IDENTITY MANAGEMENT FOR SOFTWARE COMPONENTS

One or more computing devices employs a method that includes requesting a transient credential (e.g., a one-time PKI certificate) as a first identity credential for an application component instance based on a unique identifier associated with the application component instance. The method includes...

Full description

Saved in:
Bibliographic Details
Main Authors CHMARA, THOMAS P, KOOPS, LUCAS J, FERGUSON, JON
Format Patent
LanguageEnglish
Published 15.09.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:One or more computing devices employs a method that includes requesting a transient credential (e.g., a one-time PKI certificate) as a first identity credential for an application component instance based on a unique identifier associated with the application component instance. The method includes requesting a dynamically-created second identity credential for the application component instance of the application using a request signed (e.g., using the public key of the first identity PKI certificate) based on the transient credential. The method includes receiving the dynamically-created second identity credential and using the dynamically-created second identity credential in a cryptographic function by the application component instance; and managing the replacement of this credential in environments without persistent archival storage accessible by the device/application.
Bibliography:Application Number: US202217831699