发明名称 |
DETECTION OF INVALID ESCROW KEYS |
摘要 |
A secure hash, such as a Hash-based Message Authentication Code ("HMAC"), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach. |
申请公布号 |
EP2803011(A4) |
申请公布日期 |
2015.08.26 |
申请号 |
EP20130735912 |
申请日期 |
2013.01.10 |
申请人 |
MICROSOFT TECHNOLOGY LICENSING, LLC |
发明人 |
RENGANATHAN, VENKATARAMANN;CARVER, BRIAN THOMAS;JUMP, DANIEL BROWNE;LEBLANC, DAVID CHARLES;WEISS, SAMUEL IRA |
分类号 |
H04L9/08;G06F21/64;H04L9/32 |
主分类号 |
H04L9/08 |
代理机构 |
|
代理人 |
|
主权项 |
|
地址 |
|