Unlock instant, AI-driven research and patent intelligence for your innovation.

Trust grant and revocation from a master key to secondary keys

A master key and sub-key technology, applied in the field of security trust, can solve problems that do not include revocation of trust

Inactive Publication Date: 2007-07-11
AOL LLC A DELAWARE LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, Sudama et al. require that the state-of-the-art technique of interrogating the database is concerned with trust identification that does not include revoking trust

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust grant and revocation from a master key to secondary keys
  • Trust grant and revocation from a master key to secondary keys
  • Trust grant and revocation from a master key to secondary keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] A method and apparatus are provided, essentially presenting the user with two functional elements. The first functional element is to allow code signed by the master key to grant rights or trust to any second or subkey. The second functional element allows a code signed by the master key and called an antidote to permanently remove the rights given to a particular secondary key.

[0036] The master key is only used to sign extremely small code elements. These code elements convey the grant or denial of trust in the secondary key. The code in these parts is small and simple to ensure that no mistakes can be made in the code and the master key will not need to be revoked.

[0037] The idea of ​​the antidote is that trust in the secondary key can be permanently denied. Once the antidote is applied by re-running the trusted code, the secondary key becomes invalid. From a usage point of view, this code snippet is run as an update against a discovered breach of security. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key.

Description

technical field [0001] The present invention relates to security trust. More specifically, the invention relates to allowing code signed by a master key to grant trust to an arbitrary secondary key, and allowing code also signed by the master key, called an antidote, to permanently revoke the trust given to a secondary key. key trust. Background technique [0002] Simply put, computer systems are in such a state that it is relatively easy for parties to distribute large amounts of code to large numbers of end users. To protect their code or their products from hackers and unknowns, such groups usually apply security mechanisms. An example of a security mechanism is a trust using a certificate revocation list (CRL). [0003] In this article, the definition of trust has two parts. The first part is establishing the identity of the participant. Typically, participants have an analog of a letter of introduction signed by some other entity. The signing entity is often refer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00H04L9/08G06F21/51H04L9/32
CPCG06F21/51
Inventor J·劳斯金德
Owner AOL LLC A DELAWARE LLC