Remote authorization for operations
First Claim
Patent Images
1. A method, comprising:
- receiving a request for authorization to initiate an operation of a security system;
notifying a remote authorization principal of the request;
obtaining a secret in response to the notification;
acquiring an access key in response to the secret; and
submitting the access key to the security system to initiate the operation.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service obtains the access key on request from the secure security system when an attempt is made to initiate the secure operation. The authorization acquisition service gains access the access key from a secure store via a secret. That is, the secret store is accessible via the secret. The secret is obtained directly or indirectly from a remote authorization principal over a network.
-
Citations
28 Claims
-
1. A method, comprising:
-
receiving a request for authorization to initiate an operation of a security system;
notifying a remote authorization principal of the request;
obtaining a secret in response to the notification;
acquiring an access key in response to the secret; and
submitting the access key to the security system to initiate the operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving a request for a secret from a remote authorization acquisition service, wherein the secret is used to initiate an operation with a security system;
acquiring the secret from one or more sources; and
causing the secret to be communicated to the remote authorization acquisition service. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
detecting a request for initiating a secure operation;
evaluating a policy associated with authorizing the secure operation for initiation; and
making a request to an authorization acquisition service to acquire one or more access keys pursuant to the policy from one or more remote authorization principals. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A system, comprising:
-
a secret store; and
an authorization acquisition service, wherein the secret store is to include one or more access keys used by a security system to initiate a secure operation, and wherein the authorization acquisition service is to access the secret store to acquire the one or more access keys in response to one or more secrets obtained from one or more remote authorization principals. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification