Integrated Application Server and Data Server Processes with Matching Data Formats

    公开(公告)号:US20200372042A1

    公开(公告)日:2020-11-26

    申请号:US16989447

    申请日:2020-08-10

    Applicant: SAP SE

    Abstract: In one embodiment, the present invention includes a computer-implemented method comprising storing data in an application using an application custom data type and application custom data structure. The data is stored in a database using the application custom data type and the application custom data structure. In one embodiment, a request is sent to access the data from the application to the database. The data is retrieved from the database in response to the request in the application custom data type and the application custom data structure. In one embodiment, the data is sent from the database to a shared memory in the application custom data type and the application custom data structure and the data is retrieved by the application from the shared memory in the application custom data type and the application custom data structure.

    Managing user-controlled security keys in cloud-based scenarios

    公开(公告)号:US10142100B2

    公开(公告)日:2018-11-27

    申请号:US15203663

    申请日:2016-07-06

    Applicant: SAP SE

    Abstract: A system for managing user-controlled security keys in cloud-based scenarios is provided. In some implementations, the system performs operations comprising receiving an information request from a user device via a network, and generating a database query based at least in part upon the information request. The operations can comprise generating a request for a secret key for decrypting encrypted data when the database query requests the encrypted data and/or generating a request for a secret key for encrypting data when the database query requests to encrypt data. The operations can also comprise providing the request to a security key management entity via a network, receiving secret key information from the security key management entity via the network, and using the secret key information to form decrypted data or encrypted data. Related systems, methods, and articles of manufacture are also described.

    Key management configurations
    4.
    发明授权

    公开(公告)号:US11296870B2

    公开(公告)日:2022-04-05

    申请号:US16590047

    申请日:2019-10-01

    Applicant: SAP SE

    Abstract: A method, a system, and a computer program product for performing key management configurations. One or more encryption keys for encrypting one or more data payloads for accessing one or more databases are received. The received encryption keys are compared to a plurality of encryption keys associated with the databases. Based on the comparison, a configuration of at least one database is changed using the received encryption keys. The changed configuration is stored.

    COLUMN PROTECTION
    5.
    发明申请
    COLUMN PROTECTION 审中-公开

    公开(公告)号:US20180012031A1

    公开(公告)日:2018-01-11

    申请号:US15202498

    申请日:2016-07-05

    Applicant: SAP SE

    CPC classification number: G06F21/6218 G06F17/30315 G06F17/30339

    Abstract: Methods, systems, and apparatus, including computer program products, are provided for configuring access controls to a database. In one aspect there is provided a method. The method may include receiving, from a first user, a table declaration for creating a database table in a database; generating, based on the table declaration, the database table; receiving, from the first user, a specification of one or more access mechanisms that have a privilege to access the database table; receiving a designation of at least one column in the database table as a protected column and one or more users who have a privilege to access the content of the protected column; and providing control over access to the content of the protected column based at least in part on the specification of the one or more access mechanisms and the designation of the at least one column and the second user.

    SYNCHRONIZATION OF SECRET KEYS BETWEEN MULTIPLE SERVER INSTANCES

    公开(公告)号:US20230412374A1

    公开(公告)日:2023-12-21

    申请号:US17818750

    申请日:2022-08-10

    Applicant: SAP SE

    CPC classification number: H04L9/0894 G06F16/2379 G06F16/27

    Abstract: The present disclosure relates to computer-implemented methods, software, and systems for the replication of secret keys between server nodes. Keys for encryption and decryption are persisted in a log file on a first database hosted on a primary server. The log file comprises data for executed database transactions at the first database and key management operations at a first key store. In response to triggering a synchronization between the primary server and a secondary server, a set of sequential entries of the log file are replayed at the secondary server from the first database. An execution of a transaction is replicated at a secondary database at the secondary server based on data for an entry at the log file and a key management operation associated with a key at the first key store that is persisted in another entry of the log file is replicated.

    Integrated Application Server and Data Server Processes with Matching Data Formats

    公开(公告)号:US20230042944A1

    公开(公告)日:2023-02-09

    申请号:US17967660

    申请日:2022-10-17

    Applicant: SAP SE

    Abstract: In one embodiment, the present invention includes a computer-implemented method comprising storing data in an application using an application custom data type and application custom data structure. The data is stored in a database using the application custom data type and the application custom data structure. In one embodiment, a request is sent to access the data from the application to the database. The data is retrieved from the database in response to the request in the application custom data type and the application custom data structure. In one embodiment, the data is sent from the database to a shared memory in the application custom data type and the application custom data structure and the data is retrieved by the application from the shared memory in the application custom data type and the application custom data structure.

    System and method for unlocking an encryption key chain without compromising security

    公开(公告)号:US11533168B2

    公开(公告)日:2022-12-20

    申请号:US16723466

    申请日:2019-12-20

    Applicant: SAP SE

    Abstract: The system described herein provides for storing the databases and encryption keys for decrypting the data in the databases into two separate partitions. In an embodiment, the first partition includes the databases while the second partition includes a configuration database and a payload database. The payload database stores a data encryption key for decrypting the data stored in the databases. The payload database is encrypted and may be decrypted using a body encryption key. The body encryption key itself is encrypted twice. In the first instance a key encryption key is generated and in the second instance a second access key is generated. The key encryption key or the second access key may be used to decrypt the body encryption key. The second access key is stored in a secure location, to be retrieved in situations when the key encryption key is inaccessible.

    DATABASE INTEGRATION WITH AN EXTERNAL KEY MANAGEMENT SYSTEM

    公开(公告)号:US20220329413A1

    公开(公告)日:2022-10-13

    申请号:US17228986

    申请日:2021-04-13

    Applicant: SAP SE

    Abstract: The present disclosure involves systems, software, and computer implemented methods for database integration with an external key management system. One example method includes receiving, by a database system, a key encryption key from an external key management system external to the database system that is used to encrypt a data encryption key used to encrypt database data. The data encryption key is obtained, by the database system, using the key encryption key. Encrypted database data is decrypted, by the database system and using the data encryption key, to obtain decrypted database data before performing an operation on the decrypted database data. The database system determines that the external key management system has performed an operation on the key encryption key. In response to determining that the external key management system has performed the operation on the key encryption key, the database system modifies operation of the database system.

Patent Agency Ranking