×

Key generation for hierarchical data access

  • US 9,215,076 B1
  • Filed: 03/27/2012
  • Issued: 12/15/2015
  • Est. Priority Date: 03/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,obtaining a key-holder key set comprising a key for each key holder of a plurality of key holders, each obtained key having been derived based at least in part on a key-holder key for a corresponding key holder and a set of key-use restrictions;

    calculating, by at least inputting into a function the set of key-use restrictions and a result of performing an operation on the key-holder set, a signing key;

    generating, based at least in part on the signing key, an expected signature for a message submitted in connection with a message signature; and

    transmitting an electronic message that indicates whether the expected signature matches the message signature, the electronic message being usable to evaluate whether access to one or more computing resources is permitted, the set of key-use restrictions preventing the expected signature from matching the message signature when the message signature is submitted out of compliance with the set of key-use restrictions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×