Authorization of Computing Devices Using Cryptographic Action Tokens
Methods and apparatuses are described for authorization of computing devices using cryptographic action tokens. Delegation request data, including an identification certificate, an identifier for a second computing device, and action constraints, are received by a delegation system from a first comp...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Methods and apparatuses are described for authorization of computing devices using cryptographic action tokens. Delegation request data, including an identification certificate, an identifier for a second computing device, and action constraints, are received by a delegation system from a first computing device. A cryptographic action token, including the identifier for the second computing device and the action constraints, is generated by the delegation system. The cryptographic action token is transmitted to the second computing device. An action request specifying an action, the cryptographic action token, and an identification certificate is received by a transaction server. Action data based on the action request and the action constraints are determined by the transaction server. A determination that the action data satisfies the one or more action constraints in the cryptographic action token is made by the transaction server. The action is completed by the transaction server. |
---|