TOKEN BASED ONE-TIME PASSWORD SECURITY
    141.
    发明公开

    公开(公告)号:US20230239289A1

    公开(公告)日:2023-07-27

    申请号:US18194891

    申请日:2023-04-03

    CPC classification number: H04L63/0838 G06F21/34

    Abstract: A one-time password (OTP) based security scheme is described, where a provider pre-generates a number of verification codes (e.g., OTP codes) which will be valid for a predetermined interval. The provider then encodes the verification codes (e.g., by hashing each code with a time value), and stores the verification codes into a data structure. The data structure can be provided to a verification system that can use the set of pre-generated OTP codes to authenticate requests received from users having personal security tokens.

    COMPARTMENTS
    144.
    发明申请

    公开(公告)号:US20220058274A1

    公开(公告)日:2022-02-24

    申请号:US17227021

    申请日:2021-04-09

    Abstract: Customers of a service provider are able to provision compartments of the accounts. The both the accounts and the compartments, in some embodiments, may have associated computing resources and identities. One or more identities of the account may be authorized to perform administrative operations in the compartment. Identities of the compartment may lack the ability to perform any administrative actions outside of the compartment but inside of the account.

    Virtual service authorization
    146.
    发明授权

    公开(公告)号:US10924482B1

    公开(公告)日:2021-02-16

    申请号:US14576141

    申请日:2014-12-18

    Abstract: A computing resource service provides flexible configuration of authorization rules. A set of authorization rules which define whether fulfillment of requests. The set of authorization rules are applied to a request of a first type which is mapped to a request of a second type. The request of the second type is used for fulfillment of the request of the first type when the authorization rules so allow.

    Signing key log management
    147.
    发明授权

    公开(公告)号:US10924286B2

    公开(公告)日:2021-02-16

    申请号:US15942039

    申请日:2018-03-30

    Abstract: Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested to perform one or more actions using the keys. The logging property can specify how to log use of a respective key. A key can also include a mutability property for specifying whether the logging property can be changed, and if so under what circumstances or in which way(s). The ability to specify and automatically enforce logging can be important for environments where audit logs are essential. These can include, for example, public certificate authorities that must provide accurate and complete audit trails. In cases where the data is not to be provided outside a determined secure environment, the key can be generated with a property indicating not to log any of the usage.

    Authenticated storage operations
    150.
    发明授权

    公开(公告)号:US10771255B1

    公开(公告)日:2020-09-08

    申请号:US14225264

    申请日:2014-03-25

    Abstract: Data storage operation commands are digitally signed to enhance data security in a distributed system. A data storage client and a data storage node may share access to a cryptographic key. The data storage client uses the cryptographic key to digitally sign commands transmitted to the data storage node. The data storage node uses its copy of the cryptographic key to verify a digital signature of a command before fulfilling the command. The command may include a log of database transactions to process.

Patent Agency Ranking