REMOTE AUTHORIZATION FOR OPERATIONS
First Claim
Patent Images
1. A machine-implemented method to execute on a machine, comprising:
- receiving, by the machine, a request for a secret from a remote authorization acquisition service, the secret is used to initiate an operation with a security system;
acquiring, by the machine, the secret from one or more sources; and
causing, by the machine, the secret to be communicated to the remote authorization acquisition service.
15 Assignments
0 Petitions
Accused Products
Abstract
Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service obtains the access key on request from the secure security system when an attempt is made to initiate the secure operation. The authorization acquisition service gains access the access key from a secure store via a secret. That is, the secret store is accessible via the secret. The secret is obtained directly or indirectly from a remote authorization principal over a network.
-
Citations
20 Claims
-
1. A machine-implemented method to execute on a machine, comprising:
-
receiving, by the machine, a request for a secret from a remote authorization acquisition service, the secret is used to initiate an operation with a security system; acquiring, by the machine, the secret from one or more sources; and causing, by the machine, the secret to be communicated to the remote authorization acquisition service. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A machine-implemented method to execute on a machine, comprising:
-
detecting, by the machine, a request for initiating a secure operation; evaluating, by the machine, a policy associated with authorizing the secure operation for initiation; and making, by the machine, a request to an authorization acquisition service to acquire one or more access keys pursuant to the policy from one or more remote authorization principals. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A machine-implemented method to execute on a machine, comprising:
-
receiving, by the machine, a request to initiate a secure operation within a secure system; acquiring, by the machine, multiple keys from multiple different certified crypto officers, each crypto officer having one of the multiple keys and each crypt officer remotely communicating his/her key from a remote geographic location from that geographical location associated with the secure system; using, by the machine, the multiple keys to acquire a secret from a secret store to initiate the secure operation; and initiating, by the machine, the secure operation via the secret. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification