Search International and National Patent Collections
Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (US20190207771) DETECTING COMPROMISED CLOUD-IDENTITY ACCESS INFORMATION

Office : United States of America
Application Number: 15860527 Application Date: 02.01.2018
Publication Number: 20190207771 Publication Date: 04.07.2019
Publication Kind : A1
IPC:
H04L 9/32
H04L 9/30
H04L 9/14
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
32
including means for verifying the identity or authority of a user of the system
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
28
using particular encryption algorithm
30
Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
14
using a plurality of keys or algorithms
CPC:
H04L 9/14
H04L 9/3247
H04L 9/3226
H04L 9/30
Applicants: CyberArk Software Ltd.
Inventors: Asaf Hecht
Kobi Ben Naim
Priority Data:
Title: (EN) DETECTING COMPROMISED CLOUD-IDENTITY ACCESS INFORMATION
Abstract: front page image
(EN)

Systems and methods are provided for identifying potentially compromised cloud-based access information. The systems and methods include providing a unique signature for insertion into application programming interface (API) communications to be sent from a network resource to a cloud application executable in a cloud environment. The unique signature can be associated with an access token that a particular identity can use to request access to the cloud application. The systems and methods include accessing a log associated with the cloud environment, identifying the unique signature and the access token using information in the log, accessing a trusted validation resource storing signature information associated with the access token, determining whether the unique signature is valid, and determining whether the access token is potentially compromised.