×

End-to-end tamper protection in presence of cloud integration

  • US 9,906,367 B2
  • Filed: 08/05/2014
  • Issued: 02/27/2018
  • Est. Priority Date: 08/05/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method performed by one or more processors, the method comprising:

  • receiving, at a receiving entity via a cloud-based integration system, a business-to-business (B2B) communication from a sending entity, wherein the B2B communication includes a set of data associated with at least one business transaction, where the received B2B communication is in a target format, and wherein the cloud-based integration system transforms an original B2B communication in a source format sent from the sending entity into the target format of the B2B communication received at the receiving entity;

    after receiving the B2B communication transformed by the cloud-based integration system, receiving, at the receiving entity, a digitally-signed sender fingerprint of critical fields from the sending entity, wherein the digitally-signed sender fingerprint of critical fields is received without transformation by the cloud-based integration system, wherein the critical fields are extracted by the sending entity from the set of data associated with the at least one business transaction in the source format of the original B2B communication, wherein the critical fields represent a particular subset of fields within the set of data identified and predefined by the sending entity and the receiving entity prior to the B2B communication being sent, and wherein the set of data includes the critical fields and one or more non-critical fields;

    verifying, at the receiving entity, that the received sender fingerprint was signed by the sending entity; and

    in response to verifying that the received sender fingerprint was signed by the sending entity;

    extracting, at the receiving entity, the critical fields from the received B2B communication in the target format based on a pre-defined algorithm;

    in response to extracting the critical fields from the received B2B communication, generating, at the receiving entity, a receiver fingerprint based on the extracted critical fields from the received B2B communication; and

    comparing the received sender fingerprint and the generated receiver fingerprint to determine that the received sender fingerprint and the generated receiver fingerprint are identical.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×