Techniques for client constructed sessions
First Claim
1. A computer-implemented method for managing access to one or more computing resources of a computing resource provider, the one or more computing resources of the computing resource provider being part of a logical grouping of computing resources in a key zone of a plurality of key zones, the method comprising:
- under the control of one or more computer systems configured with executable instructions,obtaining, from a central key authority, a session key corresponding to the key zone, the session key having been generated by at least applying a hash-based message authentication code function to a secret credential and a first set of one or more session parameters;
receiving an electronic request to access one or more computing resources and a signature for the electronic request that was generated based at least in part on the secret credential and a second set of one or more session parameters;
generating, by the one or more computer systems, a reference signature by at least applying the hash-based message authentication code function to at least the electronic request, and the obtained session key; and
providing access to the one or more computing resources, in response to the request, when the generated reference signature is equivalent to the received signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information that, as a result of being used to generate the keys, renders the generated keys usable for a smaller scope of uses than the secret credential. Further, key generation may involve multiple invocations of a function where each of at least a subset of the invocations of the function results in a key that has a smaller scope of permissible use than a key produced from a previous invocation of the function. Generated keys may be used as signing keys to sign messages. One or more actions may be taken depending on whether a message and/or the manner in which the message was submitted complies with restrictions of the a key'"'"'s use.
-
Citations
27 Claims
-
1. A computer-implemented method for managing access to one or more computing resources of a computing resource provider, the one or more computing resources of the computing resource provider being part of a logical grouping of computing resources in a key zone of a plurality of key zones, the method comprising:
-
under the control of one or more computer systems configured with executable instructions, obtaining, from a central key authority, a session key corresponding to the key zone, the session key having been generated by at least applying a hash-based message authentication code function to a secret credential and a first set of one or more session parameters; receiving an electronic request to access one or more computing resources and a signature for the electronic request that was generated based at least in part on the secret credential and a second set of one or more session parameters; generating, by the one or more computer systems, a reference signature by at least applying the hash-based message authentication code function to at least the electronic request, and the obtained session key; and providing access to the one or more computing resources, in response to the request, when the generated reference signature is equivalent to the received signature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method for managing access to one or more computing resources of a computing resource provider, the one or more computing resources of the computing resource provider being part of a logical grouping of computing resources in a key zone of a plurality of key zones, comprising:
-
under the control of one or more computer systems configured with executable instructions, obtaining a session key, the session key having been generated by at least applying a function to at least a secret credential and a first set of one or more session parameters, the session key being associated with the key zone; receiving an electronic request to access the one or more computing resources and a signature for the electronic request generated based at least in part on a second set of one or more parameters; determining, by the one or more computer systems, whether the received signature is valid for the request by at least applying the function to at least the electronic request and the obtained session key, the received signature being determined valid as a result of at least the first set of one or more parameters being equivalent to the second set of one or more parameters; and providing the electronically requested access when the generated reference signature is equivalent to the received signature. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed by one or more processors of a computer system, cause the computer system to at least:
-
obtain a session key generated at least in part by application of a function to at least a secret credential and a set of one or more session parameters to generate a session key, the session key corresponding to a grouping of one or more computing resources in a key zone of a plurality of key zones; sign, based at least in part on the obtained session key, electronic requests for access to the one or more computing resources, thereby generating signatures for the request; and submit at least the signatures and the requests for verification by a verifier computing device configured to determine whether the submitted signatures match corresponding submitted requests and take one or more actions that cause the requests for access to be fulfilled when the submitted signatures match the corresponding submitted requests. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer system for providing access to computing resources, comprising:
-
one or more processors; and memory including instructions that, when executed by the one or more processors, cause the computer system to at least; obtain a key; apply a function to the key and to a set of one or more parameters to generate a session key, the one or more parameters corresponding to one or more restrictions on the session key, the session key corresponding to one or more computing resources of a key zone of a plurality of key zones; and provide the generated session key to another computing device to enable the other computing device to sign requests using the session key in accordance with the set of one or more parameters. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification