作者: Mark James McArdle , Marc David Dyksterhouse , Jonathan David Callas
DOI:
关键词: Certification path validation algorithm 、 Implicit certificate 、 Database 、 Certificate signing request 、 Certificate authority 、 Root certificate 、 Public key certificate 、 Authorization certificate 、 Computer security 、 Computer science 、 Self-signed certificate
摘要: A cryptosystem having a Certificate (Key) Server for storing and maintaining certificate or key information in database is described. The allows clients to submit retrieve keys from based on set of policy constraints which are one's particular site (e.g., company). Access the maintained by Policy Agent, makes sure that enforced given supplied during configuration. During operation, responds client requests add, search for, certificates. server accepts rejects certificates configurable parameters Agent. When submitted server, Agent checks see if it meets criteria settings specified Exemplary types can enforce include checking has been signed appropriate entities signatures User IDs associated with approved submission. If submission established configuration met, accepted server. being does not pass requirements, rejected (optionally) copy placed “pending bucket” where subsequently be examined system administrator determine should allowed