×

Protected resource access control utilizing intermediate values of a hash chain

  • US 8,990,905 B1
  • Filed: 09/28/2012
  • Issued: 03/24/2015
  • Est. Priority Date: 09/28/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • associating intermediate values of a hash chain with respective access control intervals;

    providing a given one of the intermediate values to a user in order to allow the user to access a protected resource in the corresponding access control interval;

    providing a final value of the hash chain to an access control module associated with the protected resource; and

    storing an initial value of the hash chain in a secure manner inaccessible to the access control module;

    wherein the final value of the hash chain is further provided to each of one or more additional access control modules associated with respective protected resources; and

    wherein said associating, providing the given one of the intermediate values, providing the final value and storing are performed by at least one processing device comprising a processor coupled to a memory.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×