| CPC H04L 9/088 (2013.01) | 18 Claims |

|
1. A system for providing data protection, the system comprising:
one or more processors; and
a non-transitory, computer-readable storage medium storing instructions, which, when executed by the one or more processors cause the one or more processors to:
receive data at a first device located in a first datacenter in a first jurisdiction from a second device located in a second datacenter in a second jurisdiction, wherein the data comprises a plurality of data fields, and wherein the plurality of data fields comprises a first set of fields encrypted into a corresponding token representing corresponding field data and a second set of fields not encrypted into the corresponding token, and wherein the first set of fields comprises sensitive data to be controlled by the second device in the second jurisdiction;
store the data in the first jurisdiction;
receive, at the first device from a third device, a data request, wherein the data request comprises a request for one or more data fields from the first set of fields encrypted into the corresponding token;
in response to receiving the data request from the third device, request by the first device, from the second device, a cryptographic key for decrypting the one or more data fields;
upon receiving the cryptographic key from the second jurisdiction, decrypt by the first device, using the cryptographic key, field data within the one or more data fields to obtain one or more decrypted data fields;
transmit, by the first device, to the third device, a response to the data request comprising the one or more decrypted data fields;
based on a rule change within the second jurisdiction, receive, by the first device from the second jurisdiction, a command to disable access to the first set of fields encrypted into the corresponding token representing the corresponding field data; and
in response to receiving the command, erase, by the first device, each corresponding token representing the corresponding field data stored in the first jurisdiction, restricting the first jurisdiction rom storing the sensitive data.
|