PROTECTED AUTONOMOUS OPERATIONS WITH RESOURCES Russian patent published in 2020 - IPC G06F21/62 G06F21/31 

Abstract RU 2731330 C1

FIELD: computer equipment.

SUBSTANCE: invention relates to computer engineering. Disclosed is a method of performing resource operations, comprising steps of: encrypting, using a resource requestor, authorization information associated with a resource operation, using a user secret key in the form of encrypted authorization information, wherein the resource operation comprises issuing a right of access to the resource requester, and wherein authorization information comprises at least identification information of the authorized user and authorization time stamp information; sending, with the resource requester, the encrypted authorization information and the user public key encrypted using the server terminal secret key, in the form of an encrypted user public key, wherein the user secret key and the user public key are a pair of asymmetric and mutually agreed keys; and, using the resource provider from the resource requester, the encrypted authorization information, and the encrypted user public key; and processing, using resource provider, encrypted user public key using public key of server terminal to form user public key, wherein server terminal private key and server terminal public key are a pair of asymmetric and mutually agreed keys; decrypting, using the resource provider, encrypted authorization information using the user public key to obtain authorization information; using a resource provider, performing a resource operation in accordance with authorization information by issuing a right of access to a resource requester, wherein issuing a right of access to a resource requester comprises an operation with a physical output.

EFFECT: technical result is providing secure operations with resources.

10 cl, 5 dwg

Similar patents RU2731330C1

Title Year Author Number
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER 2018
  • Sheets, John F.
  • Wagner, Kim R.
  • Arora, Sunpreet Singh
  • Best-Rowden, Lacey
  • Jiang, Chunxi
RU2776258C2
IMAGE BASED KEY DERIVATION FUNCTION 2014
  • Aissi, Selim
  • Kgil, Taekho
  • Gaddam, Adzhit
RU2676231C2
CREATING AND VALIDATING CRYPTOGRAPHICALLY SECURED DOCUMENTS 2008
  • Rid Kolin Uilson
RU2500075C2
SECURE REMOTE PAYMENT TRANSACTION PROCESSING 2014
  • Shits Dzhon
  • Vagner Kim
  • Obyue Kristian
  • Lyu Frederik
  • Karpenko Igor
  • Pauell Glenn
  • Pirzadekh Kiushan
RU2674329C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
AUTHORIZATION CONTROL METHOD 2018
  • Chou, Hung-Chien
RU2698424C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
SHARING OF SECRETS WITHOUT TRUSTED INITIALISER 2018
  • Chen, Chaochao
  • Zhou, Jun
RU2728522C1
GATEWAY LEVEL OF ABSTRACTION 2011
  • Kattsin Edvard
  • Karlson Mark
RU2732585C2

RU 2 731 330 C1

Authors

Chen, Ge

Wang, Lei

Shen, Lingnan

Chen, Xing

Dates

2020-09-01Published

2017-12-19Filed