发明名称 Protection of sensitive data from unauthorized access
摘要 A method and associated computing system. Data received by a computing environment includes a mixture of non-sensitive data and sensitive data along with related metadata indicative of a sensitivity of the sensitive data. The computing system includes the computing environment. An operation is performed on the sensitive data in the computing environment by: (a) determining that the data used for the operation are sensitive data, (b) intercepting the operation on the sensitive data, and (c) registering newly created sensitive data, as a result of the operation, with metadata indicating one or more addresses of the sensitive data. An external access to the sensitive data in the computing environment is intercepted. A compliance firewall rule is applied to the sensitive data intended to leave the computing environment. The compliance firewall rule defines an action to be applied to the sensitive data such that the sensitive data are protected against unauthorized access.
申请公布号 US9609025(B1) 申请公布日期 2017.03.28
申请号 US201514950002 申请日期 2015.11.24
申请人 International Business Machines Corporation 发明人 Betzler Boas;Chavan Vinod S.;Dressler Ingo;Karn Holger
分类号 G06F21/62;H04L29/06;H04L29/08 主分类号 G06F21/62
代理机构 Schmeiser, Olsen & Watts, LLP 代理人 Schmeiser, Olsen & Watts, LLP ;Gooshaw Isaac
主权项 1. A method, said method comprising: receiving, by a first computing environment from a second computing environment via one or more processors of the first computing environment, data wherein the received data comprises a mixture of non-sensitive data and first sensitive data along with first metadata indicative of a sensitivity of the first sensitive data, and wherein the second computing environment is external to the first computing environment; receiving, by the one or more processors from the second computing environment, a request to perform an operation on the previously received first sensitive data; after said receiving the request to perform the operation, ascertaining, by the one or more processors by inspecting the first metadata, that the first sensitive data to be used for the operation are sensitive data; in response to said ascertaining, intercepting, by the one or more processors, the operation on the first sensitive data; after said intercepting the operation on the first sensitive data, performing, by the one or more processors, the operation on the first sensitive data, wherein said performing the operation on the first sensitive data creates second sensitive data resulting from said performing the operation on the first sensitive data; registering the created second sensitive data by storing one or more memory addresses of the second sensitive data in second metadata and storing the second metadata in a sensitive data register storage; and intercepting, by the one or more processors, an external access by the second computing environment of the second sensitive data in the first computing environment and in response, applying a compliance firewall rule to the second sensitive data intended to leave the first computing environment, wherein the compliance firewall rule defines an action to be applied to the second sensitive data such that the second sensitive data are protected against unauthorized access, wherein the first computing environment comprises a hypervisor, a virtual machine running on the hypervisor and comprising the sensitive data register storage, and a compliance gateway coupled to and external to the virtual machine and the hypervisor, and wherein the hypervisor, the virtual machine, and the compliance gateway are utilized in performance of said receiving the data, and wherein the method further comprises after said receiving the request: said compliance gateway intercepting the request;said compliance gateway inspecting the intercepted request, not finding sensitive data in the request from said inspecting the intercepted request, and forwarding the request directly to the virtual machine in response to said not finding sensitive data in the request;said virtual machine receiving the request from the compliance gateway and in response, said virtual machine initiating performance of the operation indicated in the request; andsaid hypervisor determining that the performance of the request requires the first sensitive data that is sensitive, and in response said hypervisor preventing the virtual machine from completing performance of the operation by performing said intercepting the operation.
地址 Armonk NY US