Methods and systems of data security in browser storage
First Claim
Patent Images
1. A nontransient machine readable medium storing one or more machine instructions, which when invoked cause a processor to implement a method comprising:
- at a server that includes at least a processor system having at least one processor and a memory system, receiving a passcode and content, to be used by a service provider server on behalf of the user;
if the passcode is authenticated, wherein authenticating the pass code comprises determining whether the passcode stored with the content and a passcode provided by a user previously match one another, performing the following,placing, by the server, the content and passcode into an object;
creating, by the server, an encryption key;
encrypting, by the server, the object having the content and the passcode with the encryption key, therein forming an encrypted object; and
sending from the server to the user system the encrypted object and a unique identifier for the private key.
1 Assignment
0 Petitions
Accused Products
Abstract
Mechanisms and methods are provided for managing OAuth access in a database network system, and extending the OAuth flow of authentication to securely store the OAuth encrypted refresh token in the storage available with current browsers or any other non-secure storage on user system.
282 Citations
12 Claims
-
1. A nontransient machine readable medium storing one or more machine instructions, which when invoked cause a processor to implement a method comprising:
-
at a server that includes at least a processor system having at least one processor and a memory system, receiving a passcode and content, to be used by a service provider server on behalf of the user; if the passcode is authenticated, wherein authenticating the pass code comprises determining whether the passcode stored with the content and a passcode provided by a user previously match one another, performing the following, placing, by the server, the content and passcode into an object; creating, by the server, an encryption key; encrypting, by the server, the object having the content and the passcode with the encryption key, therein forming an encrypted object; and sending from the server to the user system the encrypted object and a unique identifier for the private key. - View Dependent Claims (2, 3, 4, 6, 7, 8, 11)
-
-
5. A non-transitory machine readable medium storing one or more machine instructions, which when invoked cause a processor to implement a method comprising:
-
at a server that includes at least a processor system having at least one processor and a memory system, receiving a passcode and content, to be used by a service provider server on behalf of the user; if the passcode is authenticated, wherein authenticating the pass code comprises determining whether the passcode stored with the content and a passcode provided by a user previously match one another, performing the following, placing, by the server, the content and passcode into an object; creating, by the server, an encryption key; encrypting, by the server, the object having the content and the passcode with the encryption key, therein forming an encrypted object; and sending from the server to the user system the encrypted object and a unique identifier for the private key; the encrypting of the passcode including at least applying a one-way hash function to the passcode.
-
-
9. A nontransient machine readable medium storing one or more machine instructions, which when invoked cause a processor to implement a method comprising:
-
receiving, at a server that includes at least a processor system having at least one processor and a memory system, a passcode and encrypted content to be used by a service provider server on behalf of the user and a unique key identifier; in response to the receiving, performing the following, querying a local database for the encryption key based on the key identifier; decrypting the encrypted content with the key; determining whether the passcode stored previously with the content and the passcode provided by the user match one another; and returning the decrypted content to the user if the passcode that was stored with the content and the passcode provided by the user match one another; wherein prior to the receiving of the encrypted passcode and encrypted content and a unique key identifier, receiving at the server, from a user device, the content and the passcode for encryption; in response, creating, by the server, a file; placing, by the server, the passcode and content in the file, generating, by the server, a unique encryption key and unique identifier of the key, storing in a storage location of the memory system the unique encryption key in association with a unique identifier, encrypting, by the server, the file in which the pass code and content were placed with the unique encryption key, therein creating the encrypted passcode and the encrypted content; sending from the server to the user device the encrypted file and the unique key identifier for storage at the user device. - View Dependent Claims (10)
-
-
12. A non-transitory machine readable medium storing one or more machine instructions, which when invoked cause a processor to implement a method comprising:
-
at a server that includes at least a processor system having at least one processor and a memory system, receiving a passcode and content, to be used by a service provider server on behalf of the user; if the passcode is authenticated, wherein authenticating the pass code comprises determining whether the passcode stored with the content and a passcode provided by a user previously match one another, performing the following, placing, by the server, the content and passcode into an object; creating, by the server, an encryption key; encrypting, by the server, the object having the content and the passcode with the encryption key, therein forming an encrypted object; and sending from the server to the user system the encrypted object and a unique identifier that identifies the private key.
-
Specification