Certificate management method based on connectivity and policy

作者: John Vincent Storozuk , Christopher Lyle Bender , Chi Chiu Tse , Alan Pak-Lun Ho

DOI:

关键词: Structure (mathematical logic)Space (commercial competition)Certificate Management ProtocolIt policyPluralCertificateComputer scienceComputer securityMobile device

摘要: Plural modes of operation may be established on a mobile device. Specific the device associated with specific spaces in memory. By associating existing certificate store structure and key mode operation, certificates keys can assigned to one space among plural spaces. Furthermore, management (viewing/importation/deletion) controlled based presence or absence administration server status (enabled/disabled) an IT policy.

参考文章(61)
Jan M. Janick, Richard W. Cheston, Andy Lloyd Trotter, Daryl Carvis Cromer, Howard Jeffery Locker, Dhruv Manmohandas Desai, James Peter Ward, Richard Alan Dayan, Data processing system and method for remote recovery of a primary password ,(2000)
Adam E. Zilinskas, S. Morris Brown, Laura Delhy Machado de Wright, Remote certificate management ,(2005)
Eric F. Le Saint, Yves Louis Gabriel Audebert, A method and system for generating and verifying a key protection certificate. ,(2002)
Roger Paul Bowman, Christopher Lyle Bender, System and method for multi-certificate and certificate authority strategy ,(2010)