白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Obtaining quorum approval to perform an operation with a cryptographic item of a key management system

專利號
US11159309B2
公開日期
2021-10-26
申請人
Fortanix, Inc.(US CA Mountain View)
發(fā)明人
Jeffrey Seyfried; Jethro Gideon Beekman; Anand Kashyap
IPC分類
H04L9/08
技術(shù)領(lǐng)域
approval,quorum,key,management,operation,may,entities,item,requested,approving
地域: CA CA Mountain View

摘要

A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.

說明書

However, allowing a single user to have authorization to unilaterally perform operations on the cryptographic items stored at the key management system may compromise the security of the cryptographic items. For example, a malicious administrator having the required authorization may delete cryptographic items stored at the key management system. Thus, if another user of an application seeks to perform an operation with a cryptographic item that the malicious administrator has deleted, then the key management system would not be able to perform the operation as the cryptographic item has been deleted. In another example, an administrator system may be compromised by malicious software (e.g., malware) that may utilize the authorization of the administrator system to export cryptographic keys stored at the key management system. As a result, a malicious entity may receive the cryptographic keys that were intended to be secure and may thus compromise the security of other applications that use the cryptographic keys in other operations.

權(quán)利要求

1
微信群二維碼
意見反饋