Method for securing data relating to users of a public-key infrastructure

   
   

The inventive method allows to secure data relating to users of a public key infrastructure who may present certificates (11) at an institution (30) in order to initiate transactions. For this purposes the institution (30) uses and securely stores a secret key or a key pair which is designed for encrypting and decrypting data. Based on an agreement between a certificate holder and the institution (30), corresponding relational data are generated. Then said relational data are encrypted with the institution's (30) secret key or the first key of said key pair. Subsequently the encrypted relational data are integrated into the certificate (11) which preferably adheres to ITU recommendation X.509 version 3. At a later stage, whenever the certificate holder contacts the institution (30) in order to initiate a transaction based on said agreement between the certificate holder and the institution (30), encrypted relational data contained in the certificate (11) is decrypted by means of the secret key or the second key of said key pair of the institution (30). Based on the decrypted relational data, data stored in a directory (33) of the institution (30) can be verified and the requested transaction be performed.

 
Web www.patentalert.com

< Method for publishing certification information certified by a plurality of authorities and apparatus and portable data storage media used to practice said method

< Rolling code security system

> Method and system for soft modem protection

> Method and apparatus for copy protection detection in a video signal

~ 00112