白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Obtaining quorum approval to perform an operation with a cryptographic item of a key management system

專利號(hào)
US11159309B2
公開日期
2021-10-26
申請(qǐng)人
Fortanix, Inc.(US CA Mountain View)
發(fā)明人
Jeffrey Seyfried; Jethro Gideon Beekman; Anand Kashyap
IPC分類
H04L9/08
技術(shù)領(lǐng)域
approval,quorum,key,management,operation,may,entities,item,requested,approving
地域: CA CA Mountain View

摘要

A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.

說(shuō)明書

In operation, the key management system 120 may receive a request 101 from the application 130 to perform an operation with a cryptographic item stored at the key management system 120. In response to receiving the request, key management system 120 may identify a quorum policy associated with the cryptographic item. Upon determining that quorum approval is required to perform the operation based on the quorum policy, the key management system 120 may transmit requests for approval 102a-n to entities 110a-n. The key management system 120 may receive indications of approval 103a-n from entities 110a-n. Upon receiving the number of indications of approval specified by the quorum policy, the key management system 120 may perform the requested operation with the cryptographic item. The key management system may subsequently provide the results 104 of the requested operation to application 130. For example, the cryptographic item may be a cryptographic key and the operation may correspond to encrypting or decrypting data with the cryptographic key. The results of the encryption operation or the decryption operation may be the resulting data that is provided to the application 130. In some embodiments, the application 130 may verify a status of the operation at the key management system and may subsequently retrieve the results 104 of the requested operation after the status indicates that the operation has been approved or has been performed. Further details with regards to the key management system 120 are described in conjunction with FIGS. 2-7.

權(quán)利要求

1
微信群二維碼
意見反饋