-
公开(公告)号:US20230269298A1
公开(公告)日:2023-08-24
申请号:US17651908
申请日:2022-02-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: CHUN LI JIA , Zhi Gang Sun , Yue Lin , Xin Peng Liu
IPC: H04L67/133 , H04L9/32 , H04L9/08
CPC classification number: H04L67/40 , H04L9/32 , H04L9/0819 , H04L9/0838
Abstract: A method, system, and computer program product for protecting API KEYs for accessing services in a cloud environment are disclosed. A first request for generating a virtual key for a user in an organization to access a service in a cloud environment is received. The first request includes information of the organization, an identity of the user, and information of the service. A first authentication request is sent to an identity provider of the organization based on the information of the organization and the identity of the user. In response to the first authentication being successful, an API key for the organization to access the service is determined. The virtual key for the user to access the service is generated based on the API key, the information of the organization, and the identity of the user. The virtual key is returned as a response of the first request.
-
公开(公告)号:US20230362170A1
公开(公告)日:2023-11-09
申请号:US17662242
申请日:2022-05-06
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Qian Xia Song , Xiao Ling Chen , Ai Ping Feng , CHUN LI JIA , Jin Jin Yang , Kui Zhang , Dong Chen
IPC: H04L9/40
CPC classification number: H04L63/105 , H04L63/0876
Abstract: Method, systems, and computer program products for access configuration in hybrid network environments are disclosed. According to the method, an access configuration request is received from a client device in a first network environment, wherein the access configuration request is associated with an access to a network resource in a second network environment and comprises first authentication information associated with the client device. Further, second authentication information associated with the network resource is obtained. The first and second authentication information is further used to determine whether the access configuration request is verified. If the access configuration request is verified, connectivity between the client device and the network resource can be automatically established.
-