Unlock instant, AI-driven research and patent intelligence for your innovation.

Security model for distributed computing system

a distributed computing system and security model technology, applied in the field of distributed computing system security model management and security model, can solve the problems of network latency, system overall quantity may increase, decentralisation itself may be problematic, etc., and achieve the effect of a highly efficient and scalable method

Pending Publication Date: 2022-10-06
MASTERCARD INT INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a way to assign a key to a cryptographic process in a way that works well with distributed computing systems. By using a specific process, it is easy to identify which key was used in a particular case. This method makes it highly efficient and scalable. The computing node can be one of multiple nodes in the system, and the service request can come from a client associated with that node.

Problems solved by technology

There are multiple technical challenges with requiring a centralized system to provide services to a very large number of clients, particularly when these are widely geographically distributed.
Decentralisation may itself be problematic, particularly if it is necessary for services to be provided in such a way that provision of the service has consequences beyond the server providing the service and the client receiving it.
If, for example, other clients (or other system nodes) need to refer back to the service providing node to check on whether, or how, the service has been provided, or if it is necessary for a central system to have knowledge of how the service has been provided or of performance of the distributed server node, then new bottlenecks may appear in place of the former bottleneck at the central server, the overall quantity of messaging in the system may increase, and network latency can become a serious issue.
This is particular serious when the service relates to security (so it is necessary to be confident that it has been securely performed across the whole system) and when it relates to provision of a service over a short time frame.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security model for distributed computing system
  • Security model for distributed computing system
  • Security model for distributed computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014]Specific embodiments of the disclosure are now described, by way of example, with reference to the accompanying drawings, of which:

[0015]FIG. 1 shows multiple clients interacting with a central server;

[0016]FIG. 2 shows multiple clients interacting with a distributed computing architecture providing the same services as the central server of FIG. 1;

[0017]FIG. 3 shows schematically a distributed transaction architecture using a four party model;

[0018]FIG. 4 illustrates elements of a complex distributed system adapted to implement the transaction architecture of FIG. 3;

[0019]FIG. 5 shows schematically an exemplary system for enabling digital transactions in the transaction architecture of FIGS. 3 and 4;

[0020]FIG. 6 illustrates schematically an arrangement for a distributed system for digital enablement of transactions;

[0021]FIG. 7 illustrates a computing node of the arrangement of FIG. 6 in more detail;

[0022]FIG. 8 illustrates elements within the computing node of FIG. 7;

[0023]F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for a computing node to provide a cryptographic key in response to a service request, the method comprising: establishing a key list, wherein the key list comprises key identifiers for a plurality of keys; receiving a service request and identifying that a key is required in response to the service request; and using a deterministic process from data associated with the service request to allocate one of the key identifiers and hence the key associated with said one of the key identifiers to the service request. A suitably configured computing node is also described.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application is based on and claims benefit of and priority to European Patent Application Serial Nos. 19178579.9 filed on Jun. 5, 2019 and 19178583.1 filed on Jun. 5, 2019, the contents of which are hereby incorporated in their entireties for all purposes.FIELD OF DISCLOSURE[0002]The present disclosure relates to management of credentials and to a security model for use in a distributed computing system. The disclosure is particularly relevant to a distributed system that has a very large number of clients that require credentials associated with use of the system.BACKGROUND TO DISCLOSURE[0003]There are multiple technical challenges with requiring a centralized system to provide services to a very large number of clients, particularly when these are widely geographically distributed. It is logical to consider distributing the system so that the relevant services can be provided by a set of geographically distributed servers, rather th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L69/14
CPCH04L9/0819H04L9/085G06F21/34G16Y40/30H04L9/14H04L9/0822H04L2209/56H04L9/0891H04L63/06H04L2463/102H04L63/0846G06Q20/3829H04L9/0858H04L9/0861H04L9/32
Inventor COLLINGE, MEHDILAAZIMANI, OMAR
Owner MASTERCARD INT INC