010404 Walker et al. Jan 2000 A
6012088 Li et al. Jan 2000 A
6012983 Walker et al. Jan 2000 A
6014439 Walker et al. Jan 2000 A
6014635 Harris et al. Jan 2000 A
6014636 Reeder Jan 2000 A
6014638 Burge et al. Jan 2000 A
6014641 Loeb et al. Jan 2000 A
6014645 Cunningham Jan 2000 A
6016476 Maes et al. Jan 2000 A
6016810 Ravenscroft Jan 2000 A
6018714 Risen, Jr. Jan 2000 A
6018718 Walker et al. Jan 2000 A
6024640 Walker et al. Feb 2000 A
6026398 Brown et al. Feb 2000 A
6026429 Jones et al. Feb 2000 A
6032134 Weissman Feb 2000 A
6032147 Williams et al. Feb 2000 A
6038547 Casto Mar 2000 A
6038552 Fleischl et al. Mar 2000 A
6042006 Van Tilburg et al. Mar 2000 A
6044362 Neely Mar 2000 A
6045039 Stinson et al. Apr 2000 A
6049778 Walker et al. Apr 2000 A
6049782 Gottesman et al. Apr 2000 A
6049835 Gagnon Apr 2000 A
6055637 Hudson et al. Apr 2000 A
6061665 Bahreman May 2000 A
6064987 Walker et al. May 2000 A
6065120 Laursen et al. May 2000 A
6065675 Teicher May 2000 A
6070147 Harms et al. May 2000 A
6070153 Simpson May 2000 A
6070244 Orchier et al. May 2000 A
6073105 Sutcliffe et al. Jun 2000 A
6073113 Guinan Jun 2000 A
6075519 Okatani et al. Jun 2000 A
6076072 Libman Jun 2000 A
6081790 Rosen Jun 2000 A
6081810 Rosenzweig et al. Jun 2000 A
6081900 Subramaniam et al. Jun 2000 A
6085168 Mori et al. Jul 2000 A
6088444 Walker et al. Jul 2000 A
6088451 He et al. Jul 2000 A
6088683 Jalili Jul 2000 A
6088686 Walker et al. Jul 2000 A
6088700 Larsen et al. Jul 2000 A
6091817 Bertina et al. Jul 2000 A
6092192 Kanevsky et al. Jul 2000 A
6092196 Reiche Jul 2000 A
6095412 Bertina et al. Aug 2000 A
6098070 Maxwell Aug 2000 A
6101486 Roberts et al. Aug 2000 A
6104716 Crichton et al. Aug 2000 A
6105012 Chang et al. Aug 2000 A
6105865 Hardesty Aug 2000 A
6111858 Greaves et al. Aug 2000 A
6112181 Shear et al. Aug 2000 A
6115690 Wong Sep 2000 A
6119093 Walker et al. Sep 2000 A
6119099 Walker et al. Sep 2000 A
6128599 Walker et al. Oct 2000 A
6128602 Northington et al. Oct 2000 A
6131810 Weiss et al. Oct 2000 A
6134549 Regnier et al. Oct 2000 A
6134592 Montulli Oct 2000 A
6135349 Zirkel Oct 2000 A
6138106 Walker et al. Oct 2000 A
6138118 Koppstein et al. Oct 2000 A
6141651 Riley et al. Oct 2000 A
6141666 Tobin Oct 2000 A
6144946 Iwamura Nov 2000 A
6144948 Walker et al. Nov 2000 A
6145086 Bellemore et al. Nov 2000 A
6148293 King Nov 2000 A
6151584 Papierniak et al. Nov 2000 A
6154750 Roberge et al. Nov 2000 A
6154879 Pare et al. Nov 2000 A
6161182 Nadooshan Dec 2000 A
6164533 Barton Dec 2000 A
6170011 Beck et al. Jan 2001 B1
6178511 Cohen et al. Jan 2001 B1
6182052 Fulton et al. Jan 2001 B1
6182142 Win et al. Jan 2001 B1
6182220 Chen et al. Jan 2001 B1
6182225 Hagiuda et al. Jan 2001 B1
6185242 Arthur et al. Feb 2001 B1
6189029 Fuerst Feb 2001 B1
6195644 Bowie Feb 2001 B1
6199077 Inala et al. Mar 2001 B1
6201948 Cook et al. Mar 2001 B1
6202005 Mahaffey Mar 2001 B1
6202054 Lawlor et al. Mar 2001 B1
6202151 Musgrave et al. Mar 2001 B1
6202158 Urano et al. Mar 2001 B1
6208978 Walker et al. Mar 2001 B1
6208984 Rosenthal Mar 2001 B1
6216115 Barrameda et al. Apr 2001 B1
6219639 Bakis et al. Apr 2001 B1
6219706 Fan Apr 2001 B1
6222914 McMullin Apr 2001 B1
6226623 Schein et al. May 2001 B1
6226679 Gupta May 2001 B1
6226752 Gupta et al. May 2001 B1
6227447 Campisano May 2001 B1
6230148 Pare et al. May 2001 B1
6243688 Kalina Jun 2001 B1
6243816 Fang et al. Jun 2001 B1
6253327 Zhang et al. Jun 2001 B1
6253328 Smith, Jr. Jun 2001 B1
6256664 Donoho et al. Jul 2001 B1
6260026 Tomida et al. Jul 2001 B1
6266648 Baker, III Jul 2001 B1
6266683 Yehuda et al. Jul 2001 B1
6267292 Walker et al. Jul 2001 B1
6269348 Pare et al. Jul 2001 B1
6275944 Kao et al. Aug 2001 B1
6289322 Kitchen et al. Sep 2001 B1
6298330 Gardenswartz et al. Oct 2001 B1
6298356 Jawahar et al. Oct 2001 B1
6301567 Leong et al. Oct 2001 B1
6308273 Goertzel et al. Oct 2001 B1
6308274 Swift Oct 2001 B1
6311275 Jin et al. Oct 2001 B1
6317834 Gennaro et al. Nov 2001 B1
6317838 Baize Nov 2001 B1
6324524 Lent et al. Nov 2001 B1
6327573 Walker et al. Dec 2001 B1
6327578 Linehan Dec 2001 B1
6332192 Boroditsky et al. Dec 2001 B1
6336104 Walker et al. Jan 2002 B1
6343279 Bissonette et al. Jan 2002 B1
6345261 Feidelson Feb 2002 B1
6349242 Mahaffey Feb 2002 B2
6349336 Sit et al. Feb 2002 B1
6363381 Lee et al. Mar 2002 B1
6366682 Hoffman et al. Apr 2002 B1
6385591 Mankoff May 2002 B1
6385652 Brown et al. May 2002 B1
6401125 Makarios et al. Jun 2002 B1
6401211 Brezak, Jr. et al. Jun 2002 B1
6408389 Grawrock et al. Jun 2002 B2
6411933 Maes et al. Jun 2002 B1
6418457 Schmidt et al. Jul 2002 B1
6430688 Kohl et al. Aug 2002 B1
6438594 Bowman-Amuah Aug 2002 B1
6438666 Cassagnol et al. Aug 2002 B2
6449765 Ballard Sep 2002 B1
6453353 Win et al. Sep 2002 B1
6460141 Olden Oct 2002 B1
6487641 Cusson et al. Nov 2002 B1
6493677 von Rosen et al. Dec 2002 B1
6493685 Ensel et al. Dec 2002 B1
6496855 Hunt et al. Dec 2002 B1
6496936 French et al. Dec 2002 B1
6507912 Matyas, Jr. et al. Jan 2003 B1
6510523 Perlman et al. Jan 2003 B1
6526404 Slater et al. Feb 2003 B1
6532284 Walker et al. Mar 2003 B2
6535855 Cahill et al. Mar 2003 B1
6535917 Zamanzadeh et al. Mar 2003 B1
6535980 Kumar et al. Mar 2003 B1
6539424 Dutta Mar 2003 B1
6557039 Leong et al. Apr 2003 B1
6574348 Venkatesan et al. Jun 2003 B1
6580814 Ittycheriah et al. Jun 2003 B1
6581040 Wright et al. Jun 2003 B1
6584505 Howard et al. Jun 2003 B1
6584508 Epstein et al. Jun 2003 B1
6589291 Boag et al. Jul 2003 B1
6592044 Wong et al. Jul 2003 B1
6609106 Robertson Aug 2003 B1
6609113 O'Leary et al. Aug 2003 B1
6609125 Layne et al. Aug 2003 B1
6609198 Wood et al. Aug 2003 B1
6609654 Anderson et al. Aug 2003 B1
6618579 Smith et al. Sep 2003 B1
6618806 Brown et al. Sep 2003 B1
6623415 Gates et al. Sep 2003 B2
6640302 Subramaniam et al. Oct 2003 B1
6668322 Wood et al. Dec 2003 B1
6675261 Shandony Jan 2004 B2
6684384 Bickerton et al. Jan 2004 B1
6687222 Albert et al. Feb 2004 B1
6687245 Fangman et al. Feb 2004 B2
6697947 Matyas, Jr. et al. Feb 2004 B1
6714987 Amin et al. Mar 2004 B1
6718482 Sato et al. Apr 2004 B2
6718535 Underwood Apr 2004 B1
6725269 Megiddo Apr 2004 B1
6735695 Gopalakrishnan et al. May 2004 B1
6738779 Shapira May 2004 B1
6751654 Massarani et al. Jun 2004 B2
6754833 Black et al. Jun 2004 B1
6755341 Wong et al. Jun 2004 B1
6766370 Glommen et al. Jul 2004 B2
6769605 Magness Aug 2004 B1
6772146 Khemlani et al. Aug 2004 B2
6775782 Buros et al. Aug 2004 B1
6785810 Lirov et al. Aug 2004 B1
6789115 Singer et al. Sep 2004 B1
6805288 Routhenstein et al. Oct 2004 B2
6810395 Bharat Oct 2004 B1
6819219 Bolle et al. Nov 2004 B1
6820202 Wheeler et al. Nov 2004 B1
6826696 Chawla et al. Nov 2004 B1
6832202 Schuyler et al. Dec 2004 B1
6847991 Kurapati Jan 2005 B1
6856970 Campbell et al. Feb 2005 B1
6868391 Hultgren Mar 2005 B1
6892231 Jager May 2005 B2
6907566 McElfresh et al. Jun 2005 B1
6925481 Singhal et al. Aug 2005 B2
6934848 King et al. Aug 2005 B1
6937976 Apte Aug 2005 B2
6938158 Azuma Aug 2005 B2
6950936 Subramaniam et al. Sep 2005 B2
6954932 Nakamura et al. Oct 2005 B2
6957337 Chainer et al. Oct 2005 B1
6965939 Cuomo et al. Nov 2005 B2
6976164 King et al. Dec 2005 B1
6980962 Arganbright et al. Dec 2005 B1
6983421 Lahti et al. Jan 2006 B1
6992786 Breding et al. Jan 2006 B1
7010512 Gillin et al. Mar 2006 B1
7020696 Perry et al. Mar 2006 B1
7032110 Su et al. Apr 2006 B1
7051199 Berson et al. May 2006 B1
7051330 Kaler et al. May 2006 B1
7058817 Ellmore Jun 2006 B1
7080036 Drummond et al. Jul 2006 B1
7089208 Levchin et al. Aug 2006 B1
7089503 Bloomquist et al. Aug 2006 B1
7093020 McCarty et al. Aug 2006 B1
7103556 Del Rey et al. Sep 2006 B2
7117239 Hansen Oct 2006 B1
7137006 Grandcolas et al. Nov 2006 B1
7185094 Marquette et al. Feb 2007 B2
20010011255 Asay et al. Aug 2001 A1
20010012974 Mahaffey Aug 2001 A1
20010016835 Hansmann et al. Aug 2001 A1
20010027474 Nachman et al. Oct 2001 A1
20010032184 Tenembaum Oct 2001 A1
20010047295 Tenembaum Nov 2001 A1
20010051917 Bissonette et al. Dec 2001 A1
20010054003 Chien et al. Dec 2001 A1
20020002479 Almog et al. Jan 2002 A1
20020007313 Mai et al. Jan 2002 A1
20020007460 Azuma Jan 2002 A1
20020010599 Levison Jan 2002 A1
20020010668 Travis et al. Jan 2002 A1
20020018585 Kim Feb 2002 A1
20020019938 Aarons Feb 2002 A1
20020023108 Daswani et al. Feb 2002 A1
20020029269 McCarty et al. Mar 2002 A1
20020032613 Buettgenbach et al. Mar 2002 A1
20020032650 Hauser et al. Mar 2002 A1
20020059141 Davies et al. May 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020077978 O'Leary et al. Jun 2002 A1
20020087447 McDonald et al. Jul 2002 A1
20020087471 Ganesan et al. Jul 2002 A1
20020095443 Kovack Jul 2002 A1
20020099826 Summers et al. Jul 2002 A1
20020104006 Boate et al. Aug 2002 A1
20020104017 Stefan Aug 2002 A1
20020107788 Cunningham Aug 2002 A1
20020143874 Marquette et al. Oct 2002 A1
20020152163 Bezos et al. Oct 2002 A1
20020156900 Marquette et al. Oct 2002 A1
20020165949 Na Nov 2002 A1
20020174010 Rice, III Nov 2002 A1
20020178113 Clifford et al. Nov 2002 A1
20020184507 Makower et al. Dec 2002 A1
20020188869 Patrick Dec 2002 A1
20020191548 Ylonen et al. Dec 2002 A1
20020198806 Blagg et al. Dec 2002 A1
20030001888 Power Jan 2003 A1
20030018915 Stoll Jan 2003 A1
20030023880 Edward et al. Jan 2003 A1
20030034388 Routhenstein et al. Feb 2003 A1
20030037131 Verma Feb 2003 A1
20030037142 Munger et al. Feb 2003 A1
20030040995 Daddario et al. Feb 2003 A1
20030041165 Spencer et al. Feb 2003 A1
20030046587 Bheemarasetti et al. Mar 2003 A1
20030046589 Gregg Mar 2003 A1
20030051026 Carter et al. Mar 2003 A1
20030055871 Roses Mar 2003 A1
20030070069 Belapurkar et al. Apr 2003 A1
20030070084 Satomaa et al. Apr 2003 A1
20030074580 Knouse et al. Apr 2003 A1
20030079147 Hsieh et al. Apr 2003 A1
20030084345 Bjornestad et al. May 2003 A1
20030084647 Smith et al. May 2003 A1
20030088552 Bennett et al. May 2003 A1
20030105981 Miller et al. Jun 2003 A1
20030110399 Rail Jun 2003 A1
20030115160 Nowlin et al. Jun 2003 A1
20030119642 Gates et al. Jun 2003 A1
20030154171 Karp et al. Aug 2003 A1
20030154403 Keinsley et al. Aug 2003 A1
20030159072 Bellinger et al. Aug 2003 A1
20030163700 Paatero Aug 2003 A1
20030163733 Barriga-Caceres et al. Aug 2003 A1
20030177067 Cowell et al. Sep 2003 A1
20030191549 Otsuka et al. Oct 2003 A1
20040031856 Atsmon et al. Feb 2004 A1
20040049702 Subramaniam et al. Mar 2004 A1
20040117409 Scahill et al. Jun 2004 A1
20050069136 Thornton et al. Mar 2005 A1
20050080747 Anderson et al. Apr 2005 A1
20050082362 Anderson et al. Apr 2005 A1
20050086160 Wong et al. Apr 2005 A1
20050086177 Anderson et al. Apr 2005 A1
20050120180 Schornbach et al. Jun 2005 A1
20050154877 Trench Jul 2005 A1
20050193056 Schaefer et al. Sep 2005 A1
20050210254 Gabryjelski et al. Sep 2005 A1
20050251852 Patrick et al. Nov 2005 A1
20050278641 Mansour et al. Dec 2005 A1
20060274970 Seki et al. Dec 2006 A1
20070028111 Covely Feb 2007 A1
20070118892 Sastry et al. May 2007 A1
Foreign Referenced Citations (23)
Number Date Country
2430549 Jun 2002 CA
19731293 Jan 1999 DE
0855659 Jul 1998 EP
0884877 Dec 1998 EP
0917119 May 1999 EP
1014318 Jun 2000 EP
1022664 Jul 2000 EP
1056043 Nov 2000 EP
1089516 Apr 2001 EP
H10-187467 Jul 1998 JP
200324329 Nov 2000 JP
2001134672 May 2001 JP
2005-242976 Sep 2005 JP
WO9743736 Nov 1997 WO
WO9940507 Aug 1999 WO
WO9952051 Oct 1999 WO
WO0068858 Nov 2000 WO
WO0118656 Mar 2001 WO
WO0135355 May 2001 WO
WO0143084 Jun 2001 WO
WO0188659 Nov 2001 WO
WO0217082 Feb 2002 WO
WO2004079603 Sep 2004 WO
Non-Patent Literature Citations (94)
Entry
Myers, Ankeney, Malpani, Galperin, and Adams, “X.509 Internet Public Key Infrastructure Online: Certificate Status Protocol-OCSP”, Entrust Technologies, Jun. 1999, pp. 1-8.
Echarge, Echarge Corporation, www.echarge.com, Dec. 3, 1999.
Summary of the at Your Request Architecture, First USA Bank Confidential and Proprietary, Apr. 2, 1999, pp. 1-8.
Siebel; Siebel: Ensuring Customer Success, www.siebel.com, Nov. 17, 1999.
OMG; Welcome to OMG'S Corba for Beginners page!, www.omg.co, May 25, 1999.
Sun Microsystems, Inc.; Schema for Representing Corba Objects in an LDAP Directory, May 21, 1999, pp. 1-9.
OMG; Library, www.omg.com, May 25, 1999.
OMG; What Is Corba?, www.omg.com, May 25, 1999.
Anonymous; Overview of Corba, May 25, 1999.
Anonymous; Corba Overview, Arch2.htm at Pent21.Infosys.Tuwien.ac.at, May 25, 1999.
Java; Java (TM) Technology in the Real World, java.sun.com, May 21, 1999.
Java; Java(TM) Servlet API, java.sun.com, May 21, 1999.
Java; Staying in Touch With JNDI, java.sun.com, May 21, 1999.
Java; Java(TM) Remote Method Invocation (RMI) Interface, java.sun.com, 05/32/1999.
Java; Banking on Java(TM) Technology, java.sun.com, May 21, 1999.
Applets, java.sun.com, May 21, 1999.
Java; The JDBC(TM) Data Access API, java.sun.com, May 21, 1999.
Thomas; Enterprise Javabeans(TM) Technology: Server Component Model for the Java(TM) Platform, java.sun.com, May 2, 1999.
Getting Smart With Java: Sun Micro Says American Express to Use Java for Smart Card, abcnews.com, Printed on Jun. 6, 2000.
Bank; Cash, Check,Charge—What's Next?, Seattle Times, Mar. 6, 1995.
Vandenengel; Cards on the Internet: Advertising on a $3 Bill, Industry Intelligence, Feb. 1, 1995, pp. 46-48.
Strassel; Dutch Software Concern Experiments With Electronic ‘Cash’ in Cyberspace, The Wall Street Journal, Apr. 17, 1995.
Kutler; Cash Card Creator Looking Beyond—Feb. 9, 1995.
Post; E-Cash: Can't Live With it, Can't Live Without it, The American Lawyer, Mar. 1, 1995, pp. 116-117.
Mitchell; Cyberspace: Crafting Softwareå, Business Week, Feb. 27, 1999, pp. 78-86.
Kutler; A Different Drummer on the Data Highway, American Banker, Section: No. 91, vol. 160, May 12, 1995, p. 14.
Epper; A Player Goes After Big Bucks in Cyberspace, American Banker, vol. 160, No. 86, ISSN: 0002-7561, May 5, 1995, p. 17.
Barnham; Network Brings Together Producers and Companies, Document ID: 17347.
Houlder; Oft Gives the Individual Top Priority: Report Calls for Deregulation of Business Lending, Document ID: 91716, Jun. 8, 1994.
Maize; Fannie Mae on the Web, Doucment ID: 52079, May 8, 1995.
Knowles; Improved Internet Security Enabling On-Line Commerce, PCWeek, vol. 12, No. 11, ISSN: 0740-1604, Mar. 20, 1995.
Anonymous; Aversion Therapy: Banks Overcoming Fear of the Net to Develop Safe Internet-Based Payment System W/ Netscape Communicator, Network World, ISSN: 0887-7661, Dec. 12, 1994.
Clark; Microsoft, Visa to Jointly Develop PC Electronic-Shopping Software, The Wall Street Journal, Nov. 9, 1994, WSJ B9.
Hewlett-Packard Company; Understanding Product Data Management, Hewlett-Packard Company.
Getting Started: Specific GE TPN Post Service Use Guidelines, Printed on Apr. 26, 1999.
Resource Center: Consolidated Edison Selects GE TPN Post, Printed Apr. 26, 1999.
Thomas Publishing Company; Thomasnet, Apr. 26, 1999.
Thomas Publishing Company; Solusource: For Engineers by Engineers, Thomas Publishing Company, Apr. 26, 1999.
Harris; Harris Infosource, Printed on Apr. 26, 1999.
Welcome to Muse, Apr. 26, 1999.
Product Data Integration Technologies, Inc., Step Integratin Authors, Printed on Apr. 26, 1999.
SBA: Pro-Net, U.S. Small Business Administration Procurement Marketing and Access Network, Last Modified: Apr. 1, 1999.
Freemarkets, Printed on Apr. 26, 1999.
At Your Request, www.wingspanbank.com, Sep. 28, 1999.
Meredith; Internet Bank Moves Closer to Virtual Reality, USA Today, May 5, 1995.
Sirbu, et al; Netbill: An Internet Commerce System Optimized for Network Delivered Services, Printed on Feb. 27, 1995.
The Check is in the Email, Information Today, vol. 12, No. 3, ISSN: 8755-6286, 03/01995.
The Gale Group; G&D America's Multi-Application Smart Card Selected for Combined Payroll and ‘Virtual Banking’ Program in Mexico, Business Wire, Apr. 24, 1998, p. 241047.
Mitchell; Netlink Goes After an Unbanked Niche, Card Technology, ISSN: 1093-1279, Sep. 1999, p. 22.
Berry et al.; A Potent New Tool for Selling Databse, Business Week, Cover Story, Sep. 5, 1994, pp. 56-62.
Shibata; Seventh International Conference on Parallel and Distributed Systems: Workshops, IEEE Computer Society, Jul. 4-7, 2000.
Jakobsson et al.; Secure and Lightweight Advertising on the Web, Computer Networks, 31 (1999) 1101-1109.
Fujimura et al.; XML Voucher: Generic Voucher Language, Feb. 2003.
Jepsen; Soap Cleans Up Interoperability Problems on the Web, IT PTO, Jan./Feb. 2001.
Chester; Cross-Platform Integration With XML and Soap, IT PTO Sep.-Oct. 2001.
Friedman; Dictionary of Business Terms, Barron's Third Edition, Copyright 2000.
Consortium Created to Manage Common Electronic Purse Specifications, http://www.visa.com/av/news/PRMISC051199.vhtml, Printed Feb. 23, 2001.
Smartaxis, How It Works, http://www.smartaxis.co.uk/seller/howitworks.html, Printed on Feb. 23, 2001.
Bechtel Construction Operations Incorporated Standardizes on Primavera's Expedition Contract Management Software, Business Wire, Jul. 27, 1999.
Primavera and Purchasepro.com to Create E-Commerce Marketplace for Construction Industry, Primavera Ships P3, Version 3.0, www.purchasepro.com/, Sep. 21, 1999, pp. 1-3.
Primavera Systems, Inc.—How the World Manages Projects, Expedition Contract Control Software, www.primavera.com, Jun. 23, 2005.
Civitello Jr.; Construction Operations Manual of Policies and Procedures, Third Edition, 2000.
Harris; Planning Using Primavera Project Planner P3 Version 3.0, User Guide, Copyright 1999 by Eastwood Harry Pty Ltd., 1999.
Ritz; Total Construction Project Management, McGraw-Hill, 1994.
Marchman; Construction Scheduling With Primavera Project Planner, May 25, 1999.
Associates National Bank (DE) Credit Card, The Associates, www.theassociates.com/consumer/CREDIT—CARDS/main.html , Apr. 6, 1999, 6 Pages.
Temporary Global Passwords, IBM Corporation, IBM TDB V36, N3, 03-93, Order 93A 60636, Mar. 1, 1993, pp. 451-454.
Method of Protecting Data on a Personal Computer, IBM Corporation, TDB 11-85, Order 85A 62426, Nov. 1, 1995, p. 2530.
Safe Single-Sign-On Protocol With Minimal Password Exposure No Decryption and Technology Adaptivity, IBM Corporation, TDB 03-95, Order 95A, Mar. 1, 1995, pp. 245-248.
Servlet/Applet/html Authentication Process With Single Sign-On, IBM Corporation, IBM Order: 00A6004, Jan. 1, 2000.
Johnston; Pondering Passport: Do You Trust Microsoft With Your Data?, www.pcworld.com/resource/printable/article/0.aid,63244,00.asp, Sep. 24, 2001.
Kormann; Risks of the Passport Single Signon Protocol, Computer Networks, Elsevier Science Press, vol. 33, Sep. 20, 2003, pp. 51-58.
Carden, Philip; The New Face of Single Sign-On, Network Computing, http://www.networkcomputing.com, Printed Dec. 29, 2000, 4 Pages.
Marlin; Chasing Document Management, Inform, vol. 13, No. 4, April 199, p. 76-82.
Construction Financing to Build Your Own Home, ISBN: 0962864307, Jul. 1990.
Radosevich; Is Work Flow Working?, cnn.com, Apr. 6, 1999 at <http://www.cnn.com/tech/computing/9904/06/workflow/ent.idg, p. 1 of 5, Retrieved From the Internet on Nov. 28, 2005.
Omware, Inc., Web Pages, Feb. 2000, Retrieved From http://web.archive.org/web20000226033405/www.omware.com/products.html, Retrieved From the Interneet on Nov. 28, 2005.
Point for Windows Version 3.X Interface Marketing Guide.PDF.
Frank; John N. Frank, Beyond Direct Mail, Credit Card Management, vol. 9, ISS. 5, Aug. 1996, 4pgs.
Mary C. Lacity, et al.; Mary C. Lacity, et al., The Information Systems Outsourcing Bandwagon, Sloan Management Review, vol. 35, No. 1, Fall 1993, p. 73-86.
Fusaro, Roberta; Builders Moving to Web Tools Computerworld, Nov. 16, 1998, vol. 32, No. 46, p. 51, 53.
Owens, David; Facilities Planning & Relocation RSmeans, 1993, ISBN: 0-87629-281-3.
Larsen, Amy; Internet Goes to Work for Builders, Interweek, Nov. 16, 1998, Issue 741.
Primavera Systems Delivers Expedition Express,Business Wire, Feb. 23, 1999.
Deckmyn, Dominique; San Francisco Manages $45M Project Via Web-Based Service, Computerworld, Aug. 9, 1999, vol. 33, No. 32, p. 14.
Seibert, Paul; Facilities Planning & Design for Financial Institutions Bankline Publications, 1996, ISBN: 1-55738-780-X.
Mosig, Richard; Software Review: The Construction Project Manager Cost Engineering, Jan. 1996, vol. 38, No. 1, p. 7-8.
Hernandez, Tomas et al.; Software Solutions Building Design & Construction, Nov. 1999, vol. 40, No. 11, p. 38-40.
Taylor; Telecommunications Demand Analysis in Transition, Proceedings of the 31st Hawaii International Conference on System Sciences, vol. 5, Jan. 6-9, 1998, p. 409-415.
Cotts, David; The Facility Management Handbook Second Edition AMACM, 1998, ISBN: 0-8144-030-8.
Alshawi, M et. al.; An IFC Web Based Collaborative Construction Computer Environment Wisper.
Brown, Keith; The Buiders Revolution.
Van Collie, Shimon Craig; Problem Disbursement Control Needed Construction Loan Tool From Primerit Newtrend.
Primavera Expedition User Guide.
Provisional Applications (1)
Number Date Country
60938575 May 2007 US