US 12,335,397 B2
Systems and methods for inter-service authentication
Deepak Sarda, Singapore (SG); and Ramji Venkateswaran, Singapore (SG)
Assigned to JPMORGAN CHASE BANK, N.A., New York, NY (US)
Filed by JPMORGAN CHASE BANK, N.A., New York, NY (US)
Filed on Aug. 30, 2023, as Appl. No. 18/458,555.
Application 18/458,555 is a division of application No. 17/230,780, filed on Apr. 14, 2021, granted, now 11,824,988.
Application 17/230,780 is a continuation of application No. 15/865,355, filed on Jan. 9, 2018, granted, now 11,012,237.
Prior Publication US 2023/0412383 A1, Dec. 21, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3213 (2013.01) [H04L 9/0825 (2013.01); H04L 9/083 (2013.01); H04L 9/3226 (2013.01); H04L 63/0442 (2013.01); H04L 63/083 (2013.01)] 10 Claims
OG exemplary drawing
 
1. A method for inter-service authentication comprising:
in a cloud platform information processing apparatus comprising at least one computer processor and hosting a first service and a second service:
communicating, by the first service, a first request for a public key associated with the second service from a cloud platform, wherein the first request further comprises a first service identifier for the first service;
receiving, by the first service, the public key associated with the second service from the cloud platform;
encrypting, by the first service, a service request to the second service with the public key associated with the second service;
communicating, by the first service, the encrypted service request to the second service;
communicating, by the second service, a second request for a private key associated with the second service from the cloud platform, wherein the second request further comprises a second service identifier for the second service;
validating, by the cloud platform, the second service using the first service identifier and the second service identifier;
providing, by the cloud platform, the private key for the second service to the second service; and
decrypting, by the second service, the encrypted service request using the private key associated with the second service.