×

Securing information within a cloud computing environment

  • US 8,826,001 B2
  • Filed: 04/27/2010
  • Issued: 09/02/2014
  • Est. Priority Date: 04/27/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing information within a Cloud computing environment, comprising:

  • making, using at least one first computing device, a first determination whether a uniform resource locator of a first communication originating from a first endpoint matches a destination comprising a Cloud storage system;

    if the first determination is no match, evaluating, using the at least one first computing device, whether additional information is requested;

    if the first determination is a match, redirecting, using the at least one first computing device, to a central encryption service, the communication having the destination of the Cloud storage system, the first communication containing first information to be secured from the first endpoint at the central encryption service;

    receiving, using the at least one first computing device, the first communication at the central encryption service;

    encrypting, using the at least one first computing device, the first information at the central encryption service;

    communicating, using the at least one first computing device, the encrypted first information to the Cloud storage system from the central encryption service;

    storing, using the at least one first computing device, the encrypted first information in the Cloud storage system;

    making, using at least second computing device, a second determination whether a uniform resource locator of a second communication matches the destination comprising the Cloud storage system;

    if the second determination is no match, evaluating, using the at least second computing device, whether additional information is requested;

    if the second determination is a match, redirecting, using the at least one second computing device, to the central encryption service, the second communication having the destination of the Cloud storage system, the second communication containing first information to be secured from a second endpoint at the central encryption service;

    receiving, using the at least one second computing device, the second communication at the central encryption service;

    encrypting, using the at least one second computing device, the second information at the central encryption service;

    communicating, using the at least one second computing device, the encrypted second information to the Cloud storage system from the central encryption service; and

    storing, using the at least one second computing device, the encrypted second information in the Cloud storage system;

    wherein the central encryption service operates on a system at a remote location from the first endpoint and the second endpoint; and

    wherein the central encryption service, the first endpoint, and the second endpoint belong to the same enterprise.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×