Systems and Methods for Providing a Secure Data Exchange
First Claim
1. A computer-implemented method, comprising:
- generating, using a first application, a first key for exchange of data between the first application and a second application;
storing, using the first application, the first key in a first memory location, wherein the first memory location is accessed by the second application to obtain the first key;
generating, using the second application, a second key for exchange of data between the first application and the second application;
creating, using the second application, a data request, the data request containing the second key and being encrypted using the first key, and providing the encrypted request to the first application; and
providing, using the first application, the data identified in the data request to the second application, wherein the data is encrypted by the first application using the second key prior to being provided to the second application and the second application decrypts the data using the second key;
wherein the at least one of the generating the first key, storing, the generating the second key, the creating and the providing is performed on at least one processor.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, a method, and a computer program product for a data exchange are provided. A first application generates a first key for exchange of data between the first application and a second application. The first application stores the first key in a first memory location. The second application obtains the first key from the memory location. The second application generates a second key for exchange of data between the first application and the second application. The second application creates a data request that contains the second key and is encrypted using the first key. The encrypted request is provided to the first application. The first application provides the data identified in the data request to the second application. The data is encrypted by the first application using the second key prior to being provided to the second application. The second application decrypts the data using the second key.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
generating, using a first application, a first key for exchange of data between the first application and a second application; storing, using the first application, the first key in a first memory location, wherein the first memory location is accessed by the second application to obtain the first key; generating, using the second application, a second key for exchange of data between the first application and the second application; creating, using the second application, a data request, the data request containing the second key and being encrypted using the first key, and providing the encrypted request to the first application; and providing, using the first application, the data identified in the data request to the second application, wherein the data is encrypted by the first application using the second key prior to being provided to the second application and the second application decrypts the data using the second key; wherein the at least one of the generating the first key, storing, the generating the second key, the creating and the providing is performed on at least one processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product comprising a machine-readable medium storing instructions that, when executed by at least one programmable processor, cause the at least one programmable processor to perform operations comprising:
-
generating, using a first application, a first key for exchange of data between the first application and a second application; storing, using the first application, the first key in a first memory location, wherein the first memory location is accessed by the second application to obtain the first key; generating, using the second application, a second key for exchange of data between the first application and the second application; creating, using the second application, a data request, the data request containing the second key and being encrypted using the first key, and providing the encrypted request to the first application; and providing, using the first application, the data identified in the data request to the second application, wherein the data is encrypted by the first application using the second key prior to being provided to the second application and the second application decrypts the data using the second key. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
at least one programmable processor; and a machine-readable medium storing instructions that, when executed by the at least one programmable processor, cause the at least one programmable processor to perform operations comprising; generating, using a first application, a first key for exchange of data between the first application and a second application; storing, using the first application, the first key in a first memory location, wherein the first memory location is accessed by the second application to obtain the first key; generating, using the second application, a second key for exchange of data between the first application and the second application; creating, using the second application, a data request, the data request containing the second key and being encrypted using the first key, and providing the encrypted request to the first application; and providing, using the first application, the data identified in the data request to the second application, wherein the data is encrypted by the first application using the second key prior to being provided to the second application and the second application decrypts the data using the second key.
-
Specification