CyberArk Software Ltd.
End-to-end secure lifecycle of secrets with minimal footprint
Last updated:
Abstract:
Disclosed embodiments relate to systems and methods for providing an end-to-end secure lifecycle of data. Techniques include receiving a request from a client to access data; reserving a designated memory region; protecting the designated memory region using access restriction to certain processes of an operating system; receiving data from a trusted source; injecting the data into the designated memory region in a zero-copy manner; sending the data to the client in a zero-copy manner; receiving an indication that the client performed an interaction; and in response to the indication, disposing of the data and the designated memory region.
Status:
Grant
Type:
Utility
Filling date:
14 Jul 2021
Issue date:
8 Mar 2022