×

Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment

  • US 20170026179A1
  • Filed: 10/05/2016
  • Published: 01/26/2017
  • Est. Priority Date: 01/21/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling exposure of sensitive data using process-bound security tokens comprising:

  • receiving, by a downstream server process, from an owning process a first request message for a separate requester to access or communicate to a targeted server, wherein the request message is signed with a first token issuer cryptographic key a first security token that is owned by the owning process;

    endorsing, by the downstream server process, the first request message by attaching a second security token representing the downstream server, wherein the second security token is signed by a second token issuer cryptographic key;

    sending, by the downstream server, the endorsed first request message to the targeted server;

    receiving, by the downstream server, from the targeted server a user token;

    forwarding, by the downstream server process, the user token to the owning process; and

    responsive to receiving, by the downstream server process, one or more additional request messages with the user token, endorsing and forwarding each additional request message to the targeted server;

    thereby binding the plurality of request messages together through endorsement by the downstream server process.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×