SYSTEMS AND METHODS FOR CONTAINERIZED DATA SECURITY
First Claim
1. A system useful in facilitating containerized data security, the system comprising:
- a data store containing at least an encrypted plurality of N containers, including a first container, said first container including data associated with a unit of interest to the system and encrypted instructions corresponding to at least one application; and
a computer processing unit;
a network interface in data communication with said computer processing unit and said data store; and
memory in data communication with said computer processing unit and containing executable instructions for causing said computer processing unit to perform a containerized data security method including;
(a) obtaining a first external communication from a source external to the system;
(b) associating said first external communication with said first container;
(c) authenticating said first external communication with respect to said first container;
(d) providing said first external communication to an unencrypted instance of said first container in said memory;
(e) obtaining a first responsive communication from said unencrypted instance of said first container; and
(f) providing said first responsive communication to said source external to the system.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided herein are systems and methods useful in facilitating containerized data security. The system may include a data store, a computer processing unit, a network interface, and memory. The memory may contain executable instructions for causing the system to perform a containerized data security method including obtaining a first external communication from a source external to the system; associating the first external communication with the first container; authenticating the first external communication with respect to the first container; providing the first external communication to an unencrypted instance of the first container in the memory; obtaining a first responsive communication from the unencrypted instance of the first container; and providing the first responsive communication to the source external to the system.
-
Citations
20 Claims
-
1. A system useful in facilitating containerized data security, the system comprising:
-
a data store containing at least an encrypted plurality of N containers, including a first container, said first container including data associated with a unit of interest to the system and encrypted instructions corresponding to at least one application; and a computer processing unit; a network interface in data communication with said computer processing unit and said data store; and memory in data communication with said computer processing unit and containing executable instructions for causing said computer processing unit to perform a containerized data security method including; (a) obtaining a first external communication from a source external to the system; (b) associating said first external communication with said first container; (c) authenticating said first external communication with respect to said first container; (d) providing said first external communication to an unencrypted instance of said first container in said memory; (e) obtaining a first responsive communication from said unencrypted instance of said first container; and (f) providing said first responsive communication to said source external to the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 13)
-
-
11. A system useful in facilitating containerized data security, the system comprising:
-
a data store containing at least;
an encrypted version of a first container, said first container including instructions corresponding to a first authentication step and an encrypted version of a second container, said second container including instructions corresponding to a second authentication step and an encrypted version of a third container;a computer processing unit; a network interface in data communication with said computer processing unit and said data store; and memory in data communication with said computer processing unit and containing executable instructions for causing said computer processing unit to perform a containerized data security method comprising; (a) obtaining a first external communication from a source external to the system; (b) associating said first external communication with said first container; (c) authenticating said first external communication with respect to said first container; (d) obtaining said new encrypted version of said first container from said data store; (e) decrypting said encrypted version of said first container; and (f) instantiating an unencrypted instance of said first container in said memory; (g) obtaining a first responsive communication from said unencrypted instance of said first container, said first responsive communication being associated with said first authentication step; (h) providing said first responsive communication to said source external to the system; (i) obtaining a second external communication from said source external to the system; (j) associating said second external communication with said first container; (k) providing said second external communication to said unencrypted instance of said first container; (l) obtaining a second responsive communication from said unencrypted instance of said first container, said second responsive communication being associated with said second authentication step; (m) providing said second responsive communication to said source external to the system; (n) obtaining a third external communication from said source external to the system; (o) associating said third external communication with said first container; and (p) providing said third external communication to said unencrypted instance of said first container. - View Dependent Claims (12, 14)
-
-
15. A system useful in facilitating containerized data security, the system comprising:
-
a data store containing at least an encrypted plurality of N containers, including a first container, said first container including publicly accessible data associated with the system and encrypted instructions corresponding to at least one application; and a computer processing unit; a network interface in data communication with said computer processing unit and said data store; and memory in data communication with said computer processing unit and said data store and containing executable instructions for causing said computer processing unit to perform a containerized data security method including; (a) obtaining an encrypted version of said first container from said data store; (b) decrypting said encrypted version of said first container; and (c) instantiating an unencrypted instance of said first container in said memory (d) obtaining a first external communication from a source external to the system; (e) associating said first external communication with said first container; (f) providing said first external communication to an unencrypted instance of said first container in said memory; and (g) obtaining a first responsive communication from said unencrypted instance of said first container. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification