Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs

Streamlining Secure Cloud Access: Automated SSH Certificate Management for Safer, Scalable IT Operations

Inventiv.org
November 26, 2025
Apple

Invented by Small; Jeremiah David, Chebaturkin; Alexander, Tashev; Yavor, Shenoy; Siddharth Satish, Dixon; Thom, Xu; Xin, Oracle International Corporation

Gaining secure access to cloud resources is a big challenge for organizations. This article will help you understand a new patent application for granting access to cloud resources using special SSH certificates. We’ll break down the market context, the science and older methods, and show what’s new in this invention. By the end, you’ll know how this approach makes cloud security stronger and easier to manage.

Your browser does not support the video tag.

Background and Market Context

Cloud computing is now a big part of how companies run their digital work. Instead of buying and running their own servers, more groups use shared services from big providers like Amazon, Microsoft, or Oracle. These companies offer powerful tools, but they must also keep everything safe. When people want to connect to a cloud server, they use tools like SSH. SSH helps keep their connection private and safe from hackers. But with so many users and servers, managing who can get in and who cannot has become very hard.

Think about a large business with hundreds of employees and thousands of cloud servers. Each worker might need access to just a few servers. Some might need special permissions, like being able to change system settings. Others can only look at data. In the past, companies would give people passwords or store their public keys on each server. When someone left the company, the IT team had to remove their access everywhere. If they missed a spot, there was a danger. If a password or key was stolen, hackers could sneak in and cause damage.

Cloud providers and businesses have been searching for better ways to manage this. They want a system where granting and removing access is fast and safe. They want to be sure only the right people can get to the right resource at the right time. They also want good records of who accessed what, in case something goes wrong. All this needs to happen without slowing people down or making it too hard to work.

A central part of this challenge is authentication — proving someone is who they say they are, and authorization — deciding what they can do. In cloud systems, this isn’t just about logging in. It’s about timing, matching the right person to the right resource, and making sure no one has more access than they need. The rise of remote work and global teams make these problems even bigger.

So, the market is hungry for new, smart ways to handle remote access in cloud environments. The goal is to be simple, secure, and scalable. This is where the new SSH certificate system comes into play. It introduces an easier, safer way to grant and manage access, using modern cloud ideas and strict security checks.

Scientific Rationale and Prior Art

Before we get to the new ideas, let’s look at how things work today. SSH, or Secure Shell, is a tool that lets you connect to another computer safely over the internet. Traditionally, you could log in with a password or with a pair of keys: a public key and a private key. The server would save your public key. When you tried to connect, you’d prove you had the private key, and the server would let you in.

This system is pretty good, but it has problems. If you need to add a new user or remove one, you have to update the list of keys on every server. If you have hundreds of servers, that’s a lot of work. If you forget to remove a key, it’s a security hole. If someone steals a key, they might get in without anyone noticing.

To fix this, experts came up with SSH certificates. Instead of putting every user’s key on every server, you use a central authority — called a Certificate Authority, or CA. The CA checks if you should have access, then signs your public key. When you connect to a server, you show your certificate. The server trusts the CA and lets you in if the certificate is valid. This makes things easier to manage, especially if you have lots of users and servers.

But even with SSH certificates, there are still gaps. Most SSH certificates focus on who you are (your user ID), but not so much on what you are connecting to (the resource or server). Some users may get a certificate that lets them on to any server, even ones they shouldn’t touch. If your job changes, or if you only need access to a certain group of servers, the system doesn’t always make it easy to limit your reach. There is also the problem of keeping good records. If someone uses a different account or logs in with a different identity, it can be hard to track who did what.

Some past systems tried to solve this with complex access control lists or by making lots of different certificates for different roles. Others used external tools to match users to servers. But these methods could be hard to set up, slow, or not flexible. They often required manual work or risked letting people have more access than they needed. None made it easy to tie each user to just the resources they should have, right inside the certificate itself.

The scientific challenge has always been: How can you combine the trust and ease of a central CA with fine-grained, resource-level controls? How can you do this in a way that scales, is simple, and keeps good logs for audits? That’s where the new approach — using target-specific principals in SSH certificates — offers a leap forward.

Invention Description and Key Innovations

This new patent describes a smart way to manage access to cloud resources using SSH certificates that are more detailed and precise than before. Here’s how it works, explained simply:

Instead of just saying “User X is allowed in,” the certificate also says “User X is allowed into Resource Y.” This is done by putting both the user’s ID and the resource’s ID (like a server name or group) together in what’s called a “target-specific principal.” When someone wants access, their device sends a request to the Certificate Authority (CA). This request includes who they are and what they want to connect to.

The CA checks a list of who is allowed to do what. If the request matches — meaning the user is allowed to access that resource — the CA creates a certificate. This certificate lists both the user and the resource in a special field. The CA signs the certificate, proving it’s real, and sends it back.

When the user’s device tries to connect to a server, it shows the certificate. The server checks that the certificate is signed by the trusted CA and that the “principal” matches what the server expects (for example, “jsmith@prod-server-admin”). If all checks pass, the user gets in — but only to the resource allowed, and only for the time period set in the certificate.

This approach has several clever features:

First, it makes sure that certificates are tightly bound to both the user and the exact resource. No more broad certificates that work everywhere. Second, it allows different levels of access — like full admin rights (“sudo”) or just basic user rights — by including this right in the principal. Third, it supports short-lived certificates, so if a certificate is stolen, it’s only good for a short time. Fourth, it keeps clear logs of who used which certificate to access which resource, making audits easy.

The system also supports more advanced setups. For example, if a user needs access to more than one resource, the CA can include several principals in the same certificate. If a user requests access to something they shouldn’t have, the CA can deny just that part without blocking everything else. There’s also support for cloud environments, where each user or resource might have extra tags or IDs — these can be included in the certificate for even more fine-grained control.

Another innovation is the use of a “connection agent.” Sometimes, companies want to have another layer between the user and the resource. The connection agent can handle the request, talk to the CA, get the right certificate, and even open the connection on the user’s behalf. This helps in big organizations or when extra checks are needed.

On the technical side, the patent describes how the CA checks entitlements by matching strings that combine user and resource IDs. This can be done quickly and reliably, even if you have many users and resources. The CA also includes extra information in the certificate, like expiration times, to keep everything secure and up to date.

When a server gets a connection request, it checks that the certificate is from a trusted CA, that the principal matches, and that the certificate is still valid. Only then is access granted. If anything is wrong — wrong user, wrong resource, expired certificate — access is denied. This keeps things tight and safe.

What makes this invention stand out is the way it brings together user identity, resource identity, and access rights — all inside the certificate. It’s a simple, powerful way to make sure only the right people get to the right resources, for the right reasons, and only for as long as needed. It also makes it much easier to track and manage access across a big organization.

For cloud providers and large businesses, this means less risk, easier operations, and better compliance. When someone leaves the company, you don’t need to chase down keys on every server. You just stop issuing new certificates, and the old ones expire quickly. If you want to give someone temporary access, you can do it safely. If regulators ask for records, you have a clear trail of who did what, when, and where.

In summary, this new approach to SSH certificates solves many old problems. It’s a leap forward for cloud security, making it easier, safer, and more flexible to control who can access what in a modern, fast-changing environment.

Conclusion

SSH certificates with target-specific principals represent a big step in cloud access security. By tying each certificate to both a user and a resource, and checking rights every step of the way, organizations can keep their data and systems much safer. This patent shows a path to a future where granting and managing access is not only more secure but also much simpler and faster. If you work in IT, security, or cloud services, understanding and using this approach will help you protect your resources and make your life easier.

Click here https://ppubs.uspto.gov/pubwebapp/ and search 20250337599.

Tags: Patent Review
Previous Story
Headline: New Method Accurately Tracks Wireless Power Loss, Boosting Efficiency for IoT and Electronics Manufacturers
Next Story
Automated Web App Protection: Detect and Block Scripting Attacks Using Security Policy Reports

Related Articles

Automated Web App Protection: Detect and Block Scripting Attacks Using Security Policy Reports

Invented by YAWALKAR; Siddhesh, PURI; Hemant, BHALODE; Swapnil, BHATKAR; Sandeep,...

Headline: New Method Accurately Tracks Wireless Power Loss, Boosting Efficiency for IoT and Electronics Manufacturers

Invented by KIM; Kyung Hwan, KWAK; Hyeong Geol, PARK; Yong...

Menu

  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs

Disclaimer Communications between you and Inventiv Foundation are protected by our Privacy Policy but not by the attorney-client privilege or as work product. Inventiv Foundation, Inc. can connect you to independent attorneys and self-help services at your specific direction. We are not a law firm or a substitute for an attorney or law firm. We cannot provide any kind of advice, explanation, opinion, or recommendation about possible legal rights, remedies, defenses, options, selection of forms or strategies. Your access to the website is subject to our Terms of Use.

Tags

Alphabet Amazon Facebook/Meta Microsoft Patent Review Samsung
  • Home
  • About
  • Inventiv’s Daily
  • Inventiv Cloud
  • Blogs
  • Contact
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs