SYSTEM AND METHOD FOR SECURING AUTHENTICATION INFORMATION IN A NETWORKED ENVIRONMENT
First Claim
1. A method, comprising:
- encrypting, by a client device using a public key, original authentication information provided by a user at the client device to generate encrypted authentication information;
the client device providing the encrypted authentication information to a cloud based service;
the cloud based service providing the encrypted authentication information to an on-premises component residing behind a firewall of an enterprise;
the on-premises component decrypting the encrypted authentication information using a private key to obtain the original authentication information;
the on-premises component performing a validation on the original authentication information; and
the on-premises component returning a result of the validation to the cloud based service over a network.
7 Assignments
0 Petitions
Accused Products
Abstract
This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user. The encrypted authentication information is sent to a cloud based service which then sends it to an on-premises component residing behind a firewall of an enterprise. The on-premises component decrypts the authentication information using a private key, validates the authentication information, and returns the result to the cloud based service over a network. If validated, the cloud based service establishes a secure connection between the client device and the on-premises component such that the user can access the enterprise'"'"'s content without the enterprise having to share the authentication information with the cloud based service.
16 Citations
20 Claims
-
1. A method, comprising:
-
encrypting, by a client device using a public key, original authentication information provided by a user at the client device to generate encrypted authentication information; the client device providing the encrypted authentication information to a cloud based service; the cloud based service providing the encrypted authentication information to an on-premises component residing behind a firewall of an enterprise; the on-premises component decrypting the encrypted authentication information using a private key to obtain the original authentication information; the on-premises component performing a validation on the original authentication information; and the on-premises component returning a result of the validation to the cloud based service over a network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising at least one non-transitory computer readable medium storing instructions translatable by at least one processor to perform:
-
encrypting, using a public key, original authentication information provided by a user at a client device to generate encrypted authentication information; providing the encrypted authentication information from the client device to a cloud based service; providing the encrypted authentication information from the cloud based service to an on-premises component residing behind a firewall of an enterprise; decrypting the encrypted authentication information using a private key to obtain the original authentication information; performing a validation on the original authentication information; and returning a result of the validation to the cloud based service over a network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
at least one processor; and at least one non-transitory computer readable medium storing instructions translatable by the at least one processor to perform; encrypting, using a public key, original authentication information provided by a user at a client device to generate encrypted authentication information; providing the encrypted authentication information from the client device to a cloud based service; providing the encrypted authentication information from the cloud based service to an on-premises component residing behind a firewall of an enterprise; decrypting the encrypted authentication information using a private key to obtain the original authentication information; performing a validation on the original authentication information; and returning a result of the validation to the cloud based service over a network. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification