×

Method for the cryptographic protection of an application

  • US 9,215,070 B2
  • Filed: 06/22/2011
  • Issued: 12/15/2015
  • Est. Priority Date: 07/19/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for the cryptographic protection of an application that is associated with an application owner and which is executed in a data processing center administered by an external service provider not belonging to the application owner,wherein the application owner is an entity that developed or otherwise owns the application,wherein the external service provider is an entity distinct from the application owner and provides non-owners of the application, which comprise entities distinct from the application owner and the external service provider, access to use the application,wherein the data processing center provides a security module of the application owner that stores private cryptographic material of the application owner, andwherein the method comprises:

  • generating a cryptographic secret by a generation application of the application owner or by the security module;

    transmitting the cryptographic secret between a computer of the application owner and the security module via an encrypted transmission via a first secure channel between the application and the computer of the application owner, the encrypted transmission being decryptable by the application and the computer of the application owner, but not by the external service provider or the non-owners of the application, as a result of which encrypted transmission the cryptographic secret is made accessible to the computer of the application owner and the security module but not to the external service provider or the non-owners of the application;

    transmitting the cryptographic secret from the computer of the application owner to the application via a second secure channel between the application and the computer of the application owner, as a result of which the cryptographic secret is made accessible to the application, but remains inaccessible to the external service provider and the non-owners of the application; and

    performing an authentication of the application to the security module based on the cryptographic secret that is accessible to the application and the security module, wherein following successful authentication the cryptographic material of the application owner is transmittable from the security module to the application via a channel protected by the cryptographic secret.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×