FIELD: information technology.
SUBSTANCE: invention relates to the field of user authentication. Method for providing access to one or more computing resources of a provider of computing resources is provided, the method comprising receiving from the authentication side the electronic encoded information containing the message, a message signature and a set of one or more restrictions on the keys obtained based on the secret certificate shared with the authentication party, obtained on the basis of the secret certificate shared with the authentication party, receiving from the master key source a key corresponding to the key zone, calculating a hash value of the message authentication code by inputting a message authentication code into the hash function, determining whether the signature is valid based on the computed value, and granting access to one or more computational resources in the event that the signature is deemed to be valid.
EFFECT: increase the effectiveness of authentication.
29 cl, 24 dwg
Title | Year | Author | Number |
---|---|---|---|
KEY FORMATION DEPENDING ON PARAMETER | 2018 |
|
RU2709162C1 |
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2670778C9 |
KEY GENERATION DEPENDING ON PARAMETER | 2012 |
|
RU2582540C2 |
KEY FORMATION DEPENDING ON PARAMETER | 2012 |
|
RU2636105C1 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY | 2018 |
|
RU2771928C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL | 2006 |
|
RU2391796C2 |
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS | 2005 |
|
RU2378773C2 |
Authors
Dates
2018-10-29—Published
2017-10-09—Filed