FIELD: data replication.
SUBSTANCE: method includes encrypting a session key according to an attribute-based encryption scheme, broadcasting the encrypted session key on a network, receiving at least one message encrypted using the session key from at least one network node on the network, and selecting a network node from at least one network node on which data will be replicated.
EFFECT: technical result is an increase in the security of authenticated resource detection, where data can be replicated if specific requirements of the policy, rules and directives are met.
16 cl, 11 dwg
Title | Year | Author | Number |
---|---|---|---|
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY | 2017 |
|
RU2756048C2 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
SYSTEM AND METHOD FOR VIRTUALISATION OF MOBILE NETWORK FUNCTION | 2014 |
|
RU2643451C2 |
SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT | 2017 |
|
RU2738021C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
METHOD, DEVICE AND SYSTEM FOR UPDATING A BOND KEY IN A COMMUNICATION NETWORK FOR ENCODED COMMUNICATION WITH PROVISION APPLICATIONS | 2020 |
|
RU2801267C1 |
METHOD FOR DECENTRALIZED DISTRIBUTION OF KEY INFORMATION | 2019 |
|
RU2716207C1 |
DYNAMIC SECURE COMMUNICATION NETWORK AND PROTOCOL | 2016 |
|
RU2769216C2 |
ADMINISTRATION OF SECURE DEVICES | 2010 |
|
RU2557756C2 |
Authors
Dates
2021-09-29—Published
2017-07-27—Filed