DATA PROTECTION HUB
First Claim
Patent Images
1. A data protection hub, comprising:
- a processor; and
a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method comprising;
receiving a data protection request message comprising unprotected data and one or more policy parameters;
determining a data protection transformation using the policy parameters;
performing the data protection transformation on the unprotected data to generate protected data; and
sending the protected data.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention broadly described, introduce systems and methods for protecting data at a data protection hub using a data protection policy. One embodiment of the invention discloses a method for protecting unprotected data. The method comprises receiving a data protection request message comprising unprotected data and one or more policy parameters, determining a data protection transformation using the policy parameters, performing the data protection transformation on the unprotected data to generate protected data, and sending the protected data
315 Citations
18 Claims
-
1. A data protection hub, comprising:
-
a processor; and a non-transitory computer-readable storage medium, comprising code executable by the processor for implementing a method comprising; receiving a data protection request message comprising unprotected data and one or more policy parameters; determining a data protection transformation using the policy parameters; performing the data protection transformation on the unprotected data to generate protected data; and sending the protected data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method comprising:
-
receiving, by a processor, a data protection request message comprising unprotected data and one or more policy parameters; determining, by the processor, a data protection transformation using the policy parameters; performing, by the processor, the data protection transformation on the unprotected data to generate protected data; and sending, by the processor, the protected data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method comprising:
-
sending, by a processor, a data protection request message comprising unprotected data and one or more policy parameters; and receiving, by the processor, protected data, wherein the protected data is generated by a data protection transformation, wherein the data protection transformation is determined using the policy parameters. - View Dependent Claims (18)
-
Specification