Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for password protection of applications

A password protection, password technology, used in transmission systems, digital transmission systems, digital data protection and other directions

Inactive Publication Date: 2015-09-09
SIEMENS AG
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a security module is used to store the cryptographic keys for encrypting the application data in the context of hosting the application on the computing center of an external service provider, it proves to be disadvantageous that in the usual authentication by PIN at each access This PIN must be entered manually whenever the security module is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for password protection of applications
  • Method and system for password protection of applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The embodiment of the method of the invention described below relates to the password protection of the application APPL belonging to the figure 1 and figure 2 The application owner denoted by the reference sign AO in . The application owner here is the entity or organization to which the application APPL belongs, such as an enterprise. For example, an application APPL may be developed by the application owner. With this application, the application owner offers its customers a corresponding service, wherein the application owner does not implement the application himself to provide the service, but instead operates the computing center for this purpose, on which the application runs. The computing center is thus an external unit managed by a service operator not belonging to the application owner AO. There is therefore a need to protect the application APPL or the corresponding application data from unauthorized access by the service operator in a suitable manner. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method is provided for cryptographic protection of an application associated with an application owner and executed in an external data processing center having a security module that stores private cryptographic material of the application owner. A first secure channel between the security module and application owner and a second secure channel between the application owner and the application are used for transmitting a cryptographic key. The cryptographic key is automatically made available to the secure module and the application via the secure channels, without the data processing center service operator being able to access said key. The application can authenticate itself using the key so that the cryptographic material can be transmitted to the application via a channel protected by the cryptographic key. The application data can be encrypted using the cryptographic material such that the application data cannot be accessed by the data processing center service operator.

Description

technical field [0001] The present invention relates to methods and systems for password protecting applications. Background technique [0002] It is known from the prior art that within the scope of what is known as cloud computing, computing capabilities are provided by service providers to third parties, which third parties use the computing capabilities for implementing applications. These applications run here on the service provider's computing centers, which can be located either centrally at one location or can also be interconnected in a distributed manner to introduce flexible services. [0003] A customer in the form of an application owner of a service operator is interested in the possibility that the service operator does not have access to the application or the application data generated by the application, wherein the customer wants the application belonging to him to be available on the service operator's computer run on the center. It is therefore necess...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06F21/62
CPCH04L9/0877H04L9/32H04L63/061G06F21/6263H04L63/08H04L9/08H04L9/3234H04L9/0827H04L9/3247G06F2221/2153H04L63/123G06F2221/2107
Inventor M.迈德尔S.泽尔茨萨姆
Owner SIEMENS AG