×

Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

  • US 9,148,285 B2
  • Filed: 01/21/2013
  • Issued: 09/29/2015
  • Est. Priority Date: 01/21/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product for controlling exposure of sensitive data and using process-bound security tokens comprising:

  • a tangible, computer-readable memory storage device; and

    one or more program codes stored by the tangible, computer-readable memory storage device, for causing a processor to;

    send in response to a user logging into an owning process to a targeted server computer a digitally signed owning process token containing an identity and a password of the user and an identity of the owning process, the owning process being executed by a first server computer which is separate from the targeted server, and the user being previously unauthenticated to the owning process;

    receive a digitally signed user token from the targeted server computer subsequent to authentication of the user by the targeted server computer;

    store the user token by the owning process for future use;

    block forwarding of the user token to the user;

    issue a single sign on token by the owning process;

    send the single-sign-on token to the user from the owning process; and

    protect the user token from exposure to the user by forwarding subsequent access requests by the user to the targeted server computer with the stored user token substituted in place of the single-sign-on token.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×