Language-agnostic secure application development

    公开(公告)号:US10749689B1

    公开(公告)日:2020-08-18

    申请号:US15638249

    申请日:2017-06-29

    摘要: The disclosed technology for a hardware system to access a secure backend system uses non-volatile memory to hold encrypted secrets, volatile memory to hold decrypted secrets ready for use, a keys-for-all (K4A) server, and app servers running K4A clients. To access the backend system in production, each app server uses a decrypted secret and a certificate that identifies the app server and certifies its role and physical and logical location. At initialization of the app server, a K4A client is instantiated that launches and tracks processes, running on the app server, that are authorized to request decryption services. The K4A client responds to a decryption request from an authorized process, determined based on tracking of processes launched, by requesting decryption by a K4A server, using the certificate, and returns to the process, in volatile memory, a decrypted secret or a reference to the decrypted secret, decrypted by the K4A server.

    Managing multiple proxy servers in a multi-tenant application system environment
    5.
    发明授权
    Managing multiple proxy servers in a multi-tenant application system environment 有权
    在多租户应用系统环境中管理多个代理服务器

    公开(公告)号:US09137172B2

    公开(公告)日:2015-09-15

    申请号:US13854492

    申请日:2013-04-01

    CPC分类号: H04L47/827 G06F17/3089

    摘要: A system and method for managing a plurality of proxy servers in a multi-tenant database system is provided. The method, for example, may include, but is not limited to, receiving, by a processor, a first command, generating, by the processor, a second command for each of the plurality of proxy servers based upon the first command, and transmitting each of the generated second commands to the respective proxy server.

    摘要翻译: 提供了一种用于在多租户数据库系统中管理多个代理服务器的系统和方法。 该方法例如可以包括但不限于由处理器接收第一命令,由处理器根据第一命令为每个代理服务器生成第二命令,并且发送 每个生成的第二命令到相应的代理服务器。

    SYSTEMS, METHODS, AND APPARATUSES FOR PRE-CONFIGURED PER-TENANT ISOLATION IN A MULTI-TENANT CLOUD BASED COMPUTING ENVIRONMENT

    公开(公告)号:US20220247755A1

    公开(公告)日:2022-08-04

    申请号:US17163549

    申请日:2021-01-31

    IPC分类号: H04L29/06

    摘要: Systems, methods, and apparatuses for pre-configured per-tenant isolation in a multi-tenant cloud based computing environment. An exemplary system having a processor and a memory therein includes means for creating an isolation group, in which creating the isolation groups includes: defining isolation requirements, identifying a group of features utilizing call-out functions, and selecting from among the group of features utilizing call-out functions a group of features having the defined isolation requirements; deploying platform software integrating the isolation requirements, in which the platform software contains instructions to map the isolation requirements to a customer organization; creating the customer organization; creating a unique variant of the customer organization, in which creating the unique variant of the customer organization includes declaratively applying an isolation layer containing isolation requirements on top of a base layer for the customer organization; and deploying the unique variant of the customer organization onto the customer organization's computing infrastructure, in which the unique variant validates per-tenant distinctions for various applications subjected to the isolation requirements.

    SECURING DATA USING KEY AGREEMENT

    公开(公告)号:US20220021524A1

    公开(公告)日:2022-01-20

    申请号:US16931210

    申请日:2020-07-16

    摘要: Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices.