发明名称 SECURITY BREACH MANAGEMENT
摘要 <p>Techniques for handling a breach in security are disclosed. According to one technique, prior to the breach, a first party sends to a second party data that identifies a plurality of public keys, including a current public key that corresponds to a current private key. The second party uses the current public key and the first party uses the current private key to exchange electronic messages securely. Other keys, including a session key, may also be used to ensure the security of the exchange. According to one technique, digital signatures are attached to every outgoing message during the secure exchange, and verified on every incoming message. In response to a breach involving the current private key, (1) the first party invalidates the current private key, (2) the first party sends a message to the second party to instruct the second party to invalidate the current public key, (302) and to establish another public key (304) in the plurality of public keys as a new current public key. After the second party receives the message, the second party uses the new current public key and the first party uses a corresponding new current private key to exchange electronic messages securely.</p>
申请公布号 WO2002054644(A1) 申请公布日期 2002.07.11
申请号 US2002000082 申请日期 2002.01.04
申请人 发明人
分类号 主分类号
代理机构 代理人
主权项
地址
您可能感兴趣的专利