Secure private key distribution between endpoint instances

A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. T...

Full description

Saved in:
Bibliographic Details
Main Authors Gerald McBrearty, Thomas Duerr, Georg Ochs, Stephen Soohoo, Michael Beck, Martin Smolny
Format Patent
LanguageEnglish
Published 04.01.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.
Bibliography:Application Number: GB20220015019