×

Security breach management

  • US 20020106085A1
  • Filed: 01/05/2001
  • Published: 08/08/2002
  • Est. Priority Date: 01/05/2001
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for handling a breach in security, the method comprising the steps of:

  • prior to the breach, a first party sending to a second party data that identifies a plurality of public keys, including a current public key that corresponds to a current private key;

    prior to the breach, the second party using said current public key and the first party using the current private key to exchange electronic messages securely;

    in response to the breach, performing the steps of the first party invalidating said current private key;

    the first party sending a message to said second party to instruct said second party to invalidate said current public key, and to establish another public key in said plurality of public keys as a new current public key;

    after said second party receives said message, said second party using said new current public key and said first party using a corresponding new current private key to exchange electronic messages securely.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×