白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Obtaining quorum approval to perform an operation with a cryptographic item of a key management system

專利號
US11159309B2
公開日期
2021-10-26
申請人
Fortanix, Inc.(US CA Mountain View)
發(fā)明人
Jeffrey Seyfried; Jethro Gideon Beekman; Anand Kashyap
IPC分類
H04L9/08
技術(shù)領(lǐng)域
approval,quorum,key,management,operation,may,entities,item,requested,approving
地域: CA CA Mountain View

摘要

A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.

說明書

As shown in FIG. 7, the network server 700 may include a processing device 710 that may execute an operating system 720. Furthermore, the processing device 710 may include one or more internal cryptographic keys 711 that may be used to encrypt and decrypt data stored in a portion of a memory that is assigned to a secure enclave of the key management system 730. The access to the data of the key management system 730 in the secure enclave (e.g., data stored at a storage resource) may be protected from the one or more applications 740A to 740Z and the operating system 720. For example, the access to the data of the secure enclave corresponding to the key management system 730 may be protected by the use of one of the internal cryptographic keys 711 that are internal to the processing device 710 so that the access to the data is based on a hardware access as opposed to a software access. The operating system 720 may be associated with a first privilege level and the key management system 730 and the applications 740A to 740Z may be associated with a second privilege level where the first privilege level of the operating system is more privileged than the second privilege level of the various applications that are run on the operating system 720 (e.g., the more privileged level allows access to more resources of the network server than the less privileged level). Thus, the operating system 720 may be allowed access to resources of the applications 740A to 740Z. However, since the key management system 730 is assigned to a secure enclave where access to the data of the secure enclave is based on the use of an internal cryptographic key 711 of the processing device 711, the operating system 720 may not be able to access the data of the key management system 730 despite having a more privileged level of access than the key management system 730. The master key that is used to decrypt data at the storage resource may be an internal cryptographic key 711.

權(quán)利要求

1
微信群二維碼
意見反饋