×

Systems and methods for cloud data security

  • US 9,736,127 B2
  • Filed: 01/12/2016
  • Issued: 08/15/2017
  • Est. Priority Date: 03/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computing device for protecting stored data accessed by a cloud-based service platform, the computing device comprising:

  • a network connection;

    a working memory device;

    a persistent data storage medium; and

    one or more processors coupled to the working memory device, the network connection and the persistent data storage medium, the persistent data storage medium containing instructions that, when executed on the computing device, cause the computing device to perform operations including;

    receiving, over the network connection using the one or more processors, a document as part of a service request from a first user of the cloud-based service platform;

    maintaining, within the working memory device, the document, without writing the document to the persistent data storage medium;

    performing, while the document continues to maintained within the working memory device, a first action involving the document in satisfaction of a portion of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document;

    transmitting, over the network connection using the one or more processors and in response to completion of the first action, the document to a security service provider for encryption;

    deleting the document from the cloud-based service platform in response to receiving a confirmation of receipt of the document from the security service provider;

    storing an encrypted version of the document in response to receiving the encrypted version of the document over the network connection from the security service provider;

    determining, after deleting the document, that a second action required to complete performance of the service request requires access to the document in unencrypted form on the computing device;

    sending, in response to determining the second action requires access to the document, the encrypted version of the document back to the security service provider for decryption;

    receiving, into the working memory device, the document in unencrypted form from the security service provider in response to sending the encrypted version of the document;

    performing, using the one or more processors, a second action involving the document in satisfaction of at least part of the service request, while maintaining the document in working memory, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and

    upon completion of the second action involving the document, deleting the document from the working memory device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×