Language-agnostic secure application development

    公开(公告)号:US10749689B1

    公开(公告)日:2020-08-18

    申请号:US15638249

    申请日:2017-06-29

    Abstract: The disclosed technology for a hardware system to access a secure backend system uses non-volatile memory to hold encrypted secrets, volatile memory to hold decrypted secrets ready for use, a keys-for-all (K4A) server, and app servers running K4A clients. To access the backend system in production, each app server uses a decrypted secret and a certificate that identifies the app server and certifies its role and physical and logical location. At initialization of the app server, a K4A client is instantiated that launches and tracks processes, running on the app server, that are authorized to request decryption services. The K4A client responds to a decryption request from an authorized process, determined based on tracking of processes launched, by requesting decryption by a K4A server, using the certificate, and returns to the process, in volatile memory, a decrypted secret or a reference to the decrypted secret, decrypted by the K4A server.

    Managing multiple proxy servers in a multi-tenant application system environment
    5.
    发明授权
    Managing multiple proxy servers in a multi-tenant application system environment 有权
    在多租户应用系统环境中管理多个代理服务器

    公开(公告)号:US09137172B2

    公开(公告)日:2015-09-15

    申请号:US13854492

    申请日:2013-04-01

    CPC classification number: H04L47/827 G06F17/3089

    Abstract: A system and method for managing a plurality of proxy servers in a multi-tenant database system is provided. The method, for example, may include, but is not limited to, receiving, by a processor, a first command, generating, by the processor, a second command for each of the plurality of proxy servers based upon the first command, and transmitting each of the generated second commands to the respective proxy server.

    Abstract translation: 提供了一种用于在多租户数据库系统中管理多个代理服务器的系统和方法。 该方法例如可以包括但不限于由处理器接收第一命令,由处理器根据第一命令为每个代理服务器生成第二命令,并且发送 每个生成的第二命令到相应的代理服务器。

    Securing data with symmetric keys generated using inaccessible private keys

    公开(公告)号:US11368292B2

    公开(公告)日:2022-06-21

    申请号:US16931210

    申请日:2020-07-16

    Abstract: Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices.

    SECURING DATA USING KEY AGREEMENT

    公开(公告)号:US20220021525A1

    公开(公告)日:2022-01-20

    申请号:US16931226

    申请日:2020-07-16

    Abstract: Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices.

    Systems and methods for securing data

    公开(公告)号:US10541811B2

    公开(公告)日:2020-01-21

    申请号:US14635265

    申请日:2015-03-02

    Abstract: Embodiments include an apparatus for securing customer data and include a processor, and one or more stored sequences of instructions which, when executed, cause the processor to store an encrypted first key fragment in a first storage area, store an encrypted second key fragment in a separate second storage area, wherein access to the first storage area and to the second storage area is mutually exclusive. The instructions further cause the processor to decrypt the encrypted first key fragment and the encrypted second key fragment using a key set and keys associated with a hardware security module based on receiving a request to derive a master key. The master key is derived using the decrypted first key fragment and the decrypted second key fragment and stored in an in-memory cache. The master key is used to encrypt or to decrypt encrypted customer data.

Patent Agency Ranking