白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Obtaining quorum approval to perform an operation with a cryptographic item of a key management system

專利號
US11159309B2
公開日期
2021-10-26
申請人
Fortanix, Inc.(US CA Mountain View)
發(fā)明人
Jeffrey Seyfried; Jethro Gideon Beekman; Anand Kashyap
IPC分類
H04L9/08
技術(shù)領(lǐng)域
approval,quorum,key,management,operation,may,entities,item,requested,approving
地域: CA CA Mountain View

摘要

A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.

說明書

In operation, the key management system 730 may be hosted on a network server with the applications 740A to 740Z. The application may request to perform an operation on a cryptographic item stored in the secure enclave of the key management system 730. Upon receiving the required number of approvals to perform the operation, the operation may be performed on the cryptographic item. The processing device 710 may use an instruction to use one of its internal cryptographic keys 711 that is based on the identification of the key management system 730 to perform the operation on the cryptographic item stored in the memory of the secure enclave of the key management system 730. For example, the cryptographic item may be decrypted when read from the storage 751 or memory 752 associated with the processing device 710 or at another storage resource over a network 750 (e.g., at a storage device of the storage resource) and exported to the application. Although FIG. 7 illustrates that the key management system 730 may provide secure cryptographic item management for an application 740A to 740Z on the same network server, the key management system 730 may alternatively be hosted by another network server or may be hosted by another network server that is external to any data center or network cluster that includes the network servers hosting applications 740A to 740Z.

權(quán)利要求

1
微信群二維碼
意見反饋