白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Obtaining quorum approval to perform an operation with a cryptographic item of a key management system

專利號
US11159309B2
公開日期
2021-10-26
申請人
Fortanix, Inc.(US CA Mountain View)
發(fā)明人
Jeffrey Seyfried; Jethro Gideon Beekman; Anand Kashyap
IPC分類
H04L9/08
技術領域
approval,quorum,key,management,operation,may,entities,item,requested,approving
地域: CA CA Mountain View

摘要

A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.

說明書

FIG. 7 illustrates an example network server with a key management system to acquire quorum approval to perform an operation on a cryptographic item in accordance with some embodiments of the present disclosure.

FIG. 8 illustrates an example computer system in which embodiments of the present disclosure operate.

DETAILED DESCRIPTION

In general, a key management system may reside in a secure enclave of a computing system that is cryptographically isolated from applications and operating systems executed by the computing system. The key management system may store one or more cryptographic items for various applications. The cryptographic items may be cryptographic keys and/or cryptographic plugins. The key management system may receive requests from applications to perform operations associated with the cryptographic items of the key management system. Such operations may include, but are not limited to, exporting a cryptographic item, encrypting data using the cryptographic item, modifying a cryptographic item, deleting a cryptographic item and/or entity, etc. Generally, performing such operations on a cryptographic item may require a user of the application to have authorization to perform the operations. If the user of the application has the authorization required to perform the operation with the cryptographic item, then the key management system may perform the operation requested by the application.

權利要求

1
微信群二維碼
意見反饋