Message Security Sample Clauses

The Message Security clause establishes requirements and protocols to protect the confidentiality, integrity, and authenticity of messages exchanged between parties. Typically, this involves specifying encryption standards, authentication methods, and procedures for handling sensitive information transmitted via email, messaging platforms, or other electronic means. By setting these standards, the clause helps prevent unauthorized access, data breaches, and tampering, thereby ensuring secure communication and reducing the risk of information compromise.
Message Security. The <MessageSecurity> tag provides the security specifications for the document exchange function. It may be omitted if message security will not be used for this TPA. Message security may be either nonrepudiation or digital envelope or both. Message security applies to all messages in both directions for actions for which message security is enabled. See the discussion of <ServiceSecurity> and <ActionSecurity> below. For each party which is represented by a role parameter in a prototype TPA, the corresponding tags under <Party> must be given values when the role parameter is replaced by an actual name. This must be done under <NonRepudiation> and <DigitalEnvelope>. Nonrepudiation both proves who sent a message and prevents later repudiation of the contents of the message. Digital envelope is an encryption procedure in which the message is encrypted by a secret key and the secret key is sent to the message recipient encrypted with the recipient's public key. The <NonRepudiation> and <DigitalEnvelope> tags are optional. Each must be supplied only if the particular mode will be used. For nonrepudiation, the protocol (e.g. DigitalSignature), protocol version (optional), hash function (e.g. SHA1, MD5) encryption algorithm (see above), signature algorithm (e.g. DSA), and certificate type (see above) must be specified. A public key certificate must be supplied for each party (see below). The <Certificate> tag provides the parameters needed to define the certificates. The <CertType> tag identifies the type of certificate. Examples are X.509V1, X.509V2, and X.509V3. The <KeyLength> tag gives the key length in bits (e.g. 512). All parties must agree on the certificate type and key length. However different type and length may be specified for nonrepudiation and digital envelope. To support nonrepudiation and digital envelope, the TPA must reference the public-key certificate for each party including the arbitrator. Separate certificates can be defined for nonrepudiation and digital envelope. The <Party> tag defines the party-specific parameters. There must be one <Party> subtree for each party. <OrgName> contains an ID reference attribute that points to the corresponding <PartyName> tag. <OrgCertSource> is optional. If present, it provides the URL of a certificate issued by the party itself. <OrgCertSource> can be used only for digital envelope. The <IssuerOrgName> tag under <Party> identifies the certificate issuer, a recognized certificate authority. The value of...