Distribution of security credentials

Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store c...

Full description

Saved in:
Bibliographic Details
Main Authors Jia Jun Brandon Lum, Daniel Pittner, Malgorzata Steinder, Mariusz Sabath
Format Patent
LanguageEnglish
Published 30.03.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential.
Bibliography:Application Number: GB202200390