CPC H04L 9/3247 (2013.01) [H04L 9/0836 (2013.01); H04L 9/0841 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
obtaining an indication at a first computer system and from a requestor that a request digital signature matches a request, the indication obtained from an authentication system with access to cryptographic material that is inaccessible to the first computer system and used to derive a cryptographic key obtained in response to the indication;
using a second cryptographic key different from and associated with the cryptographic key obtained in response to the indication, to verify the request digital signature, the second cryptographic key being derived from the cryptographic material, the cryptographic key being:
configured to sign the second cryptographic key,
configured to sign a response to the request based at least in part on an ordered plurality of key derivation parameters, and
derived from a plurality of cryptographic operations including at least one cryptographic operation based at least in part on output of a previous cryptographic operation of the plurality of cryptographic operations and a key derivation parameter of the ordered plurality of key derivation parameters; and
transmitting the signed response to the requestor.
|