×

Facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment

  • US 10,491,398 B2
  • Filed: 09/12/2014
  • Issued: 11/26/2019
  • Est. Priority Date: 09/12/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a dynamic security verification device in a multi-tenant database system, a content file having at least one of data and metadata, wherein the content file includes embedded security data representing multiple integrity checks to ensure the content file is protected from tampering or unauthorized accesses, wherein the multiple integrity checks include at least two end-to-end checks of the content file, an author of the content file, and a consumer of the content file, wherein the dynamic security verification device is capable of tracing back the multiple integrity checks to origin of the embedded security data without having to shift from the dynamic security verification device to another security verification device, wherein the origin of the embedded security data refers to a development code including a source code;

    prior to submission of the content file to a data repository, performing, by the security verification device, a first integrity check of the multiple integrity checks to authenticate the author of the content file by selectively confirming a first component of the embedded security data;

    performing, by the dynamic security verification device, a second integrity check of the multiple integrity checks when submitting the content file to the data repository to authenticate the consumer of the content file by selectively confirming a second component of the embedded security data;

    wherein the first and second components include a combination of at least two or more of one or more cryptographic signatures, one or more digital fingerprints, one or more public or private keys, one or more timestamps, and authorship data identifying at least one of the data, the metadata, the author, and the consumer; and

    determining, by the security verification device, whether to allow submission of the content file to the data repository based on a result of the first integrity check or the second integrity check, wherein the first integrity check is extended to include verifying built artifacts including an original source code supported by the embedded security data, wherein the second integrity check is extended to include verifying a running code based on the original code.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×