US20170187538A1 - System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content - Google Patents

System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content Download PDF

Info

Publication number
US20170187538A1
US20170187538A1 US15/409,427 US201715409427A US2017187538A1 US 20170187538 A1 US20170187538 A1 US 20170187538A1 US 201715409427 A US201715409427 A US 201715409427A US 2017187538 A1 US2017187538 A1 US 2017187538A1
Authority
US
United States
Prior art keywords
entity
user
platform service
programming interface
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/409,427
Inventor
David W. Kravitz
Donald Houston Graham, III
Josselyn L. Boudett
Russell S. Dietz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
T-CENTRAL Inc
Original Assignee
T-CENTRAL Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/096,764 external-priority patent/US20110270763A1/en
Priority claimed from US13/481,553 external-priority patent/US20120284506A1/en
Priority claimed from US14/218,897 external-priority patent/US9270663B2/en
Priority to US15/409,427 priority Critical patent/US20170187538A1/en
Application filed by T-CENTRAL Inc filed Critical T-CENTRAL Inc
Assigned to T-CENTRAL, INC. reassignment T-CENTRAL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOUDETT, JOSSELYN L., GRAHAM, DONALD H., III, DIETZ, RUSSELL S., KRAVITZ, DAVID W.
Priority to US15/469,244 priority patent/US9716595B1/en
Priority to US15/621,982 priority patent/US9832026B2/en
Publication of US20170187538A1 publication Critical patent/US20170187538A1/en
Priority to US15/668,598 priority patent/US9843450B2/en
Priority to US15/686,076 priority patent/US10153908B2/en
Priority to US15/890,140 priority patent/US10333720B2/en
Priority to US16/236,124 priority patent/US10652031B2/en
Priority to US16/412,247 priority patent/US10644891B2/en
Priority to US16/872,112 priority patent/US11456882B2/en
Priority to US17/896,992 priority patent/US11743057B2/en
Priority to US18/224,022 priority patent/US20230421393A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Definitions

  • U.S. patent application Ser. No. 14/715,588 is a continuation-in-part and claims priority under 35 U.S.C. ⁇ 120 from co-pending U.S. patent application Ser. No. 14/218,897, tilted “System And Method To Enable Pki- And Pmi-Based Distributed Locking Of Content And Distributed Unlocking Of Protected Content And/Or Scoring Of Users And/Or Scoring Of End-Entity Access Means—Added,” filed Mar. 18, 2014, now issued as U.S. Pat. No. 9,270,663, by Kravitz, et al, which claimed priority under 35 U.S.C. ⁇ 119(e) from U.S. Provisional Patent Application No. 61/792,927, filed Mar.
  • the present disclosure relates generally to providing one or more Application Programming Interfaces (APIs) integrating with a Platform Service (either Cloud, local server-based, or other) to provide access and use of one or more of the Platform's features.
  • APIs Application Programming Interfaces
  • An example of one such feature could be to enable the extension of security credentials for entities such as enterprise businesses, government, small business, individuals, systems integrators, independent software vendors and others, “Entities”, in order to effectuate more secure communication between an Entity and one or more remote third parties (for example, from an enterprise Entity to a third party customer beyond that enterprise Entities' network firewall).
  • Cryptographic security solutions typically require well-tested solutions which can be challenging to execute and deliver reliably and securely, even for professional experienced in the field.
  • Bruce Schneier (respected cryptographer, computer security & privacy specialist, and writer): “ . . . two cryptography truisms. The first is that cryptography is hard . . . . The second is that cryptographic implementation is hard . . . ” and “We're great at mathematically secure cryptography, and badly at using those tools to engineer secure systems”.
  • the Platform with its API(s) and Software Development Kit (SDK) may make it easier and simpler for software designers, application developers, Entities and others to add sophisticated cryptographic security solutions to their applications and/or Entity software solutions.
  • SDK Software Development Kit
  • the Platform, API and related technology may allow them to devote more time to meeting software requirements rather than dealing with the unique challenges of developing secure cryptographic systems, thereby reducing overall development time.
  • Application programmers including application developers, often provide Users with software applications that enable various services for the User.
  • an application may be provided to a user to authenticate the identity of a remote third party with whom the user desires to establish an authenticated, secure communication line (as described later herein).
  • the application programmer or platform service provider provisions an API with the authentication feature, and exposes various inputs to permit the user to activate the feature to implement the feature.
  • the application programmer may implement the service of authentication based on knowledge of application programming interfaces (APIs) that are offered by various technology service and/or platform providers. Each platform or service provider tends to have proprietary or specific APIs used to invoke the services it offers.
  • the application programmer utilizes the APIs provided by the provider, with the appropriate parameters, to invoke the desired feature (e.g., authentication of a remote third party).
  • API Application Programming Interface
  • An API may include a set of routines, protocols, and tools for building software applications that utilize those specific routines, protocols and tools.
  • an API is considered to be a software component in terms of its defined operations, inputs, outputs, and underlying types.
  • the Platform API may define and provide access to (and use of) the unique functionalities of the Platform.
  • a software developer may incorporate the API into his/her software application.
  • An API may make it easier to develop a software application by providing some of the building blocks required by an application developer, which he/she may then put together.
  • APIs may be created and offered using various methods such as SOAP (SOAP stands for Simple Object Access Protocol, and is XML based). Another is REST (short for Representational State Transfer. REST uses standard HTTP methods). More description of common API technology can be found at http://en.wikipedia.org/wiki/Application_programming_interface
  • Cloud computing A Platform is often hosted in the Cloud (e.g., “Cloud computing”; “Platform as a Service”). Cloud computing (see http://en.wikipedia.org/wiki/Cloud_computing).
  • Cloud computing At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just “the cloud”, also focuses on maximizing the effectiveness of the shared resources.
  • the Platform may also be hosted on a server within an Entity business network or elsewhere other than in the Cloud.
  • the Platform may support application developers to build software by employing the SDK tools to better use the capabilities of the API in order to control, access and utilize the features and functions of the Platform.
  • an Entity and/or User could gain access to one or more of the security, authentication, cryptographic, and other capabilities as disclosed herein and/or priority claims hereof, including U.S. Provisional Patent Applications No. 61/994,885 and 62/133,371.
  • the Platform and API solutions disclosed herein may provide a User-Directed, Authenticated, Cryptography-Enabling, Security-Focused Ecosystem (the “Security Ecosystem” as described in Appendix A of Application No. 62/133,371) through which an Entity and/or an Entity's “Users” (i.e., customers, clients, prospects, vendors, associates, employees, and/or others with whom an Entity may have a need to share sensitive information) can use one or more of the components of the Security Ecosystem to address one or more security challenges encountered by an Entity and/or User.
  • an Entity and/or an Entity's “Users” i.e., customers, clients, prospects, vendors, associates, employees, and/or others with whom an Entity may have a need to share sensitive information
  • Some examples of capabilities that might be accessed through the Platform and API may include (but are not limited to) the following features: Cross-Certification (the Platform may cross-certify an Entity's authorized identities with those of another trusted Entity that also uses the Platform; cross-certification may result in identities on one Entity being recognized by another Entity in order to facilitate inter-Entity, secure, point-to-point encrypted communication with trusted identities).
  • Cross-Certification the Platform may cross-certify an Entity's authorized identities with those of another trusted Entity that also uses the Platform; cross-certification may result in identities on one Entity being recognized by another Entity in order to facilitate inter-Entity, secure, point-to-point encrypted communication with trusted identities).
  • Go Paperless with Users may eliminate some printing and postage costs of sending statements and/or invoices (and/or other digital content) and/or alternatively the cumbersome practice of requiring Users to login and manually retrieve such digital content, by implementing a process of encrypting such digital content, thus allowing for such digital content to their
  • Digital Transaction Signing (which may support regulatory and/or business needs by providing non-repudiable authorization for some high value transactions, e.g., money transfers, account changes, medical orders, access authorization, etc.).
  • Digital Signatures (may provide an Integrated, Persistent, Non-Repudiable Digital Signature capability between an Entity and a User and/or another Entity that could facilitate the efficiency and reliability of remote document execution).
  • Audit Trails (may provide an integrated Digital, Non-Repudiable, verifiable Audit Trail capability confirming chain of custody, access, etc. of encrypted digital files which, in turn, may reduce fraud).
  • 2-Factor Authentication (may provide an integrated, digital, 2-factor authentication capability to greatly enhance the reliability of remote authentication and approvals as compared to common SMS messaging techniques).
  • Tunable Security (the platform and/or API may include a series of configurable authorization controls, limitations and monitoring capabilities, together with tunable security tools and such features may be configured controlled by an Entity and/or Users.)
  • Benefits of the possible solutions that could be offered through the Platform and API are numerous with some of them being described as one or more of the following: a core security solution together with add-on, customizable features that can integrate and evolve with existing security solutions; a capability to enable an Entity to invite Users or individuals to a secure communication line without exposing the Entity Infrastructure; a function to allow an Entity system administrator to track, monitor and/or audit transmitted encrypted digital content; a capability to create a separate database of associates and affiliates, including the right to revoke any invitation or relationship; a capability for an Entity to send encrypted digital content outside an Entity firewall with a result being that such digital content may be as secure (or more secure) than within that firewall; a capability to integrate Platform and/or API data records with Active Directory (or a similar system) as well with an Entity's PKI (Public Key Infrastructure); a reduction in “Data Spawn” (i.e., a tendency of unencrypted sensitive digital content to be copied and transferred to another person, Entity and/or location and possibly
  • the actions of the Platform may be selectively changed, controlled and utilized via the API through Entity-written code, thus providing application-specific security software required by an Entity or end User (such functions may be unique, custom, common or generic).
  • the functionality of the Platform may include the cryptographic security functionality desired by the Entity to provide it with one or more needed products, functions, solutions, capabilities, etc. For example these may include: the inviter-invitee protocol; authentication functions; audit trail capabilities; or other products, functions, solutions, capabilities etc. as described in this disclosure and/or its priority claims, etc.
  • a Platform SDK Software Development Kit
  • a Platform SDK may include a set of software development tools that may allow a software developer to create custom software applications to utilize the capabilities of the Platform and/or API.
  • a Platform and/or API in general may also be used or accessed by other Platforms.
  • An example of this is the Uber platform (www.uber.com) which uses the Twilio API and platform (www.twilio.com) for the telecommunications needs that Uber provides to its users (e.g., a text that “your Uber driver has arrived”).
  • Uber also uses the Braintree API and platform (www.braintreepayments.com) for processing Uber customers' credit card payments.
  • the Platform and API Security Ecosystem's software is generally oriented to reduce impact on the existing manner in which Entity users create, store and transmit digital content to others.
  • the Platform and API Security Ecosystem generally does not transport, store or have access to user's encrypted data.
  • the Platform and API Security Ecosystem generally attempts to provide security to user's digital assets by providing a system to protect those assets though encryption, both in transit and at rest.
  • the Platform and API Security Ecosystem may provide a tool so that Users may communicate privately, securely and with confidence not only with their authenticated friends, family and associates, but also with their user-created groups (e.g., schools, teams, clubs, political organizations, etc.)
  • groups e.g., schools, teams, clubs, political organizations, etc.
  • the Platform and API Security Ecosystem may offer Users a downloadable application to install on a desktop or mobile device that will “lock” (encrypt) and “unlock” (decrypt) digital content using a cryptographic standard such as Advanced Encryption Standards (AES 256) as well as possibly other optional protocols.
  • AES 256 Advanced Encryption Standards
  • An authenticated, authorized recipient of a digital file may open it; locked files should not be viewable by advertisers, email or cloud providers, governments or others; private encryption keys can be held generally by their owners; and identities may be authenticated through user-managed tools.
  • Such splitting of functions or services and/or data and/or keys (“Items”) across multiple service providers or servers or systems and/or across multiple components of a given service provider or server or system applies to the nature of flexibility of configurations relative to how those Items could be located on a Platform and/or a Line Server within the network infrastructure of an Entity and/or elsewhere.
  • Such embodiments of the invention are suggested and/or described in the descriptions following the above quoted sections in the above priority filings.
  • FIG. 1 is a block diagram of an illustrative architecture for interface and integration between the network of an Entity, an API and a Platform;
  • FIG. 2 is a flowchart illustrating an embodiment of the invention through the establishment of an authenticated relationship with an outside third party
  • an integration framework 100 is provided to support application developers that develop applications and services for Entities and/or Users in order to use the functions and services offered by the Platform and API.
  • This framework may accommodate development in multiple languages ( 101 , 102 , 103 , 104 , 105 , etc.) together with seamless integration by supporting those languages.
  • the framework may support common open protocols (e.g., REST & SOAP).
  • the framework may provide integrated class libraries for each of the programming languages supported.
  • Common Language Specification (CLS) 110 allows designers of various languages to write code that is able to access underlying library functionality of the Platform Object Services layer 112 .
  • the specification 110 functions as a contract between language designers and library designers that can be used to promote language interoperability.
  • the framework 100 includes an application program interface (API) layer 111 .
  • the API layer 111 presents groups of functions that the applications 101 - 105 can call to access the resources and services provided by Platform Object Services layer 112 .
  • the framework 100 can be configured to support API and/or direct calls placed by remote Client Apps of the service (see 20 in FIG. 2 ). This framework may modified for Entity and/or User purposes, particularly if a User is using a limited or dedicated function device, such as a mobile device (tablet, cellular phone, etc.).
  • a Enterprise Entity has a network infrastructure, 1 , including servers, workstations, firewall, Active Directory, Public Key Infrastructure (PKI), etc.
  • PKI Public Key Infrastructure
  • it has a component of the invention with a separate Registration Authority-Certification Authority-Attribute Authority-Line Servers combination, 2 (which in another embodiment may not be present in the enterprise network environment).
  • Both this and the Entity's API Control & Interface Module 3 interface with the API 4 .
  • On the workstation 5 of an Employee of the Entity there is a sensitive plain test document (digital content) 6 that the employee would like to send to an Outside User 7 .
  • the employee (now an “Inviter”) enters a request 9 into the Client App to invite the Outside User (now an “Invitee”) to share a secure communication line between the two of them.
  • the request 9 travels across the network to the Entity's API control and interface module 3 .
  • the API control and interface module 3 transmits an invitation request message 10 to the API.
  • the API transmits a translated message 11 to the Platform 12 .
  • the functions and services of the Platform 13 prepare an invitation response message 14 that is returned to the API 4 .
  • the API converts the response to a message 15 understandable by the API control and interface module 3 .
  • the API control and interface module transmits the message 15 across the network to the Client App 8 on the Inviter workstation 5 .
  • the Client App prepares a message that the Inviter can send in an email 16 which arrives at the Invitee 17 .
  • the Invitee may click on a link in the email (or visits a designated website and enter a unique invitation code which is provided in the email) to download 18 the client app.
  • the client app is downloaded 19 and installed 20 . With the basic install completed, the client is registered 21 with the Platform. From the Platform the Invitee is asked a secret question (supplied by the Inviter in the original invitation request) to which the Invitee is expected to know the answer and upon supplying that answer, the installation of the LKSM is authenticated 22 with the Platform and the system.
  • the Client App requests permission 23 to make certain cryptographic keys (including a Digital Identity Token—DIT). This is done upon approval 24 from the Platform with the Invitee's public keys then being sent 25 to the Platform.
  • the Inviter's public key is received from the Platform 26 (which had received it upon the initial installation of the Inviter's Client App).
  • the functions and services of the Platform 27 process and store this data and prepare a message 28 that is returned to the API 4 .
  • the API converts this message to a message 29 understandable by the API control and interface module 3 and the Client App 8 .
  • the API control and interface module transmits the message 29 across the network to the Client App 8 on the Inviter workstation 5 .
  • the Client App 8 updates its LKSM with the invitation authentication and stores the Invitee's public key.

Abstract

A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration (Platform) to extend the security capabilities of Public Key Infrastructure and Privilege Management Infrastructure systems to authenticated external users and protected content.

Description

  • This application is a continuation of and claims priority to U.S. patent application Ser. No. 15/154,861, filed May 13, 2016, which is a continuation of and claims priority to U.S. patent application Ser. No. 14/715,588, filed May 18, 2015, now issued as U.S. Pat. No. 9,356,916, which claims priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application No. 61/994,885, filed May 17, 2014, titled “A System with PKI- & PMI-Based Distributed Locking, Unlocking and Automated Distribution of Protected Content,” and from U.S. Provisional Patent Application No. 62/133,371, filed Mar. 15, 2015, titled “A Cloud-based Platform supported by API(s) and SDK(s) providing a System with PKI- & PMI-Based Distributed Locking, Unlocking and Automated Distribution of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means,” all of which are incorporated herein by reference and for all purposes.
  • U.S. patent application Ser. No. 14/715,588 is a continuation-in-part and claims priority under 35 U.S.C. §120 from co-pending U.S. patent application Ser. No. 14/218,897, tilted “System And Method To Enable Pki- And Pmi-Based Distributed Locking Of Content And Distributed Unlocking Of Protected Content And/Or Scoring Of Users And/Or Scoring Of End-Entity Access Means—Added,” filed Mar. 18, 2014, now issued as U.S. Pat. No. 9,270,663, by Kravitz, et al, which claimed priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application No. 61/792,927, filed Mar. 15, 2013, entitled “System And Method To Enable Pki- And Pmi-Based Distributed Locking Of Content And Distributed Unlocking Of Protected Content And/Or Scoring Of Users And/Or Scoring Of End-Entity Access Means,” by Kravitz et al., which incorporated herein by reference and for all purposes and which is a continuation in part and claimed priority under 35 U.S.C. §120 from co-pending U.S. patent application Ser. No. 13/481,553, entitled “Methods And Apparatus For Preventing Crimeware Attacks,” filed May 25, 2012, by Kravitz, et al, which claimed priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application No. 61/650,866, filed May 23, 2012, entitled “Method And Apparatus For A Cybersecurity Ecosystem,” by Kravitz et al., which is incorporated herein by reference and for all purposes and which also claimed priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application No. 61/490,952, filed May 27, 2011, entitled “Method And Apparatus For A Financial Document Clearinghouse And Secure Delivery Network Cybersecurity Ecosystem,” by Graham III et al., which is incorporated herein by reference and for all purposes and which is a continuation in part and claimed priority under 35 U.S.C. §120 from U.S. patent application Ser. No. 13/096,764, entitled “Methods And Apparatus For A Financial Document Clearinghouse And Secure Delivery Network,” filed Apr. 28, 2011, by Graham III et al., which claimed priority under 35 U.S.C. §119(e) from each of the four following U.S. provisional applications: i) U.S. Provisional Patent Application No. 61/330,226, filed Apr. 30, 2010, entitled “Clearinghouse Server For Financial Data Delivery And Financial Services,” by Graham III et al., ii) U.S. Provisional Patent Application No. 61/367,574, filed Jul. 26, 2010, entitled “Methods And Systems For A Clearinghouse Server For Delivery Of Sensitive Data,” iii) U.S. Provisional Patent Application 61/367,576, filed Jul. 26, 2010, entitled “Methods And Apparatus For A Financial Document Clearinghouse System,” by Graham III et al., and iv) U.S. Provisional Patent Application No. 61/416,629, filed Nov. 23, 2010, entitled “Methods And Apparatus For Secure Data Delivery And User Scoring In A Financial Document Clearinghouse,” by Graham III et al., each of which is incorporated by reference and for all purposes.
  • BACKGROUND Field of the Described Embodiments
  • The present disclosure relates generally to providing one or more Application Programming Interfaces (APIs) integrating with a Platform Service (either Cloud, local server-based, or other) to provide access and use of one or more of the Platform's features. An example of one such feature could be to enable the extension of security credentials for entities such as enterprise businesses, government, small business, individuals, systems integrators, independent software vendors and others, “Entities”, in order to effectuate more secure communication between an Entity and one or more remote third parties (for example, from an enterprise Entity to a third party customer beyond that enterprise Entities' network firewall).
  • Most Entities are faced with similar, common security challenges. For many of such challenges, positive security solutions can sometimes be achieved through the use of cryptography. Cryptographic security solutions typically require well-tested solutions which can be challenging to execute and deliver reliably and securely, even for professional experienced in the field. According to Bruce Schneier (respected cryptographer, computer security & privacy specialist, and writer): “ . . . two cryptography truisms. The first is that cryptography is hard . . . . The second is that cryptographic implementation is hard . . . ” and “We're great at mathematically secure cryptography, and terrible at using those tools to engineer secure systems”. For these reasons, well-designed, well-executed, tested, cryptographic tools that provide useful and flexible solutions that meet actual security needs can be difficult for those Entities to produce for themselves. Therefore a Platform and API with useful and tested cryptographic solutions could be of benefit to those Entities.
  • The Platform with its API(s) and Software Development Kit (SDK) may make it easier and simpler for software designers, application developers, Entities and others to add sophisticated cryptographic security solutions to their applications and/or Entity software solutions. The Platform, API and related technology may allow them to devote more time to meeting software requirements rather than dealing with the unique challenges of developing secure cryptographic systems, thereby reducing overall development time.
  • SUMMARY OF THE DESCRIBED EMBODIMENTS
  • Application programmers, including application developers, often provide Users with software applications that enable various services for the User. For example, an application may be provided to a user to authenticate the identity of a remote third party with whom the user desires to establish an authenticated, secure communication line (as described later herein). In such a case, the application programmer or platform service provider provisions an API with the authentication feature, and exposes various inputs to permit the user to activate the feature to implement the feature. The application programmer may implement the service of authentication based on knowledge of application programming interfaces (APIs) that are offered by various technology service and/or platform providers. Each platform or service provider tends to have proprietary or specific APIs used to invoke the services it offers. The application programmer utilizes the APIs provided by the provider, with the appropriate parameters, to invoke the desired feature (e.g., authentication of a remote third party).
  • API (Application Programming Interface) may include a set of routines, protocols, and tools for building software applications that utilize those specific routines, protocols and tools. Generally an API is considered to be a software component in terms of its defined operations, inputs, outputs, and underlying types. The Platform API may define and provide access to (and use of) the unique functionalities of the Platform. A software developer may incorporate the API into his/her software application. An API may make it easier to develop a software application by providing some of the building blocks required by an application developer, which he/she may then put together.
  • APIs may be created and offered using various methods such as SOAP (SOAP stands for Simple Object Access Protocol, and is XML based). Another is REST (short for Representational State Transfer. REST uses standard HTTP methods). More description of common API technology can be found at http://en.wikipedia.org/wiki/Application_programming_interface
  • A Platform is often hosted in the Cloud (e.g., “Cloud computing”; “Platform as a Service”). Cloud computing (see http://en.wikipedia.org/wiki/Cloud_computing). At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just “the cloud”, also focuses on maximizing the effectiveness of the shared resources.
  • The Platform, as disclosed herein, may also be hosted on a server within an Entity business network or elsewhere other than in the Cloud.
  • The Platform may support application developers to build software by employing the SDK tools to better use the capabilities of the API in order to control, access and utilize the features and functions of the Platform. Using any of these capabilities, for this disclosure, an Entity and/or User could gain access to one or more of the security, authentication, cryptographic, and other capabilities as disclosed herein and/or priority claims hereof, including U.S. Provisional Patent Applications No. 61/994,885 and 62/133,371.
  • The Platform and API solutions disclosed herein may provide a User-Directed, Authenticated, Cryptography-Enabling, Security-Focused Ecosystem (the “Security Ecosystem” as described in Appendix A of Application No. 62/133,371) through which an Entity and/or an Entity's “Users” (i.e., customers, clients, prospects, vendors, associates, employees, and/or others with whom an Entity may have a need to share sensitive information) can use one or more of the components of the Security Ecosystem to address one or more security challenges encountered by an Entity and/or User.
  • Some examples of capabilities that might be accessed through the Platform and API may include (but are not limited to) the following features: Cross-Certification (the Platform may cross-certify an Entity's authorized identities with those of another trusted Entity that also uses the Platform; cross-certification may result in identities on one Entity being recognized by another Entity in order to facilitate inter-Entity, secure, point-to-point encrypted communication with trusted identities). Go Paperless with Users (may eliminate some printing and postage costs of sending statements and/or invoices (and/or other digital content) and/or alternatively the cumbersome practice of requiring Users to login and manually retrieve such digital content, by implementing a process of encrypting such digital content, thus allowing for such digital content to their authenticated recipients for decryption). Digital Transaction Signing (which may support regulatory and/or business needs by providing non-repudiable authorization for some high value transactions, e.g., money transfers, account changes, medical orders, access authorization, etc.). Digital Signatures (may provide an Integrated, Persistent, Non-Repudiable Digital Signature capability between an Entity and a User and/or another Entity that could facilitate the efficiency and reliability of remote document execution). Audit Trails (may provide an integrated Digital, Non-Repudiable, verifiable Audit Trail capability confirming chain of custody, access, etc. of encrypted digital files which, in turn, may reduce fraud). 2-Factor Authentication (may provide an integrated, digital, 2-factor authentication capability to greatly enhance the reliability of remote authentication and approvals as compared to common SMS messaging techniques). Tunable Security (the platform and/or API may include a series of configurable authorization controls, limitations and monitoring capabilities, together with tunable security tools and such features may be configured controlled by an Entity and/or Users.)
  • Benefits of the possible solutions that could be offered through the Platform and API are numerous with some of them being described as one or more of the following: a core security solution together with add-on, customizable features that can integrate and evolve with existing security solutions; a capability to enable an Entity to invite Users or individuals to a secure communication line without exposing the Entity Infrastructure; a function to allow an Entity system administrator to track, monitor and/or audit transmitted encrypted digital content; a capability to create a separate database of associates and affiliates, including the right to revoke any invitation or relationship; a capability for an Entity to send encrypted digital content outside an Entity firewall with a result being that such digital content may be as secure (or more secure) than within that firewall; a capability to integrate Platform and/or API data records with Active Directory (or a similar system) as well with an Entity's PKI (Public Key Infrastructure); a reduction in “Data Spawn” (i.e., a tendency of unencrypted sensitive digital content to be copied and transferred to another person, Entity and/or location and possibly copied and transferred repeatedly with a result being that the original sensitive digital content may become located in multiple places and/or with multiple individuals or entities, thus reducing its security) through the capabilities of the Platform and API whereby digital content may be transferred to multiple places and/or with multiple individuals or entities in an encrypted format and may be stored in an encrypted format, thus reducing an uncontrolled and/or un-audited distribution of unencrypted sensitive digital content.
  • The actions of the Platform may be selectively changed, controlled and utilized via the API through Entity-written code, thus providing application-specific security software required by an Entity or end User (such functions may be unique, custom, common or generic). The functionality of the Platform may include the cryptographic security functionality desired by the Entity to provide it with one or more needed products, functions, solutions, capabilities, etc. For example these may include: the inviter-invitee protocol; authentication functions; audit trail capabilities; or other products, functions, solutions, capabilities etc. as described in this disclosure and/or its priority claims, etc.
  • A Platform SDK (Software Development Kit) may include a set of software development tools that may allow a software developer to create custom software applications to utilize the capabilities of the Platform and/or API. A Platform and/or API in general may also be used or accessed by other Platforms. An example of this is the Uber platform (www.uber.com) which uses the Twilio API and platform (www.twilio.com) for the telecommunications needs that Uber provides to its users (e.g., a text that “your Uber driver has arrived”). Another example is that Uber also uses the Braintree API and platform (www.braintreepayments.com) for processing Uber customers' credit card payments.
  • One problem to address could be long-stalled “going-paperless” initiatives of some Entities: securely delivering statements, invoices, and other digital content to their Users as opposed to postal mail or the inconvenient “come and get it” paradigm (requiring Users to log into Entity websites and manually retrieve such digital assets. Billions of documents need to be delivered annually from Entities to their Users. Mail is expensive. The “come and get it” paradigm of Users logging onto Entity websites is only partially successful. The “going-paperless” problem is a manifestation of a broader problem confronting Entities: lack of a user-friendly, workable, authenticated, secure B2C and B2B communication capability. It is a challenge today for Entities to easily and securely exchange sensitive digital content with those outside their networks. The Platform and API Security Ecosystem's integrated software capabilities can ensure that the sensitive digital content, etc., that Entity users send to third parties who are off the Entity network can be delivered securely and privately to their correct, authenticated recipients.
  • The Platform and API Security Ecosystem's software is generally oriented to reduce impact on the existing manner in which Entity users create, store and transmit digital content to others. The Platform and API Security Ecosystem generally does not transport, store or have access to user's encrypted data. The Platform and API Security Ecosystem generally attempts to provide security to user's digital assets by providing a system to protect those assets though encryption, both in transit and at rest.
  • For Users the Platform and API Security Ecosystem may provide a tool so that Users may communicate privately, securely and with confidence not only with their authenticated friends, family and associates, but also with their user-created groups (e.g., schools, teams, clubs, political organizations, etc.)
  • The Platform and API Security Ecosystem (either directly or through Entities) may offer Users a downloadable application to install on a desktop or mobile device that will “lock” (encrypt) and “unlock” (decrypt) digital content using a cryptographic standard such as Advanced Encryption Standards (AES 256) as well as possibly other optional protocols. An authenticated, authorized recipient of a digital file may open it; locked files should not be viewable by advertisers, email or cloud providers, governments or others; private encryption keys can be held generally by their owners; and identities may be authenticated through user-managed tools.
  • As stated on Page 1 of Appendix B of Application No. 62/133,371 (as well as on Page 1 of Application No. 61/792,927) “The various inventions described herein contemplate functions or services fulfilled through service provider involvement. As stated in the various referenced APPENDICES, functions or services and/or data and/or keys may be split across multiple service providers or servers or systems and/or across multiple components of a given service provider or server or system.” “Server” may also be considered to be a “computing device” with a processor(s) and memory.
  • Such splitting of functions or services and/or data and/or keys (“Items”) across multiple service providers or servers or systems and/or across multiple components of a given service provider or server or system applies to the nature of flexibility of configurations relative to how those Items could be located on a Platform and/or a Line Server within the network infrastructure of an Entity and/or elsewhere. Such embodiments of the invention are suggested and/or described in the descriptions following the above quoted sections in the above priority filings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present disclosure is described in greater detail below, with reference to the accompanying drawings, in which:
  • FIG. 1 is a block diagram of an illustrative architecture for interface and integration between the network of an Entity, an API and a Platform; and
  • FIG. 2 is a flowchart illustrating an embodiment of the invention through the establishment of an authenticated relationship with an outside third party;
  • DETAILED DESCRIBED EMBODIMENTS
  • Referring to FIG. 1, an integration framework 100 is provided to support application developers that develop applications and services for Entities and/or Users in order to use the functions and services offered by the Platform and API. This framework may accommodate development in multiple languages (101, 102, 103, 104, 105, etc.) together with seamless integration by supporting those languages. The framework may support common open protocols (e.g., REST & SOAP). The framework may provide integrated class libraries for each of the programming languages supported. In one embodiment Common Language Specification (CLS) 110 allows designers of various languages to write code that is able to access underlying library functionality of the Platform Object Services layer 112. The specification 110 functions as a contract between language designers and library designers that can be used to promote language interoperability. By adhering to the CLS, libraries written in one language can be directly accessible to code modules written in other languages to achieve seamless integration between code modules written in one language and code modules written in another language. (More information on Common Language Specification can be found under Common Language Infrastructure on Wikipedia: http://en.wkipedia.org/wiki/Common_Language_Infrastructure). The framework 100 includes an application program interface (API) layer 111. The API layer 111 presents groups of functions that the applications 101-105 can call to access the resources and services provided by Platform Object Services layer 112. By exposing the API functions for multiple Platform services, application developers can create Web applications and/or direct application calls that can generate, control and/or make full use of the Platform resources, without needing to understand the complex interworkings of how those cryptographically sophisticated Platform resources actually operate or are made available. Moreover, the Web applications can be written in any number of programming languages, and may be translated into an intermediate language supported by a common language runtime 113 and included as part of the Common Language Specification 110. In this way, the API layer 111 may provide methods to access all of the Platform resources. Additionally, the framework 100 can be configured to support API and/or direct calls placed by remote Client Apps of the service (see 20 in FIG. 2). This framework may modified for Entity and/or User purposes, particularly if a User is using a limited or dedicated function device, such as a mobile device (tablet, cellular phone, etc.).
  • Referring to FIG. 2, a Enterprise Entity has a network infrastructure, 1, including servers, workstations, firewall, Active Directory, Public Key Infrastructure (PKI), etc. In this embodiment it has a component of the invention with a separate Registration Authority-Certification Authority-Attribute Authority-Line Servers combination, 2 (which in another embodiment may not be present in the enterprise network environment). Both this and the Entity's API Control & Interface Module 3 interface with the API 4. On the workstation 5 of an Employee of the Entity, there is a sensitive plain test document (digital content) 6 that the employee would like to send to an Outside User 7. Using an installed Client App (which includes a Local Key Store Module—LKSM) 8 the employee (now an “Inviter”) enters a request 9 into the Client App to invite the Outside User (now an “Invitee”) to share a secure communication line between the two of them. The request 9 travels across the network to the Entity's API control and interface module 3. In conformance with the specifications of the API, the API control and interface module 3 transmits an invitation request message 10 to the API. The API transmits a translated message 11 to the Platform 12. The functions and services of the Platform 13 prepare an invitation response message 14 that is returned to the API 4. In accordance with a specification, the API converts the response to a message 15 understandable by the API control and interface module 3. The API control and interface module transmits the message 15 across the network to the Client App 8 on the Inviter workstation 5. The Client App prepares a message that the Inviter can send in an email 16 which arrives at the Invitee 17. The Invitee may click on a link in the email (or visits a designated website and enter a unique invitation code which is provided in the email) to download 18 the client app. The client app is downloaded 19 and installed 20. With the basic install completed, the client is registered 21 with the Platform. From the Platform the Invitee is asked a secret question (supplied by the Inviter in the original invitation request) to which the Invitee is expected to know the answer and upon supplying that answer, the installation of the LKSM is authenticated 22 with the Platform and the system. The Client App requests permission 23 to make certain cryptographic keys (including a Digital Identity Token—DIT). This is done upon approval 24 from the Platform with the Invitee's public keys then being sent 25 to the Platform. The Inviter's public key is received from the Platform 26 (which had received it upon the initial installation of the Inviter's Client App). The functions and services of the Platform 27 process and store this data and prepare a message 28 that is returned to the API 4. In accordance with a specification, the API converts this message to a message 29 understandable by the API control and interface module 3 and the Client App 8. The API control and interface module transmits the message 29 across the network to the Client App 8 on the Inviter workstation 5. The Client App 8 updates its LKSM with the invitation authentication and stores the Invitee's public key.

Claims (9)

1. A method in a server or servers, or other computing device or devices each including a processor and memory, which provides an integration of security and/or cryptographic functions which may include one or more applications such as: public key infrastructure, privilege management infrastructure, certification authority, registration authority, attribute authority, hardware security module, and/or other hardware systems and/or software systems and including a method that communicates with one or more of these applications, which together may be described as a platform service and be capable of supporting a variety of security-related functions;
such as to enable the extension of security credentials for entities such as enterprise businesses, government, small business, individuals, systems integrators, independent software vendors and others, in order to effectuate more secure communication between one such entity, which may be referred to as a user, and one or more such remote third party entity, which also may be referred to as a user, with an example of such being from an enterprise entity to a third party customer entity of that said enterprise entity which will likely exist beyond that said enterprise entity's network firewall;
such that to access, utilize and/or benefit from the security and/or authentication capabilities of said applications and/or said platform service, such a said entity need not have specific knowledge and/or expertise regarding typical technical requirements, operation and/or capabilities of how said cryptography and/or security systems function, operate and/or perform and/or accomplish their functions in order for said entity to achieve the security needs, features and/or functions provided by said platform service;
such that an entity might access, utilize and/or benefit from the capabilities of said platform service through the use of an application programming interface which could access and/or utilize designated capabilities of said platform service to said entity in a fashion that could require substantially less technical knowledge of security and/or cryptography systems of the part of said entity than might otherwise be required in order for said entity to achieve its desired security-related controls and/or results;
such that such platform service may integrate with existing security and/or cryptographic applications pre-existing with an entity and therefore not require such pre-existing application as a component of said platform service.
2. A method of claim 1 where a platform service may be located in a server or servers in a cloud computing environment or in a server or servers, or other computing device or devices within an enterprise or other entity's network or in a server or servers, or other computing device or devices located elsewhere, and in any of such cases the platform service would be accessible by said application programming interface;
such that a platform service in one embodiment may support the needs of a single such enterprise entity or in another embodiment being located in a cloud computing environment where it may support the needs of one or many related and/or unrelated entities as well as other embodiments where it may support entities in other configurations.
3. A method of claim 1 where such an application programming interface may run on a server or servers, or other computing device or devices each including a processor and memory such as located within an enterprise entity's network such that said enterprise entity could use said application programming interface to access said platform service in order authenticate one or more employee entity, or other individual entity or other entity, which could be referred to as an originating entity or a remote entity;
such as within any other entity's computer or network environment such that said entity could use said application programming interface to access said platform service in order to authenticate one or more other type of entity, such as an employee, customer, or other entity, which could be referred to as an originating entity, a remote entity or a user;
such that the process of authentication of any such originating entity, remote entity or user would include said originating entity, remote entity or user installing an application compatible with such application programming interface on one or more computing devices to be used by said originating entity, remote entity or user.
4. A method of claim 1 in a server or servers, or other computing device or devices of such entity, such method being compatible with the methods of said application programming interface so that such application programming interface compatible application or method is able to communicate via said application programming interface with said platform service in order to access, utilize and/or benefit from the capabilities of said platform service;
such that any such entity may become an originating entity by using said application programming interface compatible method to invite one or more remote entities to establish and authenticate a secure communications line with said originating entity by using one or more of the steps of an inviter-invitee protocol;
such that the setup of authorized communication lines may involve delegation of authorizations, e.g., as incorporated into said inviter-invitee process;
such that real-time credential management may involve key establishment key pairs and/or encryption-decryption key pairs and/or with digital signature verification and digital signature generation key pairs;
such that said key establishment key pairs and/or encryption and decryption key pairs may be used, in turn, to deliver access to derived, transported and/or agreed-upon symmetric encryption/decryption keys so that plaintext content, for example digital content or files, and/or communications, such as messages, may preferably securely be made available to intended recipients, such as originating or remote entities, whether internal or external to any entity's network.
5. A method of claim 1 in a server or other computing device including a processor and memory, which together could compose an originating entity for a secure communication, that accesses an application programming interface which could be on the same computing device or on a separate, connected computing device including a processor and memory;
in order to deliver pre-defined and formatted requests to that computing device on which the application programming interface runs;
which requests may be subsequently processed and translated by the application programming interface into instructions which in turn may be transmitted to a designated and known remote server which may be located in a cloud computing or enterprise or other environment upon which a platform service runs;
where functions of said platform service are to contribute to the delivery of defined security, authentication, cryptographic, and other security-related capabilities;
such that those translated requests from said application programming interface to said platform service are in a defined format that said platform service can understand and can act upon; whereupon pre-determined, desired actions may be implemented via one or more transferred instruction by the platform service to occur and/or make changes on separate, known computing devices each with one or more processors and memory which would be operating as a remote entity;
such actions may be communicated from the platform service to the application programming interface and thereafter to a computing device of an originating entity or remote entity with a client software application which can connect to the application programming interface; or alternatively to a separate computing device connected to said platform service.
6. The method of claim 1, wherein data generated by said platform service resulting from requests made via said application programming interface to said platform service or to said platform service from a separate computing device application used by such remote entity may be responded to by said platform service to said application programming interface or to such separate computing device which responses may include instructions, steps and/or methods that;
enable entities to authenticate themselves remotely to another such entity using an inviter-invitee protocol;
enable an exchange of authenticated public encryption keys between such entities;
thereby provide the capabilities that enable such entities to exchange encrypted documents between themselves and/or other such authenticated entities using third-party means.
7. A method of claim 1 composed of a system of communication comprising: a client software application, a user facing domain, a key escrow domain, and an inviter-invitee protocol wherein the user facing domain securely relates to multiple parties via the client application and the key escrow domain authenticates secure lines of communication amongst the parties;
said client application in claim 1 consisting of but not limited to a local key store module and a digital identity token;
said user facing domain in claim 1 consisting of but not limited to a login interface on a server, hardware security module and lightweight directory access protocol application on a server;
said key escrow domain consisting of consisting a registration authority, certificate authority, attribute authority, each being installed on a server and hardware security module;
said inviter-invitee protocol consisting of multiple steps but not limited to sending an invitation, receiving the invitation, downloading the client app, installation and registration, authentication, and single or multiple key requests, creation, and exchanges;
said invitation consisting of, but not limited to, a client application with digital identity token, e-mail address, designated attributes, authentication question, answer to authentication question, and a cryptographic digital signature.
8. A method of secure communication based on the system of communication in claim 1 wherein a persistent, yet revocable, a secure line of communication is established and authenticated;
said method in claim 4 and claim 6 wherein the secure line of communication is established by the said invitation protocol in claim 7.
9. A method of claim 4 and claim 7 whereby a user on an electronic device has the ability to install an application that:
creates a set of public and private encryption keys for:
encrypting and decrypting documents, digital signing and other purposes;
allows a first user to invite a second user using a second electronic device to share a communication line with the first user on the first user's electronic device;
provides a method whereby the second user may respond to the invitation of the first user and install a comparable application on the second user's electronic device and thereafter have a comparable set of public and private encryption keys on that electronic device;
provides an invitation method that will include authentication steps that the second user must comply with in a specified method on his electronic device so that the identify of the second user, together with the associated installation of the application on his specific electronic device together with that specific electronic device are all linked together in such a manner that the first user can be assured by the server of the trusted third party or through the use of such application programming interface and such a platform service, that provided and monitored the installation and authentication of the client software application on the physical electronic device controlled by the second user confirms this described association through this method;
such that the public encryption key of each user is made available to the other user's application in a manner in which the authenticity of the keys is assured by the server of the trusted third party or through the use of such application programming interface and such a platform service, that provided the client software application to each party, actions which also may be completed through the use of such an application programming interface and such a platform service;
such that by relying on the representation and authentication provided through the server of the trusted third party or through the use of such application programming interface and such a platform service, that the parties can thereafter use encryption capabilities of the client software application client software application to first encrypt a digital asset on one electronic device with a symmetric encryption key followed by the encryption of that symmetric encryption key using the public encryption key known to be that of the other user, followed by having the ability to transfer, in any manner selected by the originating entity, both the encrypted digital asset together with the symmetric encryption key which has been encrypted using the public encryption of the second user
such that the second user, upon receipt of these two will be able to use his private key to decrypt the symmetric key and thereafter decrypt the encrypted digital asset;
the applicable steps may be completed through the use of such an application programming interface and such a platform service or directly with a server with an accompanying security ecosystem.
US15/409,427 2010-04-30 2017-01-18 System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content Abandoned US20170187538A1 (en)

Priority Applications (11)

Application Number Priority Date Filing Date Title
US15/409,427 US20170187538A1 (en) 2010-04-30 2017-01-18 System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US15/469,244 US9716595B1 (en) 2010-04-30 2017-03-24 System and method for internet of things (IOT) security and management
US15/621,982 US9832026B2 (en) 2010-04-30 2017-06-13 System and method from Internet of Things (IoT) security and management
US15/668,598 US9843450B2 (en) 2010-04-30 2017-08-03 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content
US15/686,076 US10153908B2 (en) 2010-04-30 2017-08-24 Secure communication of IOT devices for vehicles
US15/890,140 US10333720B2 (en) 2010-04-30 2018-02-06 Secure communication of IOT devices for vehicles
US16/236,124 US10652031B2 (en) 2010-04-30 2018-12-28 Using PKI for security and authentication of control devices and their data
US16/412,247 US10644891B2 (en) 2010-04-30 2019-05-14 Secure communication of IoT devices for vehicles
US16/872,112 US11456882B2 (en) 2010-04-30 2020-05-11 Using PKI for security and authentication of control devices and their data
US17/896,992 US11743057B2 (en) 2010-04-30 2022-08-26 Using PKI for security and authentication of control devices and their data
US18/224,022 US20230421393A1 (en) 2010-04-30 2023-07-19 Using pki for security and authentication of control devices and their data

Applications Claiming Priority (15)

Application Number Priority Date Filing Date Title
US33022610P 2010-04-30 2010-04-30
US36757410P 2010-07-26 2010-07-26
US36757610P 2010-07-26 2010-07-26
US41662910P 2010-11-23 2010-11-23
US13/096,764 US20110270763A1 (en) 2010-04-30 2011-04-28 Methods and apparatus for a financial document clearinghouse and secure delivery network
US201161490952P 2011-05-27 2011-05-27
US201261650866P 2012-05-23 2012-05-23
US13/481,553 US20120284506A1 (en) 2010-04-30 2012-05-25 Methods and apparatus for preventing crimeware attacks
US201361792927P 2013-03-15 2013-03-15
US14/218,897 US9270663B2 (en) 2010-04-30 2014-03-18 System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US201461994885P 2014-05-17 2014-05-17
US201562133371P 2015-03-15 2015-03-15
US14/715,588 US9356916B2 (en) 2010-04-30 2015-05-18 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/154,861 US9578035B2 (en) 2010-04-30 2016-05-13 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/409,427 US20170187538A1 (en) 2010-04-30 2017-01-18 System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US15/154,861 Continuation US9578035B2 (en) 2010-04-30 2016-05-13 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/154,864 Continuation US9564405B2 (en) 2015-05-15 2016-05-13 Substrate opening formation in semiconductor devices

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US13/096,764 Continuation-In-Part US20110270763A1 (en) 2010-04-30 2011-04-28 Methods and apparatus for a financial document clearinghouse and secure delivery network
US15/469,244 Continuation-In-Part US9716595B1 (en) 2010-04-30 2017-03-24 System and method for internet of things (IOT) security and management
US15/668,598 Continuation US9843450B2 (en) 2010-04-30 2017-08-03 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content

Publications (1)

Publication Number Publication Date
US20170187538A1 true US20170187538A1 (en) 2017-06-29

Family

ID=54931802

Family Applications (4)

Application Number Title Priority Date Filing Date
US14/715,588 Active US9356916B2 (en) 2010-04-30 2015-05-18 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/154,861 Active US9578035B2 (en) 2010-04-30 2016-05-13 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/409,427 Abandoned US20170187538A1 (en) 2010-04-30 2017-01-18 System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US15/668,598 Active US9843450B2 (en) 2010-04-30 2017-08-03 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US14/715,588 Active US9356916B2 (en) 2010-04-30 2015-05-18 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/154,861 Active US9578035B2 (en) 2010-04-30 2016-05-13 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/668,598 Active US9843450B2 (en) 2010-04-30 2017-08-03 System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content

Country Status (1)

Country Link
US (4) US9356916B2 (en)

Families Citing this family (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2720398C (en) 2008-04-02 2016-08-16 Twilio Inc. System and method for processing telephony sessions
US8837465B2 (en) 2008-04-02 2014-09-16 Twilio, Inc. System and method for processing telephony sessions
CN102227904A (en) 2008-10-01 2011-10-26 特维里奥公司 Telephony web event system and method
CN102415068B (en) 2009-03-02 2015-09-02 特维里奥公司 For the method and system of many tenants telephone network
US9210275B2 (en) 2009-10-07 2015-12-08 Twilio, Inc. System and method for running a multi-module telephony application
US9270663B2 (en) 2010-04-30 2016-02-23 T-Central, Inc. System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US20120208495A1 (en) 2010-06-23 2012-08-16 Twilio, Inc. System and method for monitoring account usage on a platform
US8838707B2 (en) 2010-06-25 2014-09-16 Twilio, Inc. System and method for enabling real-time eventing
US8649268B2 (en) 2011-02-04 2014-02-11 Twilio, Inc. Method for processing telephony sessions of a network
WO2012162397A1 (en) 2011-05-23 2012-11-29 Twilio, Inc. System and method for connecting a communication to a client
US9648006B2 (en) * 2011-05-23 2017-05-09 Twilio, Inc. System and method for communicating with a client application
US20140044123A1 (en) 2011-05-23 2014-02-13 Twilio, Inc. System and method for real time communicating with a client application
US10182147B2 (en) 2011-09-21 2019-01-15 Twilio Inc. System and method for determining and communicating presence information
US9495227B2 (en) 2012-02-10 2016-11-15 Twilio, Inc. System and method for managing concurrent events
US9602586B2 (en) 2012-05-09 2017-03-21 Twilio, Inc. System and method for managing media in a distributed communication network
US9247062B2 (en) 2012-06-19 2016-01-26 Twilio, Inc. System and method for queuing a communication session
US8737962B2 (en) 2012-07-24 2014-05-27 Twilio, Inc. Method and system for preventing illicit use of a telephony platform
US8938053B2 (en) 2012-10-15 2015-01-20 Twilio, Inc. System and method for triggering on platform usage
US8949594B2 (en) * 2013-03-12 2015-02-03 Silver Spring Networks, Inc. System and method for enabling a scalable public-key infrastructure on a smart grid network
US9282124B2 (en) 2013-03-14 2016-03-08 Twilio, Inc. System and method for integrating session initiation protocol communication in a telecommunications platform
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US9305298B2 (en) * 2013-03-22 2016-04-05 Nok Nok Labs, Inc. System and method for location-based authentication
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US9961077B2 (en) 2013-05-30 2018-05-01 Nok Nok Labs, Inc. System and method for biometric authentication with device attestation
US9225840B2 (en) 2013-06-19 2015-12-29 Twilio, Inc. System and method for providing a communication endpoint information service
US9240966B2 (en) 2013-06-19 2016-01-19 Twilio, Inc. System and method for transmitting and receiving media messages
US9137127B2 (en) 2013-09-17 2015-09-15 Twilio, Inc. System and method for providing communication platform metadata
US9274858B2 (en) 2013-09-17 2016-03-01 Twilio, Inc. System and method for tagging and tracking events of an application platform
US9553799B2 (en) 2013-11-12 2017-01-24 Twilio, Inc. System and method for client communication in a distributed telephony network
US9325624B2 (en) 2013-11-12 2016-04-26 Twilio, Inc. System and method for enabling dynamic multi-modal communication
US9344573B2 (en) 2014-03-14 2016-05-17 Twilio, Inc. System and method for a work distribution service
US9226217B2 (en) 2014-04-17 2015-12-29 Twilio, Inc. System and method for enabling multi-modal communication
US9654469B1 (en) 2014-05-02 2017-05-16 Nok Nok Labs, Inc. Web-based user authentication techniques and applications
US9577999B1 (en) 2014-05-02 2017-02-21 Nok Nok Labs, Inc. Enhanced security for registration of authentication devices
US9413533B1 (en) 2014-05-02 2016-08-09 Nok Nok Labs, Inc. System and method for authorizing a new authenticator
US9251371B2 (en) 2014-07-07 2016-02-02 Twilio, Inc. Method and system for applying data retention policies in a computing platform
US9516101B2 (en) 2014-07-07 2016-12-06 Twilio, Inc. System and method for collecting feedback in a multi-tenant communication platform
US9774687B2 (en) 2014-07-07 2017-09-26 Twilio, Inc. System and method for managing media and signaling in a communication platform
US9246694B1 (en) 2014-07-07 2016-01-26 Twilio, Inc. System and method for managing conferencing in a distributed communication network
US10148630B2 (en) 2014-07-31 2018-12-04 Nok Nok Labs, Inc. System and method for implementing a hosted authentication service
US9749131B2 (en) 2014-07-31 2017-08-29 Nok Nok Labs, Inc. System and method for implementing a one-time-password using asymmetric cryptography
US9875347B2 (en) 2014-07-31 2018-01-23 Nok Nok Labs, Inc. System and method for performing authentication using data analytics
US9455979B2 (en) 2014-07-31 2016-09-27 Nok Nok Labs, Inc. System and method for establishing trust using secure transmission protocols
US9736154B2 (en) 2014-09-16 2017-08-15 Nok Nok Labs, Inc. System and method for integrating an authentication service within a network architecture
EP3210350B1 (en) 2014-10-21 2020-05-20 Twilio, Inc. Method for providing a miro-services communication platform
US9477975B2 (en) 2015-02-03 2016-10-25 Twilio, Inc. System and method for a media intelligence platform
US9948703B2 (en) 2015-05-14 2018-04-17 Twilio, Inc. System and method for signaling through data storage
US10419891B2 (en) 2015-05-14 2019-09-17 Twilio, Inc. System and method for communicating through multiple endpoints
US10341194B2 (en) 2015-10-05 2019-07-02 Fugue, Inc. System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment
CN105610579B (en) * 2016-02-01 2018-10-12 上海凭安网络科技有限公司 A kind of data communication method of protection both sides' privacy of identities of dynamic negotiation identity
CN105763540B (en) * 2016-02-01 2018-10-12 上海凭安网络科技有限公司 A kind of data communication method of protection both sides' privacy of identities
US10659349B2 (en) 2016-02-04 2020-05-19 Twilio Inc. Systems and methods for providing secure network exchanged for a multitenant virtual private cloud
US10063713B2 (en) 2016-05-23 2018-08-28 Twilio Inc. System and method for programmatic device connectivity
US10686902B2 (en) 2016-05-23 2020-06-16 Twilio Inc. System and method for a multi-channel notification service
WO2018017609A1 (en) * 2016-07-18 2018-01-25 Fugue, Inc. Secure asynchronous communications
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10594668B1 (en) 2016-12-01 2020-03-17 Thales Esecurity, Inc. Crypto Cloudlets
US10091195B2 (en) 2016-12-31 2018-10-02 Nok Nok Labs, Inc. System and method for bootstrapping a user binding
US10237070B2 (en) 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US10243731B2 (en) 2017-01-27 2019-03-26 Accenture Global Solutions Limited Hardware blockchain acceleration
US11012441B2 (en) * 2017-06-30 2021-05-18 Open Text Corporation Hybrid authentication systems and methods
CN109818907A (en) * 2017-11-21 2019-05-28 航天信息股份有限公司 One kind being based on UCON model user anonymity access method and system
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
CN107733936B (en) * 2017-12-04 2020-08-07 国家电网公司 Encryption method for mobile data
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11140169B1 (en) * 2018-10-31 2021-10-05 Workday, Inc. Cloud platform access system
CN110751947B (en) * 2018-11-13 2021-05-07 北京嘀嘀无限科技发展有限公司 Method for prompting user, electronic equipment and computer readable storage medium
CN109728903B (en) * 2018-12-22 2021-09-17 复旦大学 Block chain weak center password authorization method using attribute password
US11461498B2 (en) * 2019-02-06 2022-10-04 mSignia, Inc. Systems and methods for secured, managed, multi-party interchanges with a software application operating on a client device
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
CN110188518A (en) * 2019-05-29 2019-08-30 Oppo广东移动通信有限公司 Method for parameter configuration, device, terminal and storage medium
US11177934B2 (en) * 2019-06-05 2021-11-16 Nec Corporation Of America Open processor for operation technology and internet of things
CN110324427A (en) * 2019-07-09 2019-10-11 晏保华 A kind of asynchronous data transaction system, method and device
US11411731B2 (en) 2019-09-03 2022-08-09 Fujitsu Limited Secure API flow
US11461470B2 (en) 2020-06-26 2022-10-04 Bank Of America Corporation System and method for providing an application programming interface (API) based on performance and security
CN113098838B (en) * 2021-02-21 2022-08-26 西安电子科技大学 Trusted distributed identity authentication method, system, storage medium and application
CN112966044B (en) * 2021-02-26 2022-09-02 支付宝(杭州)信息技术有限公司 Data storage method and system of IOT (input/output) equipment based on block chain
US11662716B2 (en) 2021-02-26 2023-05-30 Kla Corporation Secure remote collaboration for equipment in a manufacturing facility
US11595202B1 (en) * 2022-02-09 2023-02-28 My Job Matcher, Inc. Apparatus and methods for mapping user-associated data to an identifier
US11882057B2 (en) 2022-03-28 2024-01-23 Bank Of America Corporation Pluggable cloud security system
CN115065469B (en) * 2022-08-02 2022-11-11 中诚华隆计算机技术有限公司 Data interaction method and device for power internet of things and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831693B2 (en) * 2003-08-18 2010-11-09 Oracle America, Inc. Structured methodology and design patterns for web services
US8069435B1 (en) * 2003-08-18 2011-11-29 Oracle America, Inc. System and method for integration of web services
US8346929B1 (en) * 2003-08-18 2013-01-01 Oracle America, Inc. System and method for generating secure Web service architectures using a Web Services security assessment methodology

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5812671A (en) 1996-07-17 1998-09-22 Xante Corporation Cryptographic communication system
US6941454B1 (en) 1998-10-14 2005-09-06 Lynn Spraggs System and method of sending and receiving secure data with a shared key
US6760752B1 (en) 1999-06-28 2004-07-06 Zix Corporation Secure transmission system
US6584567B1 (en) 1999-06-30 2003-06-24 International Business Machines Corporation Dynamic connection to multiple origin servers in a transcoding proxy
US6996841B2 (en) 2001-04-19 2006-02-07 Microsoft Corporation Negotiating secure connections through a proxy server
US7100054B2 (en) 2001-08-09 2006-08-29 American Power Conversion Computer network security system
US7093121B2 (en) * 2002-01-10 2006-08-15 Mcafee, Inc. Transferring data via a secure network connection
US7624421B2 (en) * 2003-07-31 2009-11-24 Microsoft Corporation Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system
US20050240758A1 (en) 2004-03-31 2005-10-27 Lord Christopher J Controlling devices on an internal network from an external network
US7600011B1 (en) 2004-11-04 2009-10-06 Sprint Spectrum L.P. Use of a domain name server to direct web communications to an intermediation platform
US7571325B1 (en) * 2005-03-14 2009-08-04 Symantec Corporation Remote identification of blocked websites while maintaining user privacy
US7975140B2 (en) 2005-04-08 2011-07-05 Nortel Networks Limited Key negotiation and management for third party access to a secure communication session
US8478986B2 (en) 2005-08-10 2013-07-02 Riverbed Technology, Inc. Reducing latency of split-terminated secure communication protocol sessions
US20070174429A1 (en) 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US7966646B2 (en) * 2006-07-31 2011-06-21 Aruba Networks, Inc. Stateless cryptographic protocol-based hardware acceleration
US20080222736A1 (en) 2007-03-07 2008-09-11 Trusteer Ltd. Scrambling HTML to prevent CSRF attacks and transactional crimeware attacks
US7945246B2 (en) * 2007-10-26 2011-05-17 Sony Ericsson Mobile Communications Ab System and method for establishing authenticated network communications in electronic equipment
US8275984B2 (en) 2008-12-15 2012-09-25 Microsoft Corporation TLS key and CGI session ID pairing
US20120023593A1 (en) 2010-07-26 2012-01-26 Puder George System and method for filtering internet content & blocking undesired websites by secure network appliance
WO2013044284A1 (en) * 2011-09-30 2013-04-04 Abeyweera Ranganath C Method, system and apparatus for a communications client program and an associated transfer server for onymous and secure communications
SG11201405287YA (en) * 2012-04-01 2014-09-26 Authentify Inc Secure authentication in a multi-party system
CN105791272A (en) * 2016-02-23 2016-07-20 青岛海尔智能家电科技有限公司 Method and device for secure communication in Internet of Things

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831693B2 (en) * 2003-08-18 2010-11-09 Oracle America, Inc. Structured methodology and design patterns for web services
US8069435B1 (en) * 2003-08-18 2011-11-29 Oracle America, Inc. System and method for integration of web services
US8346929B1 (en) * 2003-08-18 2013-01-01 Oracle America, Inc. System and method for generating secure Web service architectures using a Web Services security assessment methodology

Also Published As

Publication number Publication date
US9578035B2 (en) 2017-02-21
US20160337361A1 (en) 2016-11-17
US9356916B2 (en) 2016-05-31
US9843450B2 (en) 2017-12-12
US20150381580A1 (en) 2015-12-31
US20170331633A1 (en) 2017-11-16

Similar Documents

Publication Publication Date Title
US9843450B2 (en) System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content
CN111095327B (en) System and method for verifying verifiable claims
CN111316303B (en) Systems and methods for blockchain-based cross-entity authentication
US11038670B2 (en) System and method for blockchain-based cross-entity authentication
CN111095865B (en) System and method for issuing verifiable claims
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
CN111066020B (en) System and method for creating a decentralised identity
CN111213350B (en) System and method for creating decentralized identity
US9455978B2 (en) System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US9100171B1 (en) Computer-implemented forum for enabling secure exchange of information
Ahn et al. Towards scalable authentication in health services
Wang et al. A virtual private network for virtual enterprise information systems

Legal Events

Date Code Title Description
AS Assignment

Owner name: T-CENTRAL, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KRAVITZ, DAVID W.;GRAHAM, DONALD H., III;BOUDETT, JOSSELYN L.;AND OTHERS;SIGNING DATES FROM 20111029 TO 20150910;REEL/FRAME:041011/0661

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION