Auditing secret key cryptographic operations
a cryptographic operation and secret key technology, applied in the field of secret key cryptographic operations, can solve the problems of not being suitable for limiting the repudiation of authorized users, not making the system well-designed, and not being suitable for unauthorized users to access resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016]FIG. 1 illustrates a system 10 wherein access might be controlled. In this example, user workstations 12 obtain secret keys from key servers 14 and use those keys to access application servers 18. Although the only controlled resources explicitly shown in FIG. 1 are application servers, it should be understood that this description could be generalized to any other controlled resource and in some cases, an application server 18 performs the access control for that resource. For example, an application server 18 might provide access control for an application that a user workstation is to execute, but an equivalent server might provide access control for data that the user workstation is to obtain, or access control to a messaging and / or communication system that the user workstation is to access. Examples of applications include computer interfaces, web interfaces, database applications, financial systems and their equivalents, as well as other, unmentioned applications capabl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com