CONTROL METHOD, INFORMATION PROCESSING DEVICE, AND CONTROL PROGRAM
Since distributed IDs do not have a control tower like a CA compared to centralized IDs, when a public key is compromised, the problematic public key remains in a repository for a long time, creating a risk of spoofing occurring in secure communication using the key. An information processing device...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Since distributed IDs do not have a control tower like a CA compared to centralized IDs, when a public key is compromised, the problematic public key remains in a repository for a long time, creating a risk of spoofing occurring in secure communication using the key. An information processing device executes processing of: detecting a risk to a first public key managed by a public key repository; performing update restriction of the first public key in response to the detection of the risk; authenticating an authenticator associated with the first public key; and releasing, in a case where the authentication of the authenticator succeeds, the update restriction. With this configuration, in one aspect, it is possible to suppress key update by a third party. |
---|