FIELD: information technology.
SUBSTANCE: method for controlling access to one or more computing resources of a provider of computing resources comprises: receiving, under the control of one or more computer systems operating on the basis of executable instructions, the first delegation request object, the execution of which includes permitting the second entity to gain access to the computing resource; generating a session key based, at least, in part, on the restriction and secret certificate shared with the first entity; providing the session key to the first object; receiving a request access from the second object to access the computing resource. The access request includes a session key provided to the first entity; acknowledgment of the access request based, at least, in part, on the session key contained in the access request; and allowing the second object to access the computing resource.
EFFECT: effective controlling the safety of computing resources.
20 cl, 24 dwg
Title | Year | Author | Number |
---|---|---|---|
KEY GENERATION DEPENDING ON PARAMETER | 2012 |
|
RU2582540C2 |
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2671052C1 |
KEY FORMATION DEPENDING ON PARAMETER | 2018 |
|
RU2709162C1 |
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2670778C9 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL | 2006 |
|
RU2391796C2 |
SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USER USING SECURE AUTHORIZATION SERVER | 2016 |
|
RU2718237C2 |
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS | 2005 |
|
RU2378773C2 |
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY | 2018 |
|
RU2771928C2 |
Authors
Dates
2017-11-20—Published
2012-09-28—Filed