SYSTEM AND METHOD FOR AUTOMATICALLY SECURING SENSITIVE DATA IN PUBLIC CLOUD USING A SERVERLESS ARCHITECTURE
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute service, a notification that a sensitive file comprising sensitive data has been received at a file receipt location, the sensitive file being sent by a client device; generating, by the cloud compute service, a container instance in response to the notification; retrieving, by the container instance, the sensitive file from the file receipt location; generating, by the container instance, a stripped file by stripping the sensitive data from the sensitive file based on a configuration file; transmitting, by the container instance, the stripped file to a storage location; deleting the sensitive file and associated file pointers from the file receipt location; and terminating the container instance, wherein terminating the container instance comprises deleting files comprising sensitive data and associated file pointers.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A file receipt location system, comprising:
-
one or more first memory units containing instructions; and one or more processors configured to execute the instructions to perform operations comprising; receiving a file from a client device, the file comprising sensitive information; transmitting, to a cloud compute service, a notification comprising a tag associated with the file, the tag identifying one of a vendor or service provider; receiving, from the cloud compute service in response to the notification, a request to access the file; transmitting the file to the cloud compute service based on the request; and deleting the file. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method for processing a job at a file receipt location, the method comprising:
-
receiving a file from a client device, the file comprising sensitive information; transmitting, to a cloud compute service, a notification comprising a tag associated with the file, the tag identifying one of a vendor or service provider; receiving, from the cloud compute service in response to the notification, a request to access the file; transmitting the file to the cloud compute service based on the request; and deleting the file. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
Specification