Inter-application secure data sharing workflow
First Claim
1. A method for secure data sharing between applications, comprising:
- initiating an inter-application workflow request from a first application to a second application, the workflow request identifying at least one memory location in a shared memory for secure data transfer between the first application and the second application;
monitoring the at least one memory location in the shared memory for presence of a public key of the second application, the public key of the second application being generated and stored in the at least one memory location by the second application in response to the workflow request;
in response to the public key of the second application being present in the shared memory, retrieving the public key from the shared memory;
encrypting an access interval key using the public key to provide an encrypted access interval key, the access interval key being associated with a sign on session of the first application; and
storing the encrypted access interval key in the at least one memory location in the shared memory for retrieval by the second application to extend the sign on session to the second application.
2 Assignments
0 Petitions
Accused Products
Abstract
To extend a sign on session among applications, an inter-application workflow request can be initiated from a first to a second application. The workflow request can identify one or more memory locations in a shared memory for secure data transfer between the applications. The first application can then monitor the memory locations for the presence of a public key stored in shared memory by the second application in response to the workflow request. Once the public key is present in the shared memory, the first application can retrieve and use it to encrypt an access interval key. The encrypted access interval key can then be stored in the shared memory for retrieval by the second application. The access interval key is associated with a sign on session of the first application, and the second application can retrieve and decrypt it to extend the sign on session to the second application.
4 Citations
20 Claims
-
1. A method for secure data sharing between applications, comprising:
-
initiating an inter-application workflow request from a first application to a second application, the workflow request identifying at least one memory location in a shared memory for secure data transfer between the first application and the second application; monitoring the at least one memory location in the shared memory for presence of a public key of the second application, the public key of the second application being generated and stored in the at least one memory location by the second application in response to the workflow request; in response to the public key of the second application being present in the shared memory, retrieving the public key from the shared memory; encrypting an access interval key using the public key to provide an encrypted access interval key, the access interval key being associated with a sign on session of the first application; and storing the encrypted access interval key in the at least one memory location in the shared memory for retrieval by the second application to extend the sign on session to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium embodying program code executable in at least one computing device for secure data sharing between applications that, when executed by the at least one computing device, directs the at least one computing device to at least:
-
initiate an inter-application workflow request from a first application to a second application, the workflow request identifying at least one memory location in a shared memory for secure data transfer between the first application and the second application; monitor the at least one memory location in the shared memory for presence of a public key of the second application, the public key of the second application being generated and stored in the at least one memory location by the second application in response to the workflow request; in response to the public key of the second application being present in the shared memory, retrieve the public key from the shared memory; encrypt an access interval key using the public key to provide an encrypted access interval key, the access interval key being associated with a sign on session of the first application; and store the encrypted access interval key in the at least one memory location in the shared memory for retrieval by the second application to extend the sign on session to the second application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for secure data sharing between applications, comprising:
-
a memory device configured to store computer-readable instructions thereon; and at least one processing device configured, through execution of the computer-readable instructions, to; initiate an inter-application workflow request from a first application to a second application, the workflow request identifying at least one memory location in a shared memory for secure data transfer between the first application and the second application; monitor the at least one memory location in the shared memory for presence of a public key of the second application, the public key of the second application being generated and stored in the at least one memory location by the second application in response to the workflow request; in response to the public key of the second application being present in the shared memory, retrieve the public key from the shared memory; encrypt an access interval key using the public key to provide an encrypted access interval key, the access interval key being associated with a sign on session of the first application; and store the encrypted access interval key in the at least one memory location in the shared memory for retrieval by the second application to extend the sign on session to the second application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification