FIELD: computer engineering.
SUBSTANCE: invention is aimed to increase the security of the network and/or resources associated with it. It is achieved due to the fact that a token request from an application running in the first computing environment can be received in the second computing environment. The second computing environment may assign a trust level to the received token request that indicates that the first computing environment may not be trusted. The token request along with the trust level may be provided to the authorization server to generate an authorization token that includes a trust indicator indicating the trust level of the second computing environment. When an application running on a second computing environment passes an authorization token to a resource manager to access a resource, the resource manager may be configured to take precautionary actions to protect the resource before granting access, such as creating a backup copy of the resource.
EFFECT: increase in the security of the network and/or resources associated with it.
15 cl, 7 dwg
Title | Year | Author | Number |
---|---|---|---|
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF | 2014 |
|
RU2672712C2 |
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE | 2014 |
|
RU2675902C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF | 2014 |
|
RU2673969C2 |
MEANS OF CONTROLLING ACCESS TO ONLINE SERVICE USING CONVENTIONAL CATALOGUE FEATURES | 2011 |
|
RU2598324C2 |
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY | 2017 |
|
RU2755880C2 |
DRILLING RIG CONTROL SYSTEM | 2016 |
|
RU2667545C1 |
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION | 2005 |
|
RU2390945C2 |
SYSTEM AND METHOD FOR AUTOMATED DRILLING NETWORK | 2018 |
|
RU2780964C2 |
IMPLEMENTING SECURE INFORMATION EXCHANGE IN RUNTIME SYSTEM | 2012 |
|
RU2584570C2 |
Authors
Dates
2023-11-15—Published
2020-04-13—Filed