Distribution of security credentials

Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store c...

Full description

Saved in:
Bibliographic Details
Main Authors Lum, Jia Jun Brandon, Steinder, Malgorzata, Pittner, Daniel, Sabath, Mariusz
Format Patent
LanguageEnglish
Published 16.05.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential.
Bibliography:Application Number: US201916455168