×

Contribution signatures for tagging

  • US 10,536,277 B1
  • Filed: 12/22/2015
  • Issued: 01/14/2020
  • Est. Priority Date: 12/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, to a resource management service, a first request to provision a resource in a multi-tenant environment and on behalf of a customer, the first request including a first key-value pair to be applied to the resource on behalf of the customer, the first key-value pair and the first request both digitally signed using a customer cryptographic key;

    determining an additional service to perform a task with respect to the first request;

    generating, via the resource management service, a second request including a second key-value pair to be added to the resource on behalf of the resource management service, the second key-value pair and the second request both digitally signed using a resource management cryptographic key for the resource management service, the second request including the first request and the first key-value pair both digitally signed using the customer cryptographic key;

    forwarding the second request to the additional service;

    generating, by the additional service, a third request digitally signed using a service cryptographic key for the additional service, the third request including the second key-value pair and the second request, digitally signed using the resource management cryptographic key, and the first key-value pair and the first request, digitally signed using the customer cryptographic key;

    causing the third request to be provided to a notation service of the multi-tenant environment;

    determining, from the third request and by the notation service, the first key-value pair and the second key-value pair to be applied to the resource;

    determining that the first key-value pair is digitally signed using the customer cryptographic key and the second key-value pair is digitally signed using the resource management cryptographic key;

    validating respective digital signatures for the customer cryptographic key, the resource management cryptographic key, and the service cryptographic key contained in the third request to verify contents of the third request;

    causing the notation service to apply the first key-value pair and the second key-value pair to the resource; and

    provisioning the resource in the multi-tenant environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×