Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
First Claim
1. A method for controlling exposure of sensitive data using process-bound security tokens comprising:
- receiving, by a downstream server process, from an owning process a first request message for a separate requester to access or communicate to a targeted server, wherein the request message is signed with a first token issuer cryptographic key a first security token that is owned by the owning process;
endorsing, by the downstream server process, the first request message by attaching a second security token representing the downstream server, wherein the second security token is signed by a second token issuer cryptographic key;
sending, by the downstream server, the endorsed first request message to the targeted server;
receiving, by the downstream server, from the targeted server a user token;
forwarding, by the downstream server process, the user token to the owning process; and
responsive to receiving, by the downstream server process, one or more additional request messages with the user token, endorsing and forwarding each additional request message to the targeted server;
thereby binding the plurality of request messages together through endorsement by the downstream server process.
1 Assignment
0 Petitions
Accused Products
Abstract
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request. The token-owning process signs the request to indicate that it endorses the request. A receiving server accepts a request if (1) the token-owning process endorses the request by signing the request; (2) the token is valid (token is signed by its issuer and the digital signature is verified and unexpired); (3) user entity, which can be a real user or a deployment or a server process, that is represented by the token has the authorization to access the specified resources; and (4) the token-owning process is authorized to endorse the user entity represented by the token to access the specified resources.
15 Citations
12 Claims
-
1. A method for controlling exposure of sensitive data using process-bound security tokens comprising:
-
receiving, by a downstream server process, from an owning process a first request message for a separate requester to access or communicate to a targeted server, wherein the request message is signed with a first token issuer cryptographic key a first security token that is owned by the owning process; endorsing, by the downstream server process, the first request message by attaching a second security token representing the downstream server, wherein the second security token is signed by a second token issuer cryptographic key; sending, by the downstream server, the endorsed first request message to the targeted server; receiving, by the downstream server, from the targeted server a user token; forwarding, by the downstream server process, the user token to the owning process; and responsive to receiving, by the downstream server process, one or more additional request messages with the user token, endorsing and forwarding each additional request message to the targeted server; thereby binding the plurality of request messages together through endorsement by the downstream server process. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product for controlling exposure of sensitive data using process-bound security tokens comprising:
-
a computer-readable storage memory which is not a propagating signal per se; and program instructions embodied by the computer-readable storage memory which cause one or more processors to, when executed, perform the steps of; receiving, by a downstream server process, from an owning process a first request message for a separate requester to access or communicate to a targeted server, wherein the request message is signed with a first token issuer cryptographic key a first security token that is owned by the owning process; endorsing, by the downstream server process, the first request message by attaching a second security token representing the downstream server, wherein the second security token is signed by a second token issuer cryptographic key; sending, by the downstream server, the endorsed first request message to the targeted server; receiving, by the downstream server, from the targeted server a user token; forwarding, by the downstream server process, the user token to the owning process; and responsive to receiving, by the downstream server process, one or more additional request messages with the user token, endorsing and forwarding each additional request message to the targeted server; thereby binding the plurality of request messages together through endorsement by the downstream server process. - View Dependent Claims (6, 7, 8)
-
-
9. A system for controlling exposure of sensitive data using process-bound security tokens comprising:
-
a computing system having a processor; and a computer-readable storage memory which is not a propagating signal per se; program instructions embodied by the computer-readable storage memory which cause the processor to, when executed, perform the steps of; receiving, by a downstream server process, from an owning process a first request message for a separate requester to access or communicate to a targeted server, wherein the request message is signed with a first token issuer cryptographic key a first security token that is owned by the owning process; endorsing, by the downstream server process, the first request message by attaching a second security token representing the downstream server, wherein the second security token is signed by a second token issuer cryptographic key; sending, by the downstream server, the endorsed first request message to the targeted server; receiving, by the downstream server, from the targeted server a user token; forwarding, by the downstream server process, the user token to the owning process; and responsive to receiving, by the downstream server process, one or more additional request messages with the user token, endorsing and forwarding each additional request message to the targeted server; thereby binding the plurality of request messages together through endorsement by the downstream server process. - View Dependent Claims (10, 11, 12)
-
Specification