×

Private key/public key resource protection scheme

  • US 10,148,433 B1
  • Filed: 10/14/2009
  • Issued: 12/04/2018
  • Est. Priority Date: 10/14/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • securing a resource with an access control mechanism;

    provisioning the secured resource for access by;

    identifying a plurality of users for provisioning, wherein the plurality of users may or may not be present for provisioning,identifying any users of the plurality of users having a public key in the provisioning system,identifying any users of the plurality of users having a public key from a public/private key in a directory external to the provisioning system,notifying the users in the plurality of users that do not have the public/private key pair that provisioning is unavailable and instructing the users to generate a key pair for access to the resource, and provide the key pair to an administrator,modifying the plurality of users for provisioning to include only users that have a public/private key pair but not including users without the public/private key pair, to yield a plurality of users that can be provisioned, andconstructing a public key collection of the public keys in the provisioning system and the public keys retrieved from the directory,encrypting the access control mechanism for the plurality of users that can be provisioned, with the plurality of user public keys in the public key collection;

    having each of the plurality of user private keys associated with the plurality of user public keys protected by an authentication mechanism, such that the access control mechanism is released to make available the secured resource with the user private key, and the user private key is released by the authentication mechanism; and

    in order to add access to the resource to an additional user, decrypting the access control mechanism using an existing private key, adding a new public key of the additional user to the plurality of user public keys, and encrypting the access control mechanism using the plurality of public keys including the new public key of the additional user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×