发明名称 KEY GENERATION DEPENDING ON PARAMETER
摘要 FIELD: physics, computer engineering.SUBSTANCE: invention relates to computer resource security management. A computer-implemented method of controlling access to computer resources of a provider, wherein one or more computer resources of a computer resource provider are a part of a logical group of computer resources in a key zone from a plurality of key zones, the method comprising: receiving, from the main key source, a session key corresponding to a key zone, wherein the session key is generated at least by applying a hash function of a message authentication code to a secret certificate and the first set of one or more session parameters; receiving an electronic request to access one or more computer resources and a signature for the electronic request, which was generated based, at least in a part, on the secret certificate and the second set of one or more session parameters; generating, using one or more computer systems, a source signature at least by applying a hash function of a message authentication code to at least the electronic request and the received session key; and providing access to one or more computer resources.EFFECT: efficient management of computer resource security.27 cl, 24 dwg
申请公布号 RU2582540(C2) 申请公布日期 2016.04.27
申请号 RU20140117153 申请日期 2012.09.28
申请人 AMAZON TEKNOLODZHIS, INK. 发明人 ROT GREGORI B.;BEKHM BREDLI DZHEFFRI;KRAKHEN ERIK D.;ILAK KRISTIAN M.;FITCH NATAN R.;BRANDUAJN ERIK DZHEJSON;O'NEJLL KEVIN ROSS
分类号 G06F15/16;H04L9/32;H04L29/06 主分类号 G06F15/16
代理机构 代理人
主权项
地址