Management of secure data in cloud-based network
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor from an instantiated virtual machine in a cloud-based network, a request to access secure data;
translating, by the processor, the request in order to locate the secure data in a secure data store located at a data facility, wherein the request indirectly references the secure data in the secure data store;
retrieving, by the processor, the secure data from the secure data store with the translated request;
applying, by the processor, a protective mechanism to the secure data to generate protected secure data, wherein applying the protective mechanism comprises masking the secure data to generate masked data;
transmitting the protected secure data from the secure data store to the instantiated virtual machine in the cloud-based network;
decoding the protected secure data in the instantiated virtual machine to generate decoded secure data;
operating on decoded secure data in the instantiated virtual machine to generate updated secure data; and
transmitting the updated secure data from the instantiated virtual machine to the secure data store.
1 Assignment
0 Petitions
Accused Products
Abstract
A processor receives a request to access secure data. The processor translates the request in order to locate the secure data in a secure data store. The processor retrieves the secure data from the secure data store. The processor encodes the secure data to generate protected secure data. The processor transmits the protected secure data from the secure data store to at least one instantiated virtual machine in a cloud-based network.
-
Citations
15 Claims
-
1. A method comprising:
-
receiving, by a processor from an instantiated virtual machine in a cloud-based network, a request to access secure data; translating, by the processor, the request in order to locate the secure data in a secure data store located at a data facility, wherein the request indirectly references the secure data in the secure data store; retrieving, by the processor, the secure data from the secure data store with the translated request; applying, by the processor, a protective mechanism to the secure data to generate protected secure data, wherein applying the protective mechanism comprises masking the secure data to generate masked data; transmitting the protected secure data from the secure data store to the instantiated virtual machine in the cloud-based network; decoding the protected secure data in the instantiated virtual machine to generate decoded secure data; operating on decoded secure data in the instantiated virtual machine to generate updated secure data; and transmitting the updated secure data from the instantiated virtual machine to the secure data store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a memory; a processor, operatively couple to the memory, the processor to; receive a request for secure data from an instantiated virtual machine in a cloud-based network, translate the request in order to locate the secure data in a secure data store, retrieve the secure data from the secure data store located at a data facility, wherein the request indirectly references the secure data in the secure data store, apply a protective mechanism to the secure data to generate protected secure data, the protective mechanism being a masking operation to generate masked data, transmit the protected secure data from the secure data store to the instantiated virtual machine in the cloud-based network; decode the protected secure data in the instantiated virtual machine to generate decoded secure data; operate on decoded secure data in the instantiated virtual machine to generate updated secure data; and transmit the updated secure data from the instantiated virtual machine to the secure data store. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium programmed to comprise instructions that, when executed by a processor, cause the processor to comprising:
-
receive, by the processor from an instantiated virtual machine in a cloud-based network, a request to access secure data; translate, by the processor, the request in order to locate the secure data in a secure data store located at a data facility, wherein the request indirectly references the secure data in the secure data store; retrieve, by the processor, the secure data from the secure data store with the translated request; apply, by the processor, a protective mechanism to the secure data to generate protected secure data, wherein applying the protective mechanism comprises masking the secure data to generate masked data; transmit the protected secure data from the secure data store to the instantiated virtual machine in the cloud-based network; decode the protected secure data in the instantiated virtual machine to generate decoded secure data; operate on decoded secure data in the instantiated virtual machine to generate updated secure data; and transmit the updated secure data from the instantiated virtual machine to the secure data store. - View Dependent Claims (15)
-
Specification