Authorization of Computing Devices Using Cryptographic Action Tokens

Methods and apparatuses are described for authorization of computing devices using cryptographic action tokens. Delegation request data, including an identification certificate, an identifier for a second computing device, and action constraints, are received by a delegation system from a first comp...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bisantz Robert C, Grundner James A, Desai Ashish
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Methods and apparatuses are described for authorization of computing devices using cryptographic action tokens. Delegation request data, including an identification certificate, an identifier for a second computing device, and action constraints, are received by a delegation system from a first computing device. A cryptographic action token, including the identifier for the second computing device and the action constraints, is generated by the delegation system. The cryptographic action token is transmitted to the second computing device. An action request specifying an action, the cryptographic action token, and an identification certificate is received by a transaction server. Action data based on the action request and the action constraints are determined by the transaction server. A determination that the action data satisfies the one or more action constraints in the cryptographic action token is made by the transaction server. The action is completed by the transaction server.