Systems and methods for cloud data security
First Claim
1. A computing device for performing a cloud-based service, the computing device comprising:
- a network connection;
a working memory device;
a persistent data storage medium;
one or more processors coupled to the working memory device, the network connection and the persistent data storage medium, the persistent data storage medium containing instructions that, when executed on the system, cause the system to perform operations including;
receiving, over the network connection, a document as part of a service request from a first user of the cloud-based service;
performing, using the one or more processors, a first action involving the document in satisfaction of a first part of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document;
maintaining, during performance of the first action, the document within the working memory device, without writing the document to the persistent data storage medium;
transmitting, over the network connection in response to completion of the first action, the document to a security service provider for persistent storage;
deleting the document from the working memory device in response to receiving a confirmation of receipt of the document from the security service provider;
determining, after deleting the document, that a pending action associated with performance of the service request requires access to the document;
receiving in response to a request, over the network connection using the one or more processors, the document from the security service provider;
in response to receiving the document, maintaining the document within the working memory device, without writing the document to the persistent data storage medium;
performing, using the one or more processors, a second action involving the document in satisfaction of a second part of the service request, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and
upon completion of processing involving the document subsequent to the completion of the second action, deleting the document from the working memory device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user'"'"'s control.
32 Citations
22 Claims
-
1. A computing device for performing a cloud-based service, the computing device comprising:
-
a network connection; a working memory device; a persistent data storage medium; one or more processors coupled to the working memory device, the network connection and the persistent data storage medium, the persistent data storage medium containing instructions that, when executed on the system, cause the system to perform operations including; receiving, over the network connection, a document as part of a service request from a first user of the cloud-based service; performing, using the one or more processors, a first action involving the document in satisfaction of a first part of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document; maintaining, during performance of the first action, the document within the working memory device, without writing the document to the persistent data storage medium; transmitting, over the network connection in response to completion of the first action, the document to a security service provider for persistent storage; deleting the document from the working memory device in response to receiving a confirmation of receipt of the document from the security service provider; determining, after deleting the document, that a pending action associated with performance of the service request requires access to the document; receiving in response to a request, over the network connection using the one or more processors, the document from the security service provider; in response to receiving the document, maintaining the document within the working memory device, without writing the document to the persistent data storage medium; performing, using the one or more processors, a second action involving the document in satisfaction of a second part of the service request, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and upon completion of processing involving the document subsequent to the completion of the second action, deleting the document from the working memory device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for protecting stored data accessed by a cloud-based service platform, the method comprising:
-
on a computing device within the cloud-based document management service platform performing operations including; receiving, over a network connection using one or more processors, a document as part of a service request from a first user of the cloud-based service platform; performing, using the one or more processors, a first action involving the document in satisfaction of a first part of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document; maintaining, during performance of the first action, the document within a working memory device within the computing device, without writing the document to a persistent data storage medium within the computing device; transmitting, over the network connection using the one or more processors in response to completion of the first action, the document to a security service provider for persistent storage; deleting the document from the cloud-based service platform in response to receiving a confirmation of receipt of the document from the security service provider; determining, after deleting the document, that a pending action associated with performance of the service request requires access to the document; receiving in response to a request, over the network connection using the one or more processors, the document from the security service provider; performing, using the one or more processors, a second action involving the document in satisfaction of a second part of the service request, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and upon completion of processing involving the document subsequent to the completion of the second action, deleting the document from the cloud-based service platform for at least a second time. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium containing instructions that, when executed on a computer system within a cloud-based service platform, cause the computer system to perform operations including:
-
receiving, over a network connection, a document as part of a service request from a first user of the cloud-based service platform; performing a first action involving the document in satisfaction of a first part of the service request, wherein the first action includes document processing in support of obtaining at least one digital or electronic signature on the document; maintaining, during performance of the first action, the document within a working memory portion of the computer system, without writing the document to a persistent data storage within the cloud-based service platform; transmitting, over the network connection in response to completion of the first action, the document to a security service provider for persistent storage; deleting the document from the working memory portion in response to receiving a confirmation of receipt of the document from the security service provider; determining, after deleting the document, that a pending action associated with performance of the service request requires access to the document; receiving in response to a request, over the network connection using the one or more processors, the document from the security service provider; in response to receiving the document, maintaining the document within the working memory portion, without writing the document to the persistent data storage; performing, using the one or more processors, a second action involving the document in satisfaction of a second part of the service request, the second action including the pending action, wherein the second action includes document processing to generate a representation of the document for presentation to a second user to obtain at least one digital or electronic signature on the document; and upon completion of processing involving the document subsequent to the completion of the second action, deleting the document from the working memory portion. - View Dependent Claims (20, 21, 22)
-
Specification