KEY GENERATION DEPENDING ON PARAMETER Russian patent published in 2016 - IPC G06F15/16 H04L29/06 H04L9/32 

Abstract RU 2582540 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer resource security management. A computer-implemented method of controlling access to computer resources of a provider, wherein one or more computer resources of a computer resource provider are a part of a logical group of computer resources in a key zone from a plurality of key zones, the method comprising: receiving, from the main key source, a session key corresponding to a key zone, wherein the session key is generated at least by applying a hash function of a message authentication code to a secret certificate and the first set of one or more session parameters; receiving an electronic request to access one or more computer resources and a signature for the electronic request, which was generated based, at least in a part, on the secret certificate and the second set of one or more session parameters; generating, using one or more computer systems, a source signature at least by applying a hash function of a message authentication code to at least the electronic request and the received session key; and providing access to one or more computer resources.

EFFECT: efficient management of computer resource security.

27 cl, 24 dwg

Similar patents RU2582540C2

Title Year Author Number
KEY FORMATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O`Nejll Kevin Ross
RU2636105C1
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2671052C1
KEY FORMATION DEPENDING ON PARAMETER 2018
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2709162C1
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth Gregory B.
  • Behm Bradley Jeffery
  • Crahen Eric D.
  • Ilac Cristian M.
  • Fitch Nathan R.
  • Brandwine Eric Jason
  • O'Neill Kevin Ross
RU2670778C9
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL 2006
  • Tarkkala Lauri
RU2391796C2
SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USER USING SECURE AUTHORIZATION SERVER 2016
  • Chzhan Dzhenni Tsyan
  • Eldzher Erik G.
  • Bacher Stiven Patrik
RU2718237C2
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS 2005
  • Bach Dzheremi Tomas
  • Su Tszyn'Jan'
  • Narajanan Sankaran
  • Ehjdel'Man Vadim
RU2378773C2
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY 2018
  • Le Saint, Eric
  • Mohassel, Payman
RU2771928C2

RU 2 582 540 C2

Authors

Rot Gregori B.

Bekhm Bredli Dzheffri

Krakhen Erik D.

Ilak Kristian M.

Fitch Natan R.

Branduajn Erik Dzhejson

O'Nejll Kevin Ross

Dates

2016-04-27Published

2012-09-28Filed