Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credential vault encryption

a vault encryption and credential technology, applied in the field of credential vault encryption, can solve problems such as potential problems in web applications

Inactive Publication Date: 2008-03-27
ORACLE INT CORP
View PDF75 Cites 98 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a system for controlling passwords in a reverse proxy system. The system uses a credential vault to store secondary passwords for applications accessed through the reverse proxy. These secondary passwords are encrypted with a primary password for a single sign on system. The primary password can be used to decrypt the secondary passwords and provide them to the application. The technical effect of this system is to ensure the security of the secondary passwords and to provide a centralized governance for the reverse proxy.

Problems solved by technology

Web applications have become increasingly popular within the enterprise as a result of their flexibility of deployment and their relatively intuitive interfaces, but web applications present potential problems in the enterprise environment due to security and governance issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credential vault encryption
  • Credential vault encryption
  • Credential vault encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]Some embodiments of the present invention may be useful in reverse proxy and Single Sign On (SSO) environments.

[0021]FIG. 1 shows an exemplary reverse proxy, single-sign-on environment. A user browser 102 can access functionality through the reverse proxy 104. In the example of FIG. 1, a request for “http: / / reverseproxy.companyname.com / mail” is sent to the reverse proxy 104 and mapped to a resource 106 at “http: / / mail.companyname.com”. In one embodiment, the reverse proxy 104 can be set up to access the web application instances 106 and 108.

[0022]For purposes of this application a reverse proxy can be any system that can do such a reverse mapping. In one embodiment, a reverse proxy is a server that proxies content from a remote web application to an end-user and may or may not modify that content.

[0023]No additional or supplemental functionality, such as SSO, should be imputed to the meaning of the term “Reverse Proxy” or “Proxy”.

[0024]Supplemental functionalities can include ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Application role mappings can be maintained at a reverse proxy server. When a request for a web application is received at the reverse proxy servers, the proper user role for the web application can be determined at the reverse proxy server. The proper user role can be sent as part of a HTTP header to the web application. The web application can use the user role without doing an independent mapping of the user to a role.

Description

CLAIM OF PRIORITY[0001]This application claims priority to U.S. Provisional Application No. 60 / 826,633 entitled “Runner Security” by Pandrangi et al., filed Sep. 22, 2006 which is hereby incorporated by reference [Atty. Docket No. BEAS-02041US0] and to U.S. Provisional Application No. 60 / 883,398 entitled “Runner” by Hayler et al., filed Jan. 4, 2007 which is hereby incorporated by reference [Atty. Docket No. BEAS-02042US0].COPYRIGHT NOTICE[0002]A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.BACKGROUND OF INVENTION[0003]Web applications have become increasingly popular within the enterprise as a result of their flexibility of deployment and their relatively intuitive int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F17/00G06F40/00
CPCG06F12/1466H04L63/0281H04L63/083H04L63/0815H04L63/0428
Inventor HAYLER, DON L.VU, DANIEL
Owner ORACLE INT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products