IDENTITY MANAGEMENT FOR SOFTWARE COMPONENTS
One or more computing devices employs a method that includes requesting a transient credential (e.g., a one-time PKI certificate) as a first identity credential for an application component instance based on a unique identifier associated with the application component instance. The method includes...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
15.09.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | One or more computing devices employs a method that includes requesting a transient credential (e.g., a one-time PKI certificate) as a first identity credential for an application component instance based on a unique identifier associated with the application component instance. The method includes requesting a dynamically-created second identity credential for the application component instance of the application using a request signed (e.g., using the public key of the first identity PKI certificate) based on the transient credential. The method includes receiving the dynamically-created second identity credential and using the dynamically-created second identity credential in a cryptographic function by the application component instance; and managing the replacement of this credential in environments without persistent archival storage accessible by the device/application. |
---|---|
Bibliography: | Application Number: US202217831699 |