×

Parameter based key derivation

  • US 9,178,701 B2
  • Filed: 09/29/2011
  • Issued: 11/03/2015
  • Est. Priority Date: 09/29/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing access to one or more computing resources of a computing resource provider, the one or more computing resources of the computing resource provider being part of a logical grouping of computing resources in a key zone of a plurality of key zones, the method comprising:

  • under the control of one or more computer systems configured with executable instructions,receiving, from an authenticating party, electronic information encoding a message, a signature for the message, and a set of one or more restrictions on keys derived from a secret credential shared with the authenticating party, the signature being determinable by applying a hash-based message authentication code function to the message, the secret credential, and the set of one or more restrictions, but also being undeterminable having only the hash-based message authentication code function but without having the set of one or more restrictions;

    obtaining, from a central key authority, a key corresponding to the key zone, the key being generated at least in part using at least a subset of the set of one or more restrictions;

    calculating, by the one or more computer systems, a value of a hash-based message authentication code function by at least inputting into the hash-based message authentication code function;

    first input based at least in part on the obtained key; and

    second input based at least in part on the set of one or more restrictions;

    determining, by the one or more computer systems and based at least in part on the calculated value, whether the signature is valid; and

    providing access to the one or more computing resources when determined that the signature is valid.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×