KEY FORMATION DEPENDING ON PARAMETER Russian patent published in 2017 - IPC G06F21/33 G06F15/16 H04L29/06 H04L9/32 

Abstract RU 2636105 C1

FIELD: information technology.

SUBSTANCE: method for controlling access to one or more computing resources of a provider of computing resources comprises: receiving, under the control of one or more computer systems operating on the basis of executable instructions, the first delegation request object, the execution of which includes permitting the second entity to gain access to the computing resource; generating a session key based, at least, in part, on the restriction and secret certificate shared with the first entity; providing the session key to the first object; receiving a request access from the second object to access the computing resource. The access request includes a session key provided to the first entity; acknowledgment of the access request based, at least, in part, on the session key contained in the access request; and allowing the second object to access the computing resource.

EFFECT: effective controlling the safety of computing resources.

20 cl, 24 dwg

Similar patents RU2636105C1

Title Year Author Number
KEY GENERATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O'Nejll Kevin Ross
RU2582540C2
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2671052C1
KEY FORMATION DEPENDING ON PARAMETER 2018
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2709162C1
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth Gregory B.
  • Behm Bradley Jeffery
  • Crahen Eric D.
  • Ilac Cristian M.
  • Fitch Nathan R.
  • Brandwine Eric Jason
  • O'Neill Kevin Ross
RU2670778C9
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL 2006
  • Tarkkala Lauri
RU2391796C2
SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USER USING SECURE AUTHORIZATION SERVER 2016
  • Chzhan Dzhenni Tsyan
  • Eldzher Erik G.
  • Bacher Stiven Patrik
RU2718237C2
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS 2005
  • Bach Dzheremi Tomas
  • Su Tszyn'Jan'
  • Narajanan Sankaran
  • Ehjdel'Man Vadim
RU2378773C2
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY 2018
  • Le Saint, Eric
  • Mohassel, Payman
RU2771928C2

RU 2 636 105 C1

Authors

Rot Gregori B.

Bekhm Bredli Dzheffri

Krakhen Erik D.

Ilak Kristian M.

Fitch Natan R.

Branduajn Erik Dzhejson

O`Nejll Kevin Ross

Dates

2017-11-20Published

2012-09-28Filed