×

Trusted signature with key access permissions

  • US 7,853,793 B2
  • Filed: 05/03/2004
  • Issued: 12/14/2010
  • Est. Priority Date: 05/03/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A non-transitory computer-readable medium having computer-readable instructions stored thereon that, upon execution by a processor, cause the processor to:

  • determine a hash value corresponding to information;

    determine, based on a permission policy, whether an application associated with the information has permission to access at least one private key of a plurality of private keys, wherein the plurality of private keys are stored in a hierarchical namespace structure, and further wherein a single permission class of the permission policy is used to control access to the plurality of private keys within different parts of the hierarchical namespace structure; and

    if the application has permission to access the private key, generate a digital signature with the private key, wherein the digital signature is based at least in part on the hash value.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×