MULTIFUNCTIONAL IDENTIFICATION OF A VIRTUAL COMPUTING NODE Russian patent published in 2019 - IPC G06F21/44 H04L29/06 

Abstract RU 2679188 C2

FIELD: cryptography.

SUBSTANCE: invention relates to credentials checked by a cryptographic method, selected in the corresponding namespace, for a virtual computing node in the provider's networks. System for assigning, managing and using credentials that are verified by a cryptographic method, contains a set of virtual hosts of the virtual computing services of the provider's network, which contain the first virtual host containing one or more virtual computing nodes, while the virtual computing node provides information about the first identity verified by a cryptographic method (CVI) assigned to a specific virtual computing node inside the first virtual node identity namespace (IIN) in response to the first identity request from the first authenticator associated with the first application performs one or more operations of the first application in response to determining that the first CVI was received by the first authenticator, provides information on different CVIs assigned to the first virtual computing node within different IINs, in response to a second credential request from the second authenticator associated with the second application, and performs one or more operations of the second application in response to determining that the second CVI was received by the second authenticator.

EFFECT: providing support for secure mechanisms used to verify identity issued to a resource.

15 cl, 9 dwg

Similar patents RU2679188C2

Title Year Author Number
KEY FORMATION DEPENDING ON PARAMETER 2018
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2709162C1
KEY FORMATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O`Nejll Kevin Ross
RU2636105C1
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2671052C1
KEY GENERATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O'Nejll Kevin Ross
RU2582540C2
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth Gregory B.
  • Behm Bradley Jeffery
  • Crahen Eric D.
  • Ilac Cristian M.
  • Fitch Nathan R.
  • Brandwine Eric Jason
  • O'Neill Kevin Ross
RU2670778C9
PROVIDING DEVICES AS SERVICE 2014
  • Fitzgerald, Robert Eric
  • Doane, Andrew J.
  • Schoof, Alexander Edward
  • Helma, Christopher Steven
  • Min, Rui
  • Estes, Matthew A.
  • Mishra, Anand
RU2763314C2
PROVIDING DEVICES AS SERVICE 2014
  • Fittszherald Robert Erik
  • Douen Endryu Dzh.
  • Skuf Aleksander Edvard
  • Khelma Kristofer Stiven
  • Min Rui
  • Estes Mettyu A.
  • Mishra Anand
RU2648956C2
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
SECURE AND PRIVATE BACKUP STORAGE AND PROCESSING FOR TRUSTED COMPUTING AND DATA SERVICES 2010
  • Auradkar Rakhul V.
  • D`Suza Roj Piter
RU2531569C2
CONTAINER-CONTROLLING AND DISPATCHING SYSTEM 2019
  • Sinkh, Dipak
  • Suares, Entoni Dzhozef
  • Serston, Uilyam Endryu
  • Ajtal, Anirudkh Balachandra
  • Gerdesmajer, Deniel Robert
  • Kemp, Euan Skajler
  • Meduri, Kiran Kumar
  • Azad, Mukhammad Umer
RU2751576C2

RU 2 679 188 C2

Authors

Cignetti, Todd Lawrence

Bowen, Peter Zachary

Doane, Andrew Jeffrey

Schoof, Alexander Edward

Dates

2019-02-06Published

2015-12-18Filed