ROLE-BASED DISTRIBUTED KEY MANAGEMENT

Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester nod...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ACAR TOLGA, JEREZ HENRY N, NGUYEN LAN DUY, ROEDER THOMAS MICHAEL
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ACAR TOLGA
JEREZ HENRY N
NGUYEN LAN DUY
ROEDER THOMAS MICHAEL
description Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester node. The server node determines whether the role of the requester node indicates that the requester node is authorized to request the DKM create or update function. If the requester node's role is authorized to request the DKM create or update function, then the server node performs the requested function. The DKM create or update function may involve a replication function. Public key and trust chains may be derived from physical cryptographic processors, such as TPMs.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2015215118A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2015215118A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2015215118A13</originalsourceid><addsrcrecordid>eNrjZFAN8vdx1XVyDHZ1UXDxDA4J8nQKDQGyvV0jFXwd_RzdXX1d_UJ4GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8aLCRgaGpkaGpoaGFo6ExcaoAJMskGw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ROLE-BASED DISTRIBUTED KEY MANAGEMENT</title><source>esp@cenet</source><creator>ACAR TOLGA ; JEREZ HENRY N ; NGUYEN LAN DUY ; ROEDER THOMAS MICHAEL</creator><creatorcontrib>ACAR TOLGA ; JEREZ HENRY N ; NGUYEN LAN DUY ; ROEDER THOMAS MICHAEL</creatorcontrib><description>Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester node. The server node determines whether the role of the requester node indicates that the requester node is authorized to request the DKM create or update function. If the requester node's role is authorized to request the DKM create or update function, then the server node performs the requested function. The DKM create or update function may involve a replication function. Public key and trust chains may be derived from physical cryptographic processors, such as TPMs.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150730&amp;DB=EPODOC&amp;CC=US&amp;NR=2015215118A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150730&amp;DB=EPODOC&amp;CC=US&amp;NR=2015215118A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ACAR TOLGA</creatorcontrib><creatorcontrib>JEREZ HENRY N</creatorcontrib><creatorcontrib>NGUYEN LAN DUY</creatorcontrib><creatorcontrib>ROEDER THOMAS MICHAEL</creatorcontrib><title>ROLE-BASED DISTRIBUTED KEY MANAGEMENT</title><description>Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester node. The server node determines whether the role of the requester node indicates that the requester node is authorized to request the DKM create or update function. If the requester node's role is authorized to request the DKM create or update function, then the server node performs the requested function. The DKM create or update function may involve a replication function. Public key and trust chains may be derived from physical cryptographic processors, such as TPMs.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFAN8vdx1XVyDHZ1UXDxDA4J8nQKDQGyvV0jFXwd_RzdXX1d_UJ4GFjTEnOKU3mhNDeDsptriLOHbmpBfnxqcUFicmpeakl8aLCRgaGpkaGpoaGFo6ExcaoAJMskGw</recordid><startdate>20150730</startdate><enddate>20150730</enddate><creator>ACAR TOLGA</creator><creator>JEREZ HENRY N</creator><creator>NGUYEN LAN DUY</creator><creator>ROEDER THOMAS MICHAEL</creator><scope>EVB</scope></search><sort><creationdate>20150730</creationdate><title>ROLE-BASED DISTRIBUTED KEY MANAGEMENT</title><author>ACAR TOLGA ; JEREZ HENRY N ; NGUYEN LAN DUY ; ROEDER THOMAS MICHAEL</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2015215118A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ACAR TOLGA</creatorcontrib><creatorcontrib>JEREZ HENRY N</creatorcontrib><creatorcontrib>NGUYEN LAN DUY</creatorcontrib><creatorcontrib>ROEDER THOMAS MICHAEL</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ACAR TOLGA</au><au>JEREZ HENRY N</au><au>NGUYEN LAN DUY</au><au>ROEDER THOMAS MICHAEL</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ROLE-BASED DISTRIBUTED KEY MANAGEMENT</title><date>2015-07-30</date><risdate>2015</risdate><abstract>Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update function. The server node determines the role of the requester node based on a public key of the requester node. The server node determines whether the role of the requester node indicates that the requester node is authorized to request the DKM create or update function. If the requester node's role is authorized to request the DKM create or update function, then the server node performs the requested function. The DKM create or update function may involve a replication function. Public key and trust chains may be derived from physical cryptographic processors, such as TPMs.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2015215118A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ROLE-BASED DISTRIBUTED KEY MANAGEMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T11%3A57%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ACAR%20TOLGA&rft.date=2015-07-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2015215118A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true