US Patent Application 17724834. CHAINED CRYPTOGRAPHICALLY SIGNED CERTIFICATES TO CONVEY AND DELEGATE TRUST AND AUTHORITY IN A MULTIPLE NODE ENVIRONMENT simplified abstract

From WikiPatents
Jump to navigation Jump to search

CHAINED CRYPTOGRAPHICALLY SIGNED CERTIFICATES TO CONVEY AND DELEGATE TRUST AND AUTHORITY IN A MULTIPLE NODE ENVIRONMENT

Organization Name

Dell Products L.P.


Inventor(s)

Bradley Goodman of Nashua NH (US)


Kirk Hutchinson of Londonderry NH (US)


Anurag Sharma of Cedar Park TX (US)


CHAINED CRYPTOGRAPHICALLY SIGNED CERTIFICATES TO CONVEY AND DELEGATE TRUST AND AUTHORITY IN A MULTIPLE NODE ENVIRONMENT - A simplified explanation of the abstract

  • This abstract for appeared for US patent application number 17724834 Titled 'CHAINED CRYPTOGRAPHICALLY SIGNED CERTIFICATES TO CONVEY AND DELEGATE TRUST AND AUTHORITY IN A MULTIPLE NODE ENVIRONMENT'

Simplified Explanation

This abstract describes an information handling system that has a memory and a processor. The memory stores a public key that belongs to the owner of the system. The processor receives a message that is cryptographically signed and includes a chain of certificates. The processor checks if the first certificate in the chain gives authority to a user based on the owner's public key. If it does, the processor then checks if the second certificate gives authority from the first user to a second user. Using these certificates, the processor verifies the cryptographically signed message as a trusted message. If the message is verified, the processor carries out a request that is associated with the message.


Original Abstract Submitted

An information handling system includes a memory and a processor. The memory stores an owner public key associated with an owner of the information handling system. The processor receives a cryptographically signed message including a chain of certificates that includes first and second certificates. The processor determines whether the first certificate within the chain of certificates delegates authority to a first user based on the owner public key. In response to the first certificate delegating authority to the first user, the processor determines whether the second certificate delegates authority from the first user to a second user. Based on the first and second certificates, the processor verifies the cryptographically signed message as an authoritative message. In response to the cryptographically signed message being verified as the authoritative message, the processor executes a request associated with the cryptographically signed message.