US 12,355,843 B2
Protecting API keys for accessing services
Chun Li Jia, Beijing (CN); Zhi Gang Sun, Beijing (CN); Yue Lin, Beijing (CN); and Xin Peng Liu, Beijing (CN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed on Feb. 22, 2022, as Appl. No. 17/651,908.
Prior Publication US 2023/0269298 A1, Aug. 24, 2023
Int. Cl. H04L 67/133 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 67/133 (2022.05) [H04L 9/0819 (2013.01); H04L 9/0838 (2013.01); H04L 9/32 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
receiving, by one or more processors, a first request for generating a virtual key for a user in an organization to access a service in a cloud environment, wherein the first request comprises information of the organization, an identity of the user in the organization, and information of the service, and wherein an API key is required to access the service;
sending, by the one or more processors, a first authentication request to an identity provider of the organization based on the information of the organization and the identity of the user in the organization;
determining, by the one or more processors, whether the first authentication is successful; and
in response to the first authentication being successful,
determining, by the one or more processors, the API key for the organization to access the service by querying the API key for the organization to access the service to a storage which stores a mapping between API keys and organizations;
responsive to obtaining the API key from the query, utilizing a public key to encrypt the API key, the information of the organization and the identity of the user in the organization to generate the virtual key; and
returning, by the one or more processors, the virtual key as a response of the first request.