FIELD: data processing.
SUBSTANCE: invention relates to a method and a data processing system. Said method comprises the steps of receiving, using a computing device, two or more sub-tokens, each of a fixed size, wherein the sub-tokens together represent a larger token whose size exceeds said fixed size, while a larger token represents data that is immutable as long as the larger token is valid; obtaining a cryptographically strong key and information that identifies a source from which it is possible to obtain the data represented by the larger token, using a computing device from one or more of said sub-tokens; and providing, using a computing device, evidence of the key to the offload provider that includes at least one other computing device that is separate from said computing device, in order to get a portion of data represented by a large token without going through this part of the data through an initiator that provided the above-mentioned sub-tokens.
EFFECT: enabling the offload provider to use large tokens.
17 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
CONTAINER-CONTROLLING AND DISPATCHING SYSTEM | 2019 |
|
RU2751576C2 |
CONTAINER CONTROL AND DISPATCHING SYSTEM | 2015 |
|
RU2704734C2 |
CONTROL AND CONTAINERS DISPATCHING SYSTEM | 2015 |
|
RU2666475C1 |
ADVANCE AUTHORIZATION OF DIGITAL REQUESTS | 2016 |
|
RU2713703C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
DETECTABILITY AND LISTING MECHANISM IN HIERARCHICALLY PROTECTED DATA STORAGE SYSTEM | 2006 |
|
RU2408070C2 |
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS | 2020 |
|
RU2807463C2 |
CRYPTOGRAPHIC MANAGEMENT OF ACCESS TO DOCUMENTS | 2008 |
|
RU2475839C2 |
SAFE DATA ACCESS FOLLOWING STORAGE FAILURE | 2015 |
|
RU2683167C2 |
Authors
Dates
2018-11-19—Published
2013-12-14—Filed