CONTROL METHOD, INFORMATION PROCESSING DEVICE, AND CONTROL PROGRAM

Since distributed IDs do not have a control tower like a CA compared to centralized IDs, when a public key is compromised, the problematic public key remains in a repository for a long time, creating a risk of spoofing occurring in secure communication using the key. An information processing device...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: YAMAMOTO, Dai, YASAKI, Koichi
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Since distributed IDs do not have a control tower like a CA compared to centralized IDs, when a public key is compromised, the problematic public key remains in a repository for a long time, creating a risk of spoofing occurring in secure communication using the key. An information processing device executes processing of: detecting a risk to a first public key managed by a public key repository; performing update restriction of the first public key in response to the detection of the risk; authenticating an authenticator associated with the first public key; and releasing, in a case where the authentication of the authenticator succeeds, the update restriction. With this configuration, in one aspect, it is possible to suppress key update by a third party.