US 12,074,982 B2
Authentication of process execution in virtual environments
Tobias Dyrba, Edingen-Neckarhausen (DE); Steffen Koenig, Heidelberg (DE); and Tsonyo Lazkov Yonchev, Sofia (BG)
Assigned to SAP SE, Walldorf (DE)
Filed by SAP SE, Walldorf (DE)
Filed on Mar. 16, 2022, as Appl. No. 17/695,927.
Prior Publication US 2023/0299968 A1, Sep. 21, 2023
Int. Cl. H04L 9/32 (2006.01); G06F 9/455 (2018.01); H04L 9/08 (2006.01)
CPC H04L 9/3242 (2013.01) [G06F 9/45533 (2013.01); H04L 9/088 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
retrieving, at a first virtual machine, a first composite encrypted value comprising a first encrypted secret (Aα_enc) and a first secure hash value of a first secret (Aα);
decrypting the first encrypted secret (Aα_enc) using a cryptographic key (kα) to determine a second secret (Aα′) to be used for initiating a first process (pα) on the first virtual machine, wherein the cryptographic key (kα) is determined based on a set of properties of the first virtual machine that are mutatable during cloning of the first virtual machine;
generating a second secure hash value of the second secret (Aα′);
comparing the second secure hash value with the first secure hash value to determine whether to authorize execution of the first process on the first virtual machine using the first secret (Aα); and
in response to determining that the second secure hash value and the first secure hash value match, initiating the first process (pα) at the first virtual machine by providing the first secret (Aα) for processing through the first process (pα).