System and method for securing authentication information in a networked environment
First Claim
1. A method, comprising:
- encrypting, by a client device operated by a first party using a public key, original authentication information provided by the first party at the client device to generate encrypted authentication information, wherein the public key and an instruction for encrypting the authentication information were provided by a remote service operated by a second party in response to an access to the remote service by the client device operated by the first party;
the client device providing the encrypted authentication information to the remote service operated by the second party;
the remote service providing the encrypted authentication information to an on-premises component of an enterprise operated by a third party distinct from the first party and second party;
the on-premises component decrypting the encrypted authentication information using a private key corresponding to the public key provided by the remote service operated by the second party to obtain the original authentication information;
the on-premises component performing a validation on the original authentication information; and
the on-premises component returning a result of the validation to the remote service over a network, wherein the result is signed by the on-premises component using the private key such that the remote service operated by the second party can verify the result was sent by the on-premises component behind a firewall of the enterprise operated by the third party.
7 Assignments
0 Petitions
Accused Products
Abstract
This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user. The encrypted authentication information is sent to a cloud based service which then sends it to an on-premises component residing behind a firewall of an enterprise. The on-premises component decrypts the authentication information using a private key, validates the authentication information, and returns the result to the cloud based service over a network. If validated, the cloud based service establishes a secure connection between the client device and the on-premises component such that the user can access the enterprise'"'"'s content without the enterprise having to share the authentication information with the cloud based service.
-
Citations
15 Claims
-
1. A method, comprising:
-
encrypting, by a client device operated by a first party using a public key, original authentication information provided by the first party at the client device to generate encrypted authentication information, wherein the public key and an instruction for encrypting the authentication information were provided by a remote service operated by a second party in response to an access to the remote service by the client device operated by the first party; the client device providing the encrypted authentication information to the remote service operated by the second party; the remote service providing the encrypted authentication information to an on-premises component of an enterprise operated by a third party distinct from the first party and second party; the on-premises component decrypting the encrypted authentication information using a private key corresponding to the public key provided by the remote service operated by the second party to obtain the original authentication information; the on-premises component performing a validation on the original authentication information; and the on-premises component returning a result of the validation to the remote service over a network, wherein the result is signed by the on-premises component using the private key such that the remote service operated by the second party can verify the result was sent by the on-premises component behind a firewall of the enterprise operated by the third party. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer readable medium storing instructions translatable by at least one processor to perform:
-
encrypting, by a client device operated by a first party using a public key, original authentication information provided by the first party at the client device to generate encrypted authentication information, wherein the public key and an instruction for encrypting the authentication information were provided by a remote service operated by a second party in response to an access to the remote service by the client device operated by the first party; the client device providing the encrypted authentication information to the remote service operated by the second party; the remote service providing the encrypted authentication information to an on-premises component of an enterprise operated by a third party distinct from the first party and second party; the on-premises component decrypting the encrypted authentication information using a private key corresponding to the public key provided by the remote service operated by the second party to obtain the original authentication information; the on-premises component performing a validation on the original authentication information; and the on-premises component returning a result of the validation to the remote service over a network, wherein the result is signed by the on-premises component using the private key such that the remote service operated by the second party can verify the result was sent by the on-premises component behind a firewall of the enterprise operated by the third party. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system, comprising:
-
at least one processor; and at least one non-transitory computer readable medium storing instructions for configuring the at least one processor to perform the steps of; encrypting, by a client device operated by a first party using a public key, original authentication information provided by the first party at the client device to generate encrypted authentication information, wherein the public key and an instruction for encrypting the authentication information were provided by a remote service operated by a second party in response to an access to the remote service by the client device operated by the first party; the client device providing the encrypted authentication information to the remote service operated by the second party; the remote service providing the encrypted authentication information to an on- premises component of an enterprise operated by a third party distinct from the first party and second party; the on-premises component decrypting the encrypted authentication information using a private key corresponding to the public key provided by the remote service operated by the second party to obtain the original authentication information; the on-premises component performing a validation on the original authentication information; and
the on-premises component returning a result of the validation to the remote service over a network, wherein the result is signed by the on-premises component using the private key such that the remote service operated by the second party can verify the result was sent by the on-premises component behind a firewall of the enterprise operated by the third party. - View Dependent Claims (12, 13, 14, 15)
-
Specification