Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for managing encryption keys for single-sign-on applications

An application, single sign-on technology, applied in transmission systems, digital transmission systems, usage of multiple keys/algorithms, etc., can solve problems such as inconvenience

Active Publication Date: 2018-12-21
GEN DIGITAL INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Implementing these measures can also be inconvenient for users as they are asked to provide authentication credentials every time they access cloud-based applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for managing encryption keys for single-sign-on applications
  • Systems and methods for managing encryption keys for single-sign-on applications
  • Systems and methods for managing encryption keys for single-sign-on applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present disclosure generally relates to systems and methods for managing encryption keys for single sign-on applications. As will be explained in more detail below, the systems and methods described herein can manage encryption keys to facilitate single sign-on without compromising the security of encrypted data. The systems and methods described herein can provide user access to encrypted data residing at multiple cloud services without requiring re-authentication and without storing encryption keys with the encrypted data. In some embodiments of the disclosed system, the cloud service never has access to the keys needed to decrypt the data storage, and the data at each encrypted data storage can be encrypted using a unique encryption key. In some embodiments, the disclosed systems and methods can facilitate single sign-on from multiple devices. In addition to providing single sign-on to cloud applications, the disclosed systems and methods can also be applied to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed computer-implemented method for managing encryption keys for single-sign-on applications may include (1) receiving, from an identity service, notification of a request to access encrypted data on a cloud service, the notification including a session key for encrypting and decrypting a master key for decrypting cloud service keys, (2) deriving the master key, (3) decrypting, using themaster key, a cloud service key for decrypting data on the cloud service, (4) storing the master key, encrypted using the session key, (5) receiving an additional notification of an additional request to access encrypted data on an additional cloud service, the notification including the session key, (6) without again obtaining the authentication element from the user, decrypting the master key,and (7) decrypting, using the master key, an additional cloud service key for decrypting data on the additional cloud service. Various other methods, systems, and computer-readable media are also disclosed.

Description

Background technique [0001] More and more individuals and organizations are using cloud-based systems for data storage, even for sensitive data. In most cases, cloud data storage systems are operated by large, reputable companies that rely on best practices to ensure the security of their client data. Unfortunately, even best practices may not adequately protect sensitive data, as evidenced by several widely reported breaches of sensitive data stored in cloud services. [0002] Data stored in cloud services is often vulnerable at multiple points. Anyone who can obtain or guess the account username and password can gain access to the user's cloud service account. Data can be transmitted unencrypted or with only weak encryption in either direction between the user and the cloud service. System administrators or data backup services employed by cloud services may be able to access user data and transmit it to unauthorized recipients. Also, while cloud services may store user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/06H04L9/3228H04L9/0822H04L9/14
Inventor I·索科洛夫K·纽斯塔特
Owner GEN DIGITAL INC