×

Data access control utilizing key restriction

  • US 10,356,062 B2
  • Filed: 11/11/2015
  • Issued: 07/16/2019
  • Est. Priority Date: 03/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining a set of key-use restriction information that includes first key-use restriction information and second key-use restriction information, the second key-use restriction information being different from the first key-use restriction information, each of the set of key-use restriction information being associated with a restriction on use of one or more computing resources;

    the first key-use restriction information and a first key into a function to produce a second key;

    inputting the second key-use restriction information and the second key into the function to produce a signing key; and

    using the signing key to evaluate whether access to the one or more computing resources is to be granted, the set of key-use restriction information for each key of a plurality of keys preventing the access from being granted as a result of a request for the access being submitted out of compliance with the set of key-use restriction information for the signing key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×