CyberArk Software Ltd.
End-to-end secure lifecycle of secrets with minimal footprint

Last updated:

Abstract:

Disclosed embodiments relate to systems and methods for providing an end-to-end secure lifecycle of data. Techniques include receiving a request from a client to access data; reserving a designated memory region; protecting the designated memory region using access restriction to certain processes of an operating system; receiving data from a trusted source; injecting the data into the designated memory region in a zero-copy manner; sending the data to the client in a zero-copy manner; receiving an indication that the client performed an interaction; and in response to the indication, disposing of the data and the designated memory region.

Status:
Grant
Type:

Utility

Filling date:

14 Jul 2021

Issue date:

8 Mar 2022