Methods for managing user information and devices thereof
First Claim
Patent Images
1. A method for managing user information, the method comprising:
- obtaining, by an application manager computing device, interposed between a client computing device and a server, at least one part of at least one cryptographic key comprising one or more parts, from a request by the client computing device for a user session, wherein a session state comprising location information for each of the one or more parts of the at least one cryptographic key is allocated during the user session;
retrieving, by the application manager computing device, at least one other part of the at least one cryptographic key based on the location information when the at least one cryptographic key is incomplete;
encrypting or decrypting, by the application manager computing device, user information with the at least one cryptographic key, wherein the same at least one cryptographic key is used between the application manager computing device and the client computing device during the user session;
authenticating, by the application manager computing device, the request based on the encryption or decryption of the user information; and
deleting, by the application manager computing device, the at least one cryptographic key only after completion of the user session.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session.
83 Citations
21 Claims
-
1. A method for managing user information, the method comprising:
-
obtaining, by an application manager computing device, interposed between a client computing device and a server, at least one part of at least one cryptographic key comprising one or more parts, from a request by the client computing device for a user session, wherein a session state comprising location information for each of the one or more parts of the at least one cryptographic key is allocated during the user session; retrieving, by the application manager computing device, at least one other part of the at least one cryptographic key based on the location information when the at least one cryptographic key is incomplete; encrypting or decrypting, by the application manager computing device, user information with the at least one cryptographic key, wherein the same at least one cryptographic key is used between the application manager computing device and the client computing device during the user session; authenticating, by the application manager computing device, the request based on the encryption or decryption of the user information; and deleting, by the application manager computing device, the at least one cryptographic key only after completion of the user session. - View Dependent Claims (2, 3, 4, 5, 6, 19)
-
-
7. A non-transitory computer readable medium having stored thereon instructions for managing user information comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
-
obtaining at least one part of at least one cryptographic key comprising one or more parts, from a request by a client computing device for a user session, wherein a session state comprising location information for each of the one or more parts of the at least one cryptographic key is allocated during the user session; retrieving at least one other part of the at least one cryptographic key based on the location information when the at least one cryptographic key is incomplete; encrypting or decrypting user information, stored on a server, with the at least one cryptographic key, wherein the same at least one cryptographic key is used between an application manager computing device and the client computing device during the user session; authenticating the request based on the encryption or decryption of the user information; and deleting the at least one cryptographic key only after completion of the user session. - View Dependent Claims (8, 9, 10, 11, 12, 20)
-
-
13. An application manager computing device to manage user information, the device comprising:
-
one or more processors; configurable logic; and a memory, the configurable logic and the memory coupled to the one or more processors, at least one of the configurable logic configured to implement or the one or more processors configured to be capable of executing programmed instructions comprising and stored in the memory to; obtain at least one part of at least one cryptographic key comprising one or more parts, from a request by a client computing device for a user session, wherein a session state comprising location information for each of the one or more parts of the at least one cryptographic key is allocated during the user session; retrieve at least one other part of the at least one cryptographic key based on the location information when the at least one cryptographic key is incomplete; encrypt or decrypting user information with the at least one cryptographic key, wherein the same at least one cryptographic key is used between the application manager computing device and the client computing device during the user session; authenticate the request based on the encryption or decryption of the user information; and delete the at least one cryptographic key only after completion of the user session. - View Dependent Claims (14, 15, 16, 17, 18, 21)
-
Specification