Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-way trust formation in distributed system

A trusted, one-way technology, applied in the field of secure communication, which can solve problems such as cumbersome, single point of failure for system administrators or other users

Pending Publication Date: 2021-10-15
日立数据管理有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Additionally, existing techniques may require manual intervention by administrators to upload keys at each site, or may involve implementing a centralized key management server
Centralized key management servers have disadvantages such as creating a single point of failure and manual cross-site key uploads can be a cumbersome task for system administrators or other users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-way trust formation in distributed system
  • Multi-way trust formation in distributed system
  • Multi-way trust formation in distributed system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Some implementations herein relate to techniques and apparatus for establishing trust for securing communications between multiple computing systems in a manner that minimizes administrator intervention and does not employ a centralized key management server. For example, the multiple computing systems may be physically located at different locations, or may otherwise be separate computing systems, and may communicate with each other to form a federation of computing systems such that the separate computing systems can securely communicate with each other, such as exchanging Data, Metadata, and Other Types of Communications. The technique in this paper avoids requiring parties to have administrators upload other parties' public keys and eliminates the need for a centralized key management system. In some cases herein, the trust establishment process can be simplified to include uploading the public certificate on only one site in the multi-computer system federation.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In some examples, a first computing device associated with a first site may receive a certificate of a second computing device associated with a second site that is different from the first site. The first computing device may send, to the second computing device, a credential of a user associated with the second site. In addition, the first computing device may send to the second computing device, a certificate of the first computing device. Furthermore, based at least on authentication of the credential of the user by the second computing device, trusted communications may be established between the first computing device and the second computing device.

Description

technical field [0001] The present disclosure relates to the technical field of secure communication. Background technique [0002] Creating a secure communication channel between two or more computer systems can be challenging. For example, a typical technique for securing communications between two computer systems involves exchanging cryptographic keys between the systems. In some conventional techniques, establishing two-way trust between two computer systems may require the exchange of tokens, or cryptographic keys, etc., in both directions. Additionally, existing techniques may require manual intervention by administrators to upload keys at each site, or may involve implementing a centralized key management server. Centralized key management servers have disadvantages such as creating a single point of failure, and manual cross-site key uploads can be a tedious task for system administrators or other users. Contents of the invention [0003] Some implementations i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/33H04L9/32H04W12/069
CPCG06F21/33H04L63/0823H04W12/069G06F21/606H04L63/0435H04L63/0876H04L63/20
Inventor 安德鲁·托德瓦尔特·沃勒马蒂·库尔马理查德·布拉曼特
Owner 日立数据管理有限公司