US 12,445,281 B2
Dynamic, control-sensitive data management platform
Walter Trotta, Cranford, NJ (US); Vaibhav Kumar, Monroe, NJ (US); Samuel J. Kass, Oberrieden (CH); and Sasisekar Shanmugasundaram, Warsaw (PL)
Assigned to Citibank, N.A., New York, NY (US)
Filed by Citibank, N.A., New York, NY (US)
Filed on May 6, 2025, as Appl. No. 19/200,398.
Application 19/200,398 is a continuation of application No. 18/818,560, filed on Aug. 28, 2024, granted, now 12,341,884.
Application 18/818,560 is a continuation in part of application No. 18/134,883, filed on Apr. 14, 2023, granted, now 12,277,243, issued on Apr. 15, 2025.
Prior Publication US 2025/0266995 A1, Aug. 21, 2025
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/00 (2013.01); G06F 21/62 (2013.01); H04L 9/08 (2006.01)
CPC H04L 9/088 (2013.01) 18 Claims
OG exemplary drawing
 
1. A system for providing data protection, the system comprising:
one or more processors; and
a non-transitory, computer-readable storage medium storing instructions, which, when executed by the one or more processors cause the one or more processors to:
receive data at a first device located in a first datacenter in a first jurisdiction from a second device located in a second datacenter in a second jurisdiction, wherein the data comprises a plurality of data fields, and wherein the plurality of data fields comprises a first set of fields encrypted into a corresponding token representing corresponding field data and a second set of fields not encrypted into the corresponding token, and wherein the first set of fields comprises sensitive data to be controlled by the second device in the second jurisdiction;
store the data in the first jurisdiction;
receive, at the first device from a third device, a data request, wherein the data request comprises a request for one or more data fields from the first set of fields encrypted into the corresponding token;
in response to receiving the data request from the third device, request by the first device, from the second device, a cryptographic key for decrypting the one or more data fields;
upon receiving the cryptographic key from the second jurisdiction, decrypt by the first device, using the cryptographic key, field data within the one or more data fields to obtain one or more decrypted data fields;
transmit, by the first device, to the third device, a response to the data request comprising the one or more decrypted data fields;
based on a rule change within the second jurisdiction, receive, by the first device from the second jurisdiction, a command to disable access to the first set of fields encrypted into the corresponding token representing the corresponding field data; and
in response to receiving the command, erase, by the first device, each corresponding token representing the corresponding field data stored in the first jurisdiction, restricting the first jurisdiction rom storing the sensitive data.