Role-based distributed key management

Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester nod...

Full description

Saved in:
Bibliographic Details
Main Authors Roeder Thomas Michael, Acar Tolga, Nguyen Lan Duy, Jerez Henry N
Format Patent
LanguageEnglish
Published 25.04.2017
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester node. The server node determines whether the role of the requester node indicates that the requester node is authorized to request the DKM create or update function. If the requester node's role is authorized to request the DKM create or update function, then the server node performs the requested function. The DKM create or update function may involve a replication function. Public key and trust chains may be derived from physical cryptographic processors, such as TPMs.
AbstractList Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester node. The server node determines whether the role of the requester node indicates that the requester node is authorized to request the DKM create or update function. If the requester node's role is authorized to request the DKM create or update function, then the server node performs the requested function. The DKM create or update function may involve a replication function. Public key and trust chains may be derived from physical cryptographic processors, such as TPMs.
Author Jerez Henry N
Roeder Thomas Michael
Acar Tolga
Nguyen Lan Duy
Author_xml – fullname: Roeder Thomas Michael
– fullname: Acar Tolga
– fullname: Nguyen Lan Duy
– fullname: Jerez Henry N
BookMark eNrjYmDJy89L5WRQDcrPSdVNSixOTVFIySwuKcpMKi0BsrNTKxVyE_MS01NzU_NKeBhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwpZmxiYWxoZORMRFKANyIKMc
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
ExternalDocumentID US9634831B2
GroupedDBID EVB
ID FETCH-epo_espacenet_US9634831B23
IEDL.DBID EVB
IngestDate Fri Jul 19 15:15:50 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US9634831B23
Notes Application Number: US201514678424
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170425&DB=EPODOC&CC=US&NR=9634831B2
ParticipantIDs epo_espacenet_US9634831B2
PublicationCentury 2000
PublicationDate 20170425
PublicationDateYYYYMMDD 2017-04-25
PublicationDate_xml – month: 04
  year: 2017
  text: 20170425
  day: 25
PublicationDecade 2010
PublicationYear 2017
RelatedCompanies Microsoft Technology Licensing, LLC
RelatedCompanies_xml – name: Microsoft Technology Licensing, LLC
Score 3.09287
Snippet Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to...
SourceID epo
SourceType Open Access Repository
SubjectTerms ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title Role-based distributed key management
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170425&DB=EPODOC&locale=&CC=US&NR=9634831B2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQARZ4yeYpZga6iUkpybomhgZJuhapFpa6qaamiWaJ5hbGBong1RZ-Zh6hJl4RphFMDJmwvTDgc0LLwYcjAnNUMjC_l4DL6wLEIJYLeG1lsX5SJlAo394txNZFDdo7NjQHpUE1Fydb1wB_F39nNWdn29BgNb8gW2A6M7EwNnQCltasoFY06Jh91zAn0KaUAuQaxU2QgS0AaFheiRADU2qeMAOnM-ziNWEGDl_ofDeQCc16xSIMqkH5Oam6oEonRSEFpBJ0URWQDcyECrnwNSyiDApuriHOHrpA--LhfosPDYa7zFiMgQXY5U-VYFAwTAN2Wk2MzNPA17EYWlqkGKakmZiZWVomGZimGhpLMkjiNEYKj5w0AxcokECzIUamMgwsJUWlqbLASrUkSQ4cHABUsnrB
link.rule.ids 230,309,786,891,25594,76906
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQARZ4yeYpZga6iUkpybomhgZJuhapFpa6qaamiWaJ5hbGBong1RZ-Zh6hJl4RphFMDJmwvTDgc0LLwYcjAnNUMjC_l4DL6wLEIJYLeG1lsX5SJlAo394txNZFDdo7NjQHpUE1Fydb1wB_F39nNWdn29BgNb8gW2A6M7EwNnQCltas5qDDeUEtpzAn0KaUAuQaxU2QgS0AaFheiRADU2qeMAOnM-ziNWEGDl_ofDeQCc16xSIMqkH5Oam6oEonRSEFpBJ0URWQDcyECrnwNSyiDApuriHOHrpA--LhfosPDYa7zFiMgQXY5U-VYFAwTAM60cTIPA18HYuhpUWKYUqaiZmZpWWSgWmqobEkgyROY6TwyMkzcHqE-PrE-3j6eUszcIECDDQzYmQqw8BSUlSaKgusYEuS5MBBAwA6Hn2u
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Role-based+distributed+key+management&rft.inventor=Roeder+Thomas+Michael&rft.inventor=Acar+Tolga&rft.inventor=Nguyen+Lan+Duy&rft.inventor=Jerez+Henry+N&rft.date=2017-04-25&rft.externalDBID=B2&rft.externalDocID=US9634831B2