US 12,261,948 B2
Credential sharing
Matthew Hazzard, Circle Pines, MN (US); and Alex Ivanoff, Plymouth, MN (US)
Assigned to Ivanti, Inc., South Jordan, UT (US)
Filed by Ivanti, Inc., South Jordan, UT (US)
Filed on Aug. 26, 2022, as Appl. No. 17/822,545.
Claims priority of provisional application 63/238,093, filed on Aug. 27, 2021.
Prior Publication US 2023/0067169 A1, Mar. 2, 2023
Int. Cl. H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/085 (2013.01) [H04L 9/0825 (2013.01); H04L 9/0891 (2013.01); H04L 9/3268 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method of credential sharing between users in a system, the method comprising:
creating a credential for a first user, the credential being configured such that entry of secure details of the credential into the system enables execution of a first operation and without entry of the secure details the execution of the first operation is prevented;
receiving data indicative of a first selection of the credential and a second selection of a second user, wherein the first user and the second user are users of a plurality of users managed in the system;
responsive to the data indicative of the first and second selections, encrypting the secure details such that the second user is capable of decrypting the secure details and other users of the plurality of the users are incapable of decrypting the secure details, wherein the encrypting includes determining a unique session key specifically for a single instance of sharing the credential with the second user by the first user; encrypting the secure details with the unique session key; and encrypting the unique session key with a public key of the second user;
appending a profile of the second user with encrypted secure details of the credential;
receiving an execution request to perform the first operation from the second user;
responsive to the execution request, decrypting the secure details of the credential and entering decrypted secure details into the system, wherein the decrypting the secure details of the credential includes decrypting the unique session key with a private key of the second user, and descripting the secure details with the decrypted unique session key; and
after entry of the decrypted secure details, authenticating the second user using the secure details and enabling execution of the first operation by the second user.