×

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

  • US 10,341,109 B2
  • Filed: 06/12/2017
  • Issued: 07/02/2019
  • Est. Priority Date: 01/21/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a downstream server process from an owning process, a first request message for a separate requester to access or communicate to a targeted server;

    endorsing, by the downstream server process, the first request message by attaching a security token representing the downstream server; and

    responsive to receiving, by the downstream server process, from the requester via an inlet server, a second or more request messages;

    determining, by the downstream server process, that the second or more message has a single sign-on cookie attached;

    looking up, by the downstream server process, a user token associated with the attached single sign-on cookie;

    endorsing, by the downstream server process, the second or more message by attaching a security token representing the downstream server; and

    forwarding, by the downstream server process, the endorsed second or more requests including the user tokens to the targeted server;

    thereby binding the plurality of request messages together through endorsement by the downstream server process.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×