FORMING THE KEY DEPENDING ON THE PARAMETER Russian patent published in 2018 - IPC G06F21/33 H04L9/08 H04L9/32 

Abstract RU 2671052 C1

FIELD: information technology.

SUBSTANCE: invention relates to the field of user authentication. Method for providing access to one or more computing resources of a provider of computing resources is provided, the method comprising receiving from the authentication side the electronic encoded information containing the message, a message signature and a set of one or more restrictions on the keys obtained based on the secret certificate shared with the authentication party, obtained on the basis of the secret certificate shared with the authentication party, receiving from the master key source a key corresponding to the key zone, calculating a hash value of the message authentication code by inputting a message authentication code into the hash function, determining whether the signature is valid based on the computed value, and granting access to one or more computational resources in the event that the signature is deemed to be valid.

EFFECT: increase the effectiveness of authentication.

29 cl, 24 dwg

Similar patents RU2671052C1

Title Year Author Number
KEY FORMATION DEPENDING ON PARAMETER 2018
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2709162C1
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth Gregory B.
  • Behm Bradley Jeffery
  • Crahen Eric D.
  • Ilac Cristian M.
  • Fitch Nathan R.
  • Brandwine Eric Jason
  • O'Neill Kevin Ross
RU2670778C9
KEY GENERATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O'Nejll Kevin Ross
RU2582540C2
KEY FORMATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O`Nejll Kevin Ross
RU2636105C1
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY 2018
  • Le Saint, Eric
  • Mohassel, Payman
RU2771928C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL 2006
  • Tarkkala Lauri
RU2391796C2
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS 2005
  • Bach Dzheremi Tomas
  • Su Tszyn'Jan'
  • Narajanan Sankaran
  • Ehjdel'Man Vadim
RU2378773C2

RU 2 671 052 C1

Authors

Roth, Gregory, B.

Behm, Bradley, Jeffery

Crahen, Eric, D.

Ilac, Cristian, M.

Fitch, Nathan, R.

Brandwine, Eric, Jason

O`Neill, Kevin, Ross

Dates

2018-10-29Published

2017-10-09Filed