FIELD: computer equipment.
SUBSTANCE: invention relates to computer engineering. Disclosed is a method of performing resource operations, comprising steps of: encrypting, using a resource requestor, authorization information associated with a resource operation, using a user secret key in the form of encrypted authorization information, wherein the resource operation comprises issuing a right of access to the resource requester, and wherein authorization information comprises at least identification information of the authorized user and authorization time stamp information; sending, with the resource requester, the encrypted authorization information and the user public key encrypted using the server terminal secret key, in the form of an encrypted user public key, wherein the user secret key and the user public key are a pair of asymmetric and mutually agreed keys; and, using the resource provider from the resource requester, the encrypted authorization information, and the encrypted user public key; and processing, using resource provider, encrypted user public key using public key of server terminal to form user public key, wherein server terminal private key and server terminal public key are a pair of asymmetric and mutually agreed keys; decrypting, using the resource provider, encrypted authorization information using the user public key to obtain authorization information; using a resource provider, performing a resource operation in accordance with authorization information by issuing a right of access to a resource requester, wherein issuing a right of access to a resource requester comprises an operation with a physical output.
EFFECT: technical result is providing secure operations with resources.
10 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER | 2018 |
|
RU2776258C2 |
IMAGE BASED KEY DERIVATION FUNCTION | 2014 |
|
RU2676231C2 |
CREATING AND VALIDATING CRYPTOGRAPHICALLY SECURED DOCUMENTS | 2008 |
|
RU2500075C2 |
SECURE REMOTE PAYMENT TRANSACTION PROCESSING | 2014 |
|
RU2674329C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
AUTHORIZATION CONTROL METHOD | 2018 |
|
RU2698424C1 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY | 2017 |
|
RU2756048C2 |
SHARING OF SECRETS WITHOUT TRUSTED INITIALISER | 2018 |
|
RU2728522C1 |
GATEWAY LEVEL OF ABSTRACTION | 2011 |
|
RU2732585C2 |
Authors
Dates
2020-09-01—Published
2017-12-19—Filed