Distribution of security credentials
Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store c...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
16.05.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Techniques regarding the use of digital identity tokens describing a computer application to obtain authorization to confidential data based on one or more policies are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a trusted platform module component that can generate a digital identity token that is bound to a computer application process. The computer executable components can also comprise a key authenticity component that can compare the digital identity token to a security key to retrieve a security credential. |
---|---|
Bibliography: | Application Number: US201916455168 |