CN1527963A - Trust grant and revocation from a master key to secondary keys - Google Patents

Trust grant and revocation from a master key to secondary keys Download PDF

Info

Publication number
CN1527963A
CN1527963A CNA018232930A CN01823293A CN1527963A CN 1527963 A CN1527963 A CN 1527963A CN A018232930 A CNA018232930 A CN A018232930A CN 01823293 A CN01823293 A CN 01823293A CN 1527963 A CN1527963 A CN 1527963A
Authority
CN
China
Prior art keywords
code
trust
key
partner
toxinicide
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA018232930A
Other languages
Chinese (zh)
Other versions
CN1326006C (en
Inventor
J・劳斯金德
J·劳斯金德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AMERICAN ON-LINE
Original Assignee
AMERICAN ON-LINE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AMERICAN ON-LINE filed Critical AMERICAN ON-LINE
Publication of CN1527963A publication Critical patent/CN1527963A/en
Application granted granted Critical
Publication of CN1326006C publication Critical patent/CN1326006C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key.

Description

Master key is to the trust grant of secondary key and cancel
Background of invention
Technical field
The present invention relates to safe trust.More specifically, the present invention relates to allow authorize trust to secondary key (secondary key) arbitrarily, and the code that allows equally to be called toxinicide (antidote) by the master key signature is forever cancelled the trust that gives secondary key by the code of master key signature.
Description of the Prior Art
Briefly, computer system is in a kind of like this state, makes each group relatively easily a large amount of codes to be distributed to the great amount of terminals user.For the infringement that the code of protecting them or their product are not subjected to hacker and unknown material, this class group understands application safety mechanism usually.The example of security mechanism is to use the trust (trust) of certificate revocation table (CRL).
In this article, the definition of trust has two parts.First is an identity of setting up the participant.Usually, the participant has the analog by the lertter of introduction of certain other entity signature.Signature so-called licence of entity or CA.Licence or briefly become certificate has been set up participant's name and signature.Other that can exchange use with certificate is master key, super key or system's certificate.Therefore, participant's identity is the lertter of introduction by the CA signature.
Second portion is to trust statement, and it can be the letter that the participant is trusted in statement according to above analog.That is, the first step is to set up participant's identity, and second step provided the agreement (agreement) that this identity is trusted in statement.This identity and agreement operate together and break the wall of mistrust.
From the viewpoint of common computer system, trust the example of carrying out and finish by using CRL.The use of CRL and issued Software Bundling.What distributed software was relevant is system's certificate.This certificate and a plurality of other certificate are arranged in certificate database together.The use of certificate is suitable for being applied in the distribution by the other software of the same issuing entity of distribution first system code.Sometimes, they are called patch.The patch of signature means the software of trusting patch and original signature to the terminal user.
Wish the partner or sell main code and the released together complicacy that can increase another layer of primal system code.In order to make the code of all three types, promptly primal system code, patch and partner's code are seamlessly worked together, and they generally need be by same certificate signature.
Current, have in fault and the situation at partner's code by certificate signature, then system code and its patch in the hole in.Current remedying is to revise partner's code for correction and it is issued once more.But, because wrong partner's code is by the certificate signature, so the right of certificate must be undone.The right of certificate revocation can influence the trust of authorizing to the primal system code of being signed and any patch that it is signed.Need before the partner's code that reissues primal system code, its patch and proofreaied and correct, create second master key or certificate is signed them.
The process of the software that obviously, reissues (primal system and patch) wastes time and energy and too expensive burden often for company.
When the quantity of partner's software was huge, another groundwork of company was exactly to reissue partner's software of having proofreaied and correct, and situation is like this usually.
If the partner of company provides the code that comprises aggressiveness and can not be undone timely and effectively, and the said firm or its partner know that just then this is very disadvantageous for company after its distribution.
R.Sudama, D.M.Griffin, B.Johnson, D.Sealy, the United States Patent (USP) 5 of J.Shelhamer and O.H.Tallman, disclose the method that is used for providing to management server safety practice 619,657 (on April 8th, 1997), it utilizes the trusting relationship database to come the mutual trust between the verification management server to concern.A kind of safe method that provides is provided in this invention, is used for distributing bookkeeping between computer networking component, has used mutual trust, mutual authentication management service network to arrive selected host computer system with serve operations.Common identification and trust build on from submitting to point to each transmission link of the management server of appointment, and the management server request ISP of this appointment carries out the bookkeeping on the selected main frame.
But the trust identification that people such as Sudama require the standard technique of the prior art of querying database to be concerned about does not comprise cancels trust.
M.Gasser, A.C.Goldstein, C.W.Kaufman and B.W.Lampson, U.S. Patent No. 55,224, disclose a kind of method 163 (on June 29th, 1993), it is used for by using dialogue public/private encryption key to entrust from the mandate of another entity of an entity to single calculating dialogue of distributed computing system.Last at computer dialog, private encryption key is eliminated and stops computer dialog.
People such as Gasser propose based on safety interim or dialogue.In addition, the user need prove the workstation with private encryption key of opinion be to be authorized to come representative of consumer to speak.
The trust that provides fabulous, simple and effective method to authorize partner's code before cancelling is favourable.
Allow partner's code by itself, unique certificate signature, and the issue that does not influence by other code of other certificate signature is favourable.
Cancel the sub-key (minor key) of the trust that is used to eliminate partner's code and specify partner's code that new sub-key is proofreaied and correct trust grant or that revise again, rather than to issue or send all codes by the master key signature once more be favourable.
Summary of the invention
A kind of method and apparatus is provided, has mainly increased by two functional elements to the user.First functional elements is to allow code by the master key signature to any secondary key or sub-key vest right or trust.Second functional elements allows to be signed and be called by master key the permanent right that gives specific secondary key of eliminating of code of toxinicide.
Master key only is used for signing minimum code element.These code elements are passed on and are authorized or refuse trust to secondary key.Thereby thereby the code of these parts is very little and very simple guaranteed can not make mistakes in the code do not need to cancel master key.
The idea of toxinicide is, can for good and all refuse the trust to secondary key.In case use toxinicide by reruning the trust code, then secondary key is incited somebody to action failure force forever.From the viewpoint of using, this code snippet is moved to resist found destruction to security as a upgrading.The upgrading of operation toxinicide has prevented that for good and all the user of upgrading is put into notice on the trust code of destroyed.In case destroyed, this makes that the trust of authorizing is good.
Summary of drawings
Fig. 1 illustrates the synoptic diagram according to the belief system of prior art; And
Fig. 2 illustrates the synoptic diagram according to belief system of the present invention.
Embodiment
A kind of method and apparatus is provided, substantially to the user two functional elements.First functional elements is to allow by the code of master key signature to any second or sub-key vest right or trust.Second functional elements allows to be signed and be called by master key the permanent right that gives specific secondary key of eliminating of code of toxinicide.
Master key only is used for signing minimum code element.These code elements are passed on and are authorized or refuse trust to secondary key.Thereby thereby the code of these parts is very little and very simple guaranteed can not make mistakes in the code do not need to cancel master key.
The idea of toxinicide is, can for good and all refuse the trust to secondary key.In case use toxinicide by reruning the trust code, then secondary key is with invalid.From the viewpoint of using, this code snippet is moved to resist found destruction to security as a upgrading.The upgrading of operation toxinicide has prevented that for good and all the user of upgrading is put into notice on the trust code of destroyed.In case destroyed, this makes that the trust of authorizing is good.
Example problem
Can understand the present invention by example problem and its solution.Example is that the client sends software to the terminal user and client's partner wishes can regarding the software that additional software sends to the user as.When client's software and partner's software both during by single master key signature problem produced.
With reference to figure 1, prior art provides master key 100 signature clients' system code 101.After certain time point, the additional patch of client's issue code 102, it is also worked to guarantee all codes harmoniously by master key 100 signature.
When the needs transmission or distribution is relevant with client codes or during the client partner code 103 that increases thereon, master key 100 is also signed partner's code 103.It is dangerous that this signature 104 of being undertaken by master key 100 can be regarded as, because partner's code 103 may have mistake.When partner's code 103 was big code body, this can be special trouble.
When client's release code (101-103) and some partner's code 103 were wrong, problem had produced.Aligning step according to prior art is that the mistake of proofreading and correct in partner's code 103 is also issued all codes (101-103) of issuing before that comprise correction and signed by master key 100 once more subsequently once more.
The solution of example problem
According to preferred embodiment of the present invention, this way to solve the problem is as follows.With reference to figure 2, the partner produces second or sub-key 200.The client provides by the mandate of master key 100 signatures or trusts code 201, and it allows to trust sub-key 200 substantially and has the right that approaches master key 100 substantially.Constitute partner's code 202 of being trusted together by the authorization code 201 of master key 100 signatures and partner's code 103 of signing by sub-key 100.
In order to cancel use by the sub-key authorization code 201 of master key 100 signatures and the trust of creating by partner's code 103 of sub-key 100 signatures, created the code that is called toxinicide code 203, it also is distributed to the user of partner's code 202 of being trusted where necessary by master key 100 signatures.
Provide application programming interface (API) interpolation/elimination of small fragment to trust code 204 to client 205.This API204 is also by master key 100 signatures.Each all visits authorization code 201 and toxinicide code 203 this API and guarantees that system 205 has the ability of adding or eliminating the trust of being authorized by sub-key 200.
According to preferred embodiment of the present invention, its enforcement is as follows.At first, interpolation/elimination trust API204 is added to system 205.Subsequently, the client writes the authorization code 201 of each small fragment of visiting API204 and the toxinicide code 203 of small fragment simply.In preferred embodiment, any API, mandate and toxinicide code by, but be not limited to the code compiling of JavaScript programming language or any other general purpose.
It should be noted that according to the authorizing and cancel outside the foundation structure of standard and carry out of trust of the present invention, as using according to the certificate of prior art and cancelling tabulation.Equally, it should be noted that master key or certificate are to trust code, as relative with another certificate of trust or key according to prior art according to the present invention.
It should be noted that the present invention not the certificate of necessity cancel the standard universal mechanism of tabulation, confirm that thus particular certificate need visit the central area and check and cancel.In preferred embodiment of the present invention, terminal user's download and upgrade, wherein cancelling of trusting carried in this upgrading.
It should be noted that eliminating the toxinicide code 203 of trusting has than authorization code 201 and the higher together right of partner's code 203 of being signed of adding trust.That is, toxinicide code 203 has permanent meaning, when using in the toxinicide code 203 and after, when system 205 runs into by partner's code 202 of the trust of sub-key 200 signatures, system will continue execution cancelling the trust of sub-key 200.
According to preferred embodiment of the present invention, cancelling sub-key 200 backs and when the partner is filled with unbounded confidence to the modification code 103 of issue once more, issuing the interpolation that new sub-key also can recover to trust.
It should be noted that if the client has a plurality of partners then in one embodiment of the invention, each partner can have its distinctive sub-key.
Terminal user's viewpoint
According to prior art, present dialog box to the terminal user, whether the inquiry terminal user trusts the code that will load or move.This dialogue can make the terminal user puzzled usually.
According to preferred embodiment of the present invention, avoided this dialog box.When the terminal user required to add the upgrading that comprises partner's code, in fact the terminal user had received the authorization code of (by master key) signature and partner's code of (by sub-key) signature, and can not receive any inquiry.End-user experience the common no joint working of system code, any additional patch and powerful partner's code.
Though describe the present invention in detail with reference to special preferred embodiment, the technician who has ordinary skill in the present technique field will understand, can carry out the raising of various modifications and do not deviate from the spirit and scope of following claims.

Claims (15)

1. one kind is used for being authorized to any secondary key by master key and trusts and from its method of cancelling described trust of authorizing, it is characterized in that, comprising:
Provide the authorization code of signing by described master key to authorize trust to described any secondary key; And
Provide the toxinicide code of signing by described master key to cancel the described trust of authorizing to described arbitrary key.
2. the method for claim 1 is characterized in that, described toxinicide code is nonvolatil to described the cancelling of described trust of authorizing.
3. the method for claim 1 is characterized in that, the quantity of described authorization code is quite few, and the quantity of wherein said toxinicide code is quite few.
4. the method for claim 1 is characterized in that, described toxinicide code is used as the upgrade software operation with the destruction of antagonism to security.
5. method as claimed in claim 4 is characterized in that, described toxinicide code is Downloadable.
6. the method for claim 1 is characterized in that, comprises a plurality of secondary keys, they each respectively with a plurality of partner entities in one be associated.
7. the method for claim 1 is characterized in that, described mandate and toxinicide code are versatility codes, and with, but be not limited to any the writing among Java language and the JavaScript.
8. one kind is used for being authorized trust and being cancelled the device of described trust of authorizing from it by the partner of master key to system, it is characterized in that, comprising:
Sub-key, it and described partner are associated;
General authorized entity, it and described sub-key are associated, and the described entity of being signed by described master key is used for authorizing trust to described partner;
The antidote,universal entity, it and described sub-key are associated, and the described entity of being signed by described master key is used for cancelling described trust of authorizing from described partner; And
To the interface of described system, it is used for authorizing trust and cancelling its trust to described partner, and described interface is signed by described master key.
9. device as claimed in claim 8 is characterized in that,
Described system comprises system code;
Described partner comprises partner's code;
Described authorized entity comprises general authorization code;
Described toxinicide entity comprises the antidote,universal code; And
Described interface is application programming interfaces (API).
10. device as claimed in claim 8 is characterized in that the application of described toxinicide entity forever has precedence over the application of described authorized entity.
11. device as claimed in claim 8, it is characterized in that, this device be suitable for after time point on add an additional partner, accordingly by the additional sub-key of described master key signature, accordingly by the additional authorization entity of described master key signature with accordingly by the additional toxinicide entity of described master key signature.
12. device as claimed in claim 9 is characterized in that, described mandate and toxinicide code usefulness, but be not limited to, be that any is write among Java language and the JavaScript.
13. device as claimed in claim 8 is characterized in that, the very simple and described toxinicide entity of described authorized entity is very simple, thereby has eliminated the chance of wrong appearance.
14. device as claimed in claim 8 is characterized in that, described authorized entity uses described system interface to realize authorizing of described trust, and described toxinicide entity uses described system interface to realize that the described of described trust of authorizing cancel.
15. device as claimed in claim 8 is characterized in that, described sub-key is created by described partner.
CNB018232930A 2001-05-25 2001-05-25 Trust grant and revocation from a master key to secondary keys Expired - Fee Related CN1326006C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2001/017128 WO2003003176A1 (en) 2001-05-25 2001-05-25 Trust grant and revocation from a master key to secondary keys

Publications (2)

Publication Number Publication Date
CN1527963A true CN1527963A (en) 2004-09-08
CN1326006C CN1326006C (en) 2007-07-11

Family

ID=21742601

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB018232930A Expired - Fee Related CN1326006C (en) 2001-05-25 2001-05-25 Trust grant and revocation from a master key to secondary keys

Country Status (6)

Country Link
EP (1) EP1390828A1 (en)
JP (1) JP2004535118A (en)
CN (1) CN1326006C (en)
AU (1) AU2001263462B2 (en)
CA (1) CA2447649C (en)
WO (1) WO2003003176A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106716343A (en) * 2014-09-25 2017-05-24 电子湾有限公司 Transaction verification through enhanced authentication
US10372518B2 (en) 2017-03-17 2019-08-06 Accenture Global Solutions Limited Extensible single point orchestration system for application program interfaces

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007328473A (en) * 2006-06-07 2007-12-20 Nec Corp Electronic introduction letter preparation system, electronic introduction letter preparation device and electronic introduction letter preparation method to be used for the same
KR20140100908A (en) * 2013-02-07 2014-08-18 페어차일드 세미컨덕터 코포레이션 Secure crypto key generation and distribution

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4919545A (en) * 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
US5224163A (en) * 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5761669A (en) * 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
WO2000077974A1 (en) * 1999-06-11 2000-12-21 Liberate Technologies Hierarchical open security information delegation and acquisition

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106716343A (en) * 2014-09-25 2017-05-24 电子湾有限公司 Transaction verification through enhanced authentication
US10372518B2 (en) 2017-03-17 2019-08-06 Accenture Global Solutions Limited Extensible single point orchestration system for application program interfaces
US10467071B2 (en) 2017-03-17 2019-11-05 Accenture Global Solutions Limited Extensible key management system for application program interfaces

Also Published As

Publication number Publication date
EP1390828A1 (en) 2004-02-25
AU2001263462B2 (en) 2005-09-29
CA2447649A1 (en) 2003-01-09
CN1326006C (en) 2007-07-11
JP2004535118A (en) 2004-11-18
WO2003003176A1 (en) 2003-01-09
CA2447649C (en) 2008-07-29

Similar Documents

Publication Publication Date Title
US8341747B2 (en) Method to provide a secure virtual machine launcher
CA2923740C (en) Software code signing system and method
US7793101B2 (en) Verifiable virtualized storage port assignments for virtual machines
CN100533451C (en) System and method for enhanced layer of security to protect a file system from malicious programs
US20040054889A1 (en) Methods and system for providing a public key fingerprint list in a PK system
US20050166041A1 (en) Authentication in a distributed computing environment
CN1881879A (en) Public key framework and method for checking user
CN1991856A (en) Locking applications for specially marked content
WO2006039771A1 (en) System and method for access control
WO2006093561A2 (en) Secure software communication method and system
CN101065716A (en) Method and device for verifying the integrity of platform software of an electronic device
CN1759402A (en) Hardware-based credential management
WO2023151504A1 (en) Internet of things-based data processing method and apparatus
CN114157432A (en) Digital certificate acquisition method, device, electronic equipment, system and storage medium
US8683198B2 (en) Master key trust grants and revocations for minor keys
CN1527963A (en) Trust grant and revocation from a master key to secondary keys
CN117527180A (en) Quantum password migration resistant method for block chain
US20100138645A1 (en) Method for moving rights objects into other device in digital rights management
AU2001263462A1 (en) Trust grant and revocation from a master key to secondary keys
US7711957B2 (en) Granting access to a computer-based object
WO2023127379A1 (en) Method for installing electronic certificate and system for for installing electronic certificate
US20230053907A1 (en) Method and apparatus for flexible configuration managment using external identity management service
CN114650160B (en) Digital certificate processing method and device, storage medium and electronic equipment
CN101939752B (en) Method and device for managing authorization of right object in digital rights management
CN112385179A (en) Method for monitoring digital certificates

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070711

Termination date: 20100525