US 11,790,057 B2
Controlling program execution using an access key
Gernot Sachs, Wiesloch (DE)
Assigned to SAP SE, Walldorf (DE)
Filed by SAP SE, Walldorf (DE)
Filed on Aug. 17, 2021, as Appl. No. 17/404,404.
Prior Publication US 2023/0066159 A1, Mar. 2, 2023
Int. Cl. G06F 21/12 (2013.01); H04L 9/32 (2006.01); H04L 9/30 (2006.01); H04L 9/08 (2006.01); G06F 8/60 (2018.01); G06F 21/10 (2013.01)
CPC G06F 21/121 (2013.01) [H04L 9/0825 (2013.01); H04L 9/302 (2013.01); H04L 9/3247 (2013.01); G06F 8/60 (2013.01); G06F 21/1063 (2023.08)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
deploying, from a vendor system to a customer system, a first computer program;
receiving, from the customer system, an indication of an inconsistency in a data table encountered during execution of the first computer program;
accessing a second computer program designed to fix the inconsistency;
defining at least one vendor access parameter for the second computer program;
deploying from the vendor system to the customer system, the second computer program;
receiving, from a customer at the customer system, an access key requesting access to execute the second computer program,
wherein the access key comprises a digital signature and at least one customer access parameter;
validating, at the customer system, the digital signature using a public key private key pair,
wherein the private key of the public key private key pair is known by the vendor system as corresponding to one or more vendor-approved users having requisite knowledge to correctly execute the second program to fix the inconsistency;
verifying that the at least one customer access parameter matches the at least one vendor access parameter; and
in response to the verifying, causing execution of the second computer program on the customer system.