发明名称 DETECTION OF INVALID ESCROW KEYS
摘要 A secure hash, such as a Hash-based Message Authentication Code ("HMAC"), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.
申请公布号 EP2803011(A4) 申请公布日期 2015.08.26
申请号 EP20130735912 申请日期 2013.01.10
申请人 MICROSOFT TECHNOLOGY LICENSING, LLC 发明人 RENGANATHAN, VENKATARAMANN;CARVER, BRIAN THOMAS;JUMP, DANIEL BROWNE;LEBLANC, DAVID CHARLES;WEISS, SAMUEL IRA
分类号 H04L9/08;G06F21/64;H04L9/32 主分类号 H04L9/08
代理机构 代理人
主权项
地址