白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Obtaining quorum approval to perform an operation with a cryptographic item of a key management system

專利號
US11159309B2
公開日期
2021-10-26
申請人
Fortanix, Inc.(US CA Mountain View)
發(fā)明人
Jeffrey Seyfried; Jethro Gideon Beekman; Anand Kashyap
IPC分類
H04L9/08
技術(shù)領(lǐng)域
approval,quorum,key,management,operation,may,entities,item,requested,approving
地域: CA CA Mountain View

摘要

A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.

說明書

As shown in FIG. 1, the environment 100 may correspond to a network cluster or a data center. For example, a first network server may provide the key management system 120 and a second network server may provide an application 130. In some embodiments, a same network server may provide both the application 130 and the key management system 120. The environment may also include entities 110a-n that correspond to computing devices associated with approving entities. The computing devices of entities 110a-n may be computing devices such as a server computer, a desktop computer, a set-top box, a gaming console, a television, a portable computing device such as, and not limited to, mobile telephones, personal digital assistants (PDAs), portable media players, netbooks, laptop computers, an electronic book reader and the like.

A network connection may couple the application 130 with the key management system 120. In some embodiments, the network connection may be a network connection between a network server that provides the application 130 and another network server that provides the key management system 120. In embodiments, the network connection may be a local connection associated with a network server that provides both the application 130 and the key management system 120. A second network connection may couple entities 110a-n with the key management system 120. The network connection may be a network connection between a network server that provides the key management system 120 and client devices associated with entities 110a-n. Entities 110a-n may be approving entities that may approve or reject operations to be performed on cryptographic items of the key management system.

權(quán)利要求

1
微信群二維碼
意見反饋