Handling sensitive data in application using external processing

A technology for sensitive data and applications, used in digital data protection, electrical digital data processing, instruments, etc.

Active Publication Date: 2019-05-21
IBM CORP
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in many cases, regulatory controls prevent companies from allowing data to be transferred outside the corporate network or abroad

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handling sensitive data in application using external processing
  • Handling sensitive data in application using external processing
  • Handling sensitive data in application using external processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The described methods and systems enable the use of external processing to process sensitive data in applications. The method enables the use of a remote entity, such as in a cloud, distributed environment or other external processing environment, to perform processing of the integrated stream without any sensitive data leaving the secure processing environment.

[0039] In one embodiment, cloud-provisioned compute instances can be used to perform bulk processing of existing integration flows without any sensitive data leaving the enterprise's on-premises data center.

[0040] refer to figure 1 , a block diagram illustrating an example environment 100 in which the described system may be implemented. The secure environment system 110 may be provided, for example, in the form of a locally deployed computing system or a network of systems. Such a secure environment system 110 may be protected by firewalls and other security measures to ensure that confidential or sensit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Method and system are provided for handling sensitive data in an application using external processing. The method carried out at a secure environment includes: processing an application in a secure environment wherein the application is capable of sending a request message for processing to an external processing location, a request message including data aspects; identifying sensitive data in adata aspect of a request message for processing; tokenizing the sensitive data in a data aspect by replacing the sensitive data with tokenized data and storing a mapping between the sensitive data andthe tokenized data in the secure environment; sending the request message for processing including the tokenized data to an external processing location; receiving a processed message from the external processing location including annotations for the tokenized data with transform instructions for the tokenized data; and replacing the tokenized data with the sensitive data and performing the transform instructions on the sensitive data.

Description

Background technique [0001] The present invention relates to sensitive data protection and, more particularly, to the use of external processing to handle sensitive data in applications. [0002] Many enterprises are looking to run some of their computing processing on hardware provided by outside agencies to reduce capital expenditures and be more agile in their response to variable demands for capacity. The biggest barriers to moving processing to the cloud are security and privacy. [0003] A typical example of an application integration processing style is an application in a secure local environment that requires some processing or information provided by an external service. This information is obtained by the application sending a request message to an external service. Request messages may contain sensitive information that is required for service operation. The service can return a response message to the application. [0004] Typically, this use case requires int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/6218G06F21/604
Inventor J.霍西D.斯托瑞M.罗斯C.斯特林D.J.麦金尼斯
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products