×

Providing consistent cryptographic operations across several applications

  • US 9,009,473 B2
  • Filed: 10/13/2011
  • Issued: 04/14/2015
  • Est. Priority Date: 10/13/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for providing consistent cryptographic operations for a plurality of applications executing in a data processing system, the method comprising:

  • receiving, by a security middleware component, through the use of an application programming interface, a data input from an originating application operating in application space, both the application and the middleware component executing in the data processing system;

    retrieving a security schema object by the security middleware component from an object store, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components, each component describing an aspect of the cryptographic operations;

    transforming the data input from a first format to a second format, wherein one of the first and second formats is a secure structured data object formed using the sequence of cryptographic operations;

    populating a property of the secure structured data object, separate from the transformed data input, such that the property is usable by a consumer application to access the security schema object to recover the data input from the secure structured data object at the consumer application; and

    transmitting the data input in the second format to the consumer application operating in application space.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×