MANAGING SECURITY FOR COMPUTER SERVICES
First Claim
Patent Images
1. A method of providing security for a business application comprising:
- receiving a request from a server including a server public key and a security token;
deploying a virtual node implementing the business application in response to the request;
using the security token in a bootstrap process by the virtual node to provide authentication to the server; and
authenticating a message from the server using a server public key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing security for a business application including receiving a request from a server including a server public key and a security token, deploying a virtual node implementing the business application in response to the request, using the security token in a bootstrap process by the virtual node to provide authentication to the server, and authenticating a message from the server using a server public key.
60 Citations
25 Claims
-
1. A method of providing security for a business application comprising:
-
receiving a request from a server including a server public key and a security token; deploying a virtual node implementing the business application in response to the request; using the security token in a bootstrap process by the virtual node to provide authentication to the server; and authenticating a message from the server using a server public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10-20. -20. (canceled)
-
21. A method of providing security for a business application comprising:
-
providing a server public key, a security token, and a virtual node private key to a virtual node implementing the business application; using the security token in a bootstrap process by the virtual node to provide authentication to the server; and in response to the bootstrap process, the server using a server private key to sign a message to provide authentication to the virtual node. - View Dependent Claims (22, 23, 24, 25)
-
Specification