17768885. ANONYMIZATION PROTOCOLS simplified abstract (HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.)

From WikiPatents
Jump to navigation Jump to search

ANONYMIZATION PROTOCOLS

Organization Name

HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.

Inventor(s)

Daryl T. Poe of Fort Collins CO (US)

ANONYMIZATION PROTOCOLS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17768885 titled 'ANONYMIZATION PROTOCOLS

Simplified Explanation

The abstract describes a system that determines the type of data to be added to a log file, selects an anonymization protocol for that data, and anonymizes the data as it is added to the log file.

  • The system includes a processor and a storage medium storing executable instructions.
  • It determines the type of data to be added to a log file.
  • It selects an anonymization protocol for the type of data.
  • It anonymizes the data according to the selected protocol as it is added to the log file.

Potential Applications

This technology could be applied in industries where sensitive data needs to be logged and stored securely, such as healthcare, finance, and government sectors.

Problems Solved

This technology helps address the issue of protecting sensitive information in log files, ensuring compliance with data privacy regulations and preventing unauthorized access to confidential data.

Benefits

The system provides a streamlined and automated process for anonymizing data, reducing the risk of data breaches and ensuring the privacy and security of sensitive information.

Potential Commercial Applications

"Secure Data Anonymization System for Log Files: Applications and Benefits"

Possible Prior Art

There may be existing systems or methods for anonymizing data in log files, but specific prior art is not provided in this context.

Unanswered Questions

How does the system handle different types of anonymization protocols for various data types?

The abstract mentions selecting an anonymization protocol for the type of data, but it does not elaborate on how the system determines the appropriate protocol or how it adapts to different data types.

What measures are in place to ensure the security and integrity of the anonymized data in the log file?

While the abstract mentions anonymizing the data, it does not detail the specific security measures or encryption techniques used to protect the data from unauthorized access or tampering.


Original Abstract Submitted

An example system may include a processor and a non-transitory machine-readable storage medium storing instructions executable by the processor to determine a type of data to be added to a log file; determine a selected anonymization protocol for the type of the data; and anonymize the data according to the anonymization protocol as the data is added to the log file.