Trust grant and revocation from a master key to secondary keys
A master key and sub-key technology, applied in the field of security trust, can solve problems that do not include revocation of trust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] A method and apparatus are provided, essentially presenting the user with two functional elements. The first functional element is to allow code signed by the master key to grant rights or trust to any second or subkey. The second functional element allows a code signed by the master key and called an antidote to permanently remove the rights given to a particular secondary key.
[0036] The master key is only used to sign extremely small code elements. These code elements convey the grant or denial of trust in the secondary key. The code in these parts is small and simple to ensure that no mistakes can be made in the code and the master key will not need to be revoked.
[0037] The idea of the antidote is that trust in the secondary key can be permanently denied. Once the antidote is applied by re-running the trusted code, the secondary key becomes invalid. From a usage point of view, this code snippet is run as an update against a discovered breach of security. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 