ASYMMETRIC SESSION CREDENTIALS
    2.
    发明申请

    公开(公告)号:US20180145835A1

    公开(公告)日:2018-05-24

    申请号:US15875995

    申请日:2018-01-19

    Abstract: Techniques for using short-term credentials using asymmetric session keys are described herein. A request for a short-term credential is received that is digitally signed with a different credential. In response to the request, short-term credential data is generated and populated with a public session key corresponding to a private session key. The short-term credential data is then encrypted with a session encryption key to produce the short-term credential token, which can then be used by the requester as a short-term credential for subsequent requests.

    Asymmetric session credentials
    3.
    发明授权

    公开(公告)号:US10680827B2

    公开(公告)日:2020-06-09

    申请号:US15875995

    申请日:2018-01-19

    Abstract: Techniques for using short-term credentials using asymmetric session keys are described herein. A request for a short-term credential is received that is digitally signed with a different credential. In response to the request, short-term credential data is generated and populated with a public session key corresponding to a private session key. The short-term credential data is then encrypted with a session encryption key to produce the short-term credential token, which can then be used by the requester as a short-term credential for subsequent requests.

    Personalizing global session identifiers

    公开(公告)号:US10182044B1

    公开(公告)日:2019-01-15

    申请号:US14958892

    申请日:2015-12-03

    Abstract: Techniques for personalizing short-term session credentials are described herein. A global session key is provided to a plurality of regions of a computing resource service provider and an account key is also provided to one or more of the plurality of regions based at least in part on those regions being trusted by a customer of the computing resource service provider. When a request for short-term session credentials is received at the trusted region by that customer, a session token is generated and encrypted with a combination of the global session key and the account key, thereby creating a session token that can be uniquely associated with the customer and that may only be used in regions that that customer has designated as trusted regions.

    Merkle signature scheme tree expansion

    公开(公告)号:US11240042B2

    公开(公告)日:2022-02-01

    申请号:US16826973

    申请日:2020-03-23

    Abstract: A first public key is generated based at least in part on a first plurality of signing keys and a second public key is generated based at least in part on a second plurality of signing keys. The signing keys may be used to generate digital signatures. The second public key may be made available to verify a digital signature generated using a signing key from the second plurality of signing keys. In some cases, a first Merkle tree may be formed by the first public key and the first plurality of signing keys, and a second Merkle tree may be formed by the second public key, the first public key, and the second plurality of signing keys.

    MERKLE SIGNATURE SCHEME TREE EXPANSION
    9.
    发明申请

    公开(公告)号:US20200220735A1

    公开(公告)日:2020-07-09

    申请号:US16826973

    申请日:2020-03-23

    Abstract: A first public key is generated based at least in part on a first plurality of signing keys and a second public key is generated based at least in part on a second plurality of signing keys. The signing keys may be used to generate digital signatures. The second public key may be made available to verify a digital signature generated using a signing key from the second plurality of signing keys. In some cases, a first Merkle tree may be formed by the first public key and the first plurality of signing keys, and a second Merkle tree may be formed by the second public key, the first public key, and the second plurality of signing keys.

Patent Agency Ranking