Systems and methods for cloud data security
First Claim
1. A computing device for protecting stored data accessed by a cloud-based service platform, the computing device comprising:
- a network connection;
a working memory device;
a persistent data storage medium; and
one or more processors coupled to the working memory device, the network connection and the persistent data storage medium, the persistent data storage medium containing instructions that, when executed on the computing device, cause the computing device to perform operations including;
receiving, over the network connection using the one or more processors, a document as part of a service request from a first user of the cloud-based service platform;
maintaining, within the working memory device, the document, without writing the document to the persistent data storage medium;
performing, while the document continues to maintained within the working memory device, a first action involving the document in satisfaction of a portion of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document;
transmitting, over the network connection using the one or more processors and in response to completion of the first action, the document to a security service provider for encryption;
deleting the document from the cloud-based service platform in response to receiving a confirmation of receipt of the document from the security service provider;
storing an encrypted version of the document in response to receiving the encrypted version of the document over the network connection from the security service provider;
determining, after deleting the document, that a second action required to complete performance of the service request requires access to the document in unencrypted form on the computing device;
sending, in response to determining the second action requires access to the document, the encrypted version of the document back to the security service provider for decryption;
receiving, into the working memory device, the document in unencrypted form from the security service provider in response to sending the encrypted version of the document;
performing, using the one or more processors, a second action involving the document in satisfaction of at least part of the service request, while maintaining the document in working memory, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and
upon completion of the second action involving the document, deleting the document from the working memory device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user'"'"'s control.
-
Citations
22 Claims
-
1. A computing device for protecting stored data accessed by a cloud-based service platform, the computing device comprising:
-
a network connection; a working memory device; a persistent data storage medium; and one or more processors coupled to the working memory device, the network connection and the persistent data storage medium, the persistent data storage medium containing instructions that, when executed on the computing device, cause the computing device to perform operations including; receiving, over the network connection using the one or more processors, a document as part of a service request from a first user of the cloud-based service platform; maintaining, within the working memory device, the document, without writing the document to the persistent data storage medium; performing, while the document continues to maintained within the working memory device, a first action involving the document in satisfaction of a portion of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document; transmitting, over the network connection using the one or more processors and in response to completion of the first action, the document to a security service provider for encryption; deleting the document from the cloud-based service platform in response to receiving a confirmation of receipt of the document from the security service provider; storing an encrypted version of the document in response to receiving the encrypted version of the document over the network connection from the security service provider; determining, after deleting the document, that a second action required to complete performance of the service request requires access to the document in unencrypted form on the computing device; sending, in response to determining the second action requires access to the document, the encrypted version of the document back to the security service provider for decryption; receiving, into the working memory device, the document in unencrypted form from the security service provider in response to sending the encrypted version of the document; performing, using the one or more processors, a second action involving the document in satisfaction of at least part of the service request, while maintaining the document in working memory, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and upon completion of the second action involving the document, deleting the document from the working memory device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for protecting stored data accessed by a cloud-based service platform, the method comprising:
on a computing system within the cloud-based document management service platform performing operations including; receiving, over a network connection using one or more processors, a document as part of a service request from a first user of the cloud-based service platform; maintaining, within working memory on the computing system, the document, without writing the document to persistent data storage on the computing system; performing, while the document continues to maintained within the working memory, a first action involving the document in satisfaction of a portion of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document; transmitting, over the network connection using the one or more processors and in response to completion of the first action, the document to a security service provider for encryption; deleting the document from the cloud-based service platform in response to receiving a confirmation of receipt of the document from the security service provider; storing an encrypted version of the document in response to receiving the encrypted version of the document over the network connection from the security service provider; determining, after deleting the document, that a second action involved in performance of the service request requires access to the document in unencrypted form on the computing system; sending the encrypted version of the document back to the security service provider for decryption; receiving, in response to sending the encrypted version of the document, the document in unencrypted form from the security service provider; performing, using the one or more processors, the second action involving the document in satisfaction of at least part of the service request, while maintaining the unencrypted form of the document in working memory, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and upon completion of the second action involving the document, deleting the document from the cloud-based service platform. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 22)
-
19. A non-transitory computer-readable storage medium containing instructions that, when executed on a computer system within a cloud-based service platform, cause the computer system to perform operations including:
-
receiving, over a network connection, a document as part of a service request from a first user of the cloud-based service platform; maintaining, within working memory on the computing system, the document, without writing the document to persistent data storage on the computing system; performing, while the document continues to maintained within the working memory device, a first action involving the document in satisfaction of a portion of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document; transmitting, over the network connection and in response to completion of the first action, the document to a security service provider for encryption; deleting the document from the cloud-based service platform in response to receiving a confirmation of receipt of the document from the security service provider; storing an encrypted version of the document in response to receiving the encrypted version of the document over the network connection from the security service provider; determining, after deleting the document, that a second action involved in performance of the service request requires access to the document in unencrypted form on the computing system; sending the encrypted version of the document back to the security service provider for decryption; receiving, in response to sending the encrypted version of the document, the document in unencrypted form from the security service provider; performing the second action involving the document in satisfaction of at least part of the service request, while maintaining the unencrypted form of the document in working memory, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and upon completion of the second action involving the document, deleting the document from the cloud-based service platform for at least a second time. - View Dependent Claims (20, 21)
-
Specification