US 12,244,724 B2
Encrypted handshake for trust validation between two applications
Rajib Saha, West Bangal (IN); Sateesh Babu Chilamakuri, Tirupati (IN); and Laurent Pelecq, Bois-Colombes (FR)
Assigned to SAP SE, Walldorf (DE)
Filed by SAP SE, Walldorf (DE)
Filed on May 11, 2021, as Appl. No. 17/317,610.
Prior Publication US 2022/0311620 A1, Sep. 29, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3239 (2013.01) [H04L 9/0819 (2013.01); H04L 9/3271 (2013.01); H04L 9/3297 (2013.01); H04L 2209/04 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A system comprising:
at least one hardware processor; and
a computer-readable medium storing instructions that, when executed by the at least one hardware processor, cause the at least one hardware processor to perform operations on a framework comprising:
receiving, by the framework, from a client, a client identification, a first challenge string, a unique index, and a first fixed secret key;
masking, by the framework, the first fixed secret key with a fixed masker, producing a first masked key;
encrypting, by the framework, a hash that includes a first concatenation of the client identification, the first challenge string, and a timestamp, using the first masked key;
sending, by the framework, a first string to the client, with a second non-hashed concatenation of the client identification, the timestamp, the unique index, and the encrypted hash that includes the first concatenation of the client identification, the first challenge string, and the timestamp;
receiving, by the framework, a second string, a second challenge string, and a second fixed secret key;
masking, by the framework, the second fixed secret key with the fixed masker, producing a second masked key;
extracting, by the framework, the client identification, the timestamp, and the encrypted hash from the second string;
decrypting, by the framework, the encrypted hash using the second masked key, producing a decrypted hash;
determining, by the framework, that the client is genuine in response to a determination that the decrypted hash is equal to a hash of a third concatenation of the client identification, the second challenge string, and the timestamp; and
sending, by the framework, a proof of genuineness of the client, to a server, such that the server can grant special privileges to the client based on the determination that the client is genuine, wherein the special privileges include bypassing of a license count of the framework.