VIRTUAL SERVICE PROVIDER ZONES
First Claim
Patent Images
1. A system, comprising:
- memory to store instructions that, if executed by one or more processors of the system, cause the system to;
identify data to be stored in a first data storage device at a first location and a second data storage device at a different second location;
encrypt, based at least in part on a storage requirement associated with the different second location, a portion of the data; and
cause storage of the encrypted portion on the second data storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received by the service proxy, the service proxy encrypts the data and stores the data in encrypted form at the service. Similarly, when a request to retrieve data is received by the service proxy, the service proxy obtains encrypted data from the service and decrypts the data. The data may be encrypted using a key that is kept inaccessible to the service.
13 Citations
20 Claims
-
1. A system, comprising:
memory to store instructions that, if executed by one or more processors of the system, cause the system to; identify data to be stored in a first data storage device at a first location and a second data storage device at a different second location; encrypt, based at least in part on a storage requirement associated with the different second location, a portion of the data; and cause storage of the encrypted portion on the second data storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computer-implemented method, comprising:
-
identifying data to be stored in a first data storage device at a first location and a second data storage device at a different second location; encrypting, based at least in part on a storage requirement associated with the different second location, a portion of the data; and causing storage of the encrypted portion on the second data storage device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon executable instructions that, if executed by one or more processors of a computer system, cause the computer system to at least:
-
identify data to be stored in a first data storage device at a first location and a second data storage device at a different second location; encrypt, based at least in part on a storage requirement associated with the different second location, a portion of the data; and cause storage of the encrypted portion on the second data storage device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification