Supercharge Your Innovation With Domain-Expert AI Agents!

System and method for identifying compromised private keys

A technology for private keys and applications, the application cares that the agent can use the leaked private key to sign the field, which can solve the problem of lack of a mechanism for whether the private key has been leaked

Active Publication Date: 2018-11-16
CA TECH INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional systems for verifying digital signatures often lack mechanisms to determine if the private key used for the digital signature has been compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for identifying compromised private keys
  • System and method for identifying compromised private keys
  • System and method for identifying compromised private keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention generally relates to systems and methods for identifying compromised private keys. As will be explained in more detail below, by determining that a private key has been compromised based on analysis of information gathered from publicly available sources, the system described herein can (1) sign the application with a compromised private key by alerting the user , to increase the security of users, (2) to increase the security of signers by warning signers that their private keys have been compromised, and / or (3) to reduce the security of applications signed with compromised private keys. reputation score and / or block the application to improve the security of the application distribution platform.

[0024] will be combined below Figure 1 to Figure 2 , Figure 4 with Figure 5 A detailed description of an exemplary system for identifying compromised private keys is provided. will also combine image 3 A detailed description of the correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer-implemented method for identifying private keys that have been compromised may include (1) identifying a private key that enables a signatory to digitally sign applications, (2) collecting information about the private key from at least one public source, (3) determining, based on the information collected from the public source, that the private key has been compromised and is accessible to unauthorized signatories, and (4) performing a security action in response to determining that the private key has been compromised and is accessible to the unauthorized signatories. Various other methods, systems, and computer-readable media are also disclosed.

Description

Background technique [0001] In the early days of computing, new applications were often installed via physical disks, making it difficult for malicious agents to impersonate legitimate developers. Applications are now commonly downloaded via the Internet from a variety of sources, including websites and application distribution platforms. Unfortunately, fraudulent websites and malicious developers can easily impersonate legitimate developers and applications, potentially causing users to download malicious applications, posing a significant risk to the security of users, systems, and businesses. [0002] Digital signatures are often used to ensure that applications originate from legitimate and trusted developers and not from potentially malicious impersonators. Unfortunately, the trustworthiness of a digital signature is directly proportional to the security of the private key used to generate it. For example, if a private key has been compromised, a malicious agent could u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/56H04L29/06
CPCG06F21/567G06F21/57G06F2221/2115H04L63/126H04L63/1441H04L63/20
Inventor A·瓦达J·毛M·杨
Owner CA TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More