Remote authorization for operations
First Claim
Patent Images
1. A method, comprising:
- receiving a request for authorization to initiate an operation of a security system;
notifying a remote authorization principal of the request, the remote authorization principal is a user who is certified as a crypto officer for the secure system and the remote authorization principal is not physically and not geographically present at the security system when notified and the remote authorization principal is communicated with over a wide-area-network via a phone of the remote authorization principal, the remote authorization principal is notified via a text message to the phone of the request to initiate the operation and at the same time a voice message is sent to the phone of the remote authorization principal, the voice message indicating that the remote authorization principal is to use a random passkey along with credentials of the remote authorization principal to gain access to a random key generator and acquire a secret;
obtaining the secret in response to the notification;
acquiring an access key in response to the secret;
submitting the access key to the security system to initiate the operation;
notifying one or more additional remote authorization principals of the request;
obtaining one or more additional secrets from the one or more additional remote authorization principals;
acquiring one or more additional access keys in response to the one or more additional secrets; and
submitting the one or more additional access keys to the security system to finalize the initiation of the operation.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service obtains the access key on request from the secure security system when an attempt is made to initiate the secure operation. The authorization acquisition service gains access the access key from a secure store via a secret. That is, the secret store is accessible via the secret. The secret is obtained directly or indirectly from a remote authorization principal over a network.
-
Citations
7 Claims
-
1. A method, comprising:
-
receiving a request for authorization to initiate an operation of a security system; notifying a remote authorization principal of the request, the remote authorization principal is a user who is certified as a crypto officer for the secure system and the remote authorization principal is not physically and not geographically present at the security system when notified and the remote authorization principal is communicated with over a wide-area-network via a phone of the remote authorization principal, the remote authorization principal is notified via a text message to the phone of the request to initiate the operation and at the same time a voice message is sent to the phone of the remote authorization principal, the voice message indicating that the remote authorization principal is to use a random passkey along with credentials of the remote authorization principal to gain access to a random key generator and acquire a secret; obtaining the secret in response to the notification; acquiring an access key in response to the secret; submitting the access key to the security system to initiate the operation; notifying one or more additional remote authorization principals of the request; obtaining one or more additional secrets from the one or more additional remote authorization principals; acquiring one or more additional access keys in response to the one or more additional secrets; and submitting the one or more additional access keys to the security system to finalize the initiation of the operation. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
receiving a request for authorization to initiate an operation of a security system; notifying a remote authorization principal of the request, the remote authorization principal is a user who is certified as a crypto officer for the secure system and the remote authorization principal is not physically and not geographically present at the security system when notified and the remote authorization principal is communicated with over a wide-area-network via a phone of the remote authorization principal, the remote authorization principal is notified via a text message to the phone of the request to initiate the operation and at the same time a voice message is sent to the phone of the remote authorization principal, the voice message indicating that the remote authorization principal is to use a random passkey along with credentials of the remote authorization principal to gain access to a random key generator and acquire a secret; obtaining the secret in response to the notification; acquiring an access key in response to the secret; submitting the access key to the security system to initiate the operation; notifying one or more additional remote authorization principals of the request; obtaining one or more additional secrets from the one or more additional remote authorization principals; and using the one or more additional secrets as additional information used for purposes of acquiring the access key. - View Dependent Claims (7)
-
Specification