17839346. PROTECTING SENSITIVE DATA DUMP INFORMATION simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

PROTECTING SENSITIVE DATA DUMP INFORMATION

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Xi Bo Zhu of Beijing (CN)

Bo Chen Zhu of Xi'an (CN)

Peng Hui Jiang of Beijing (CN)

Cheng Fang Wang of Beijing (CN)

PROTECTING SENSITIVE DATA DUMP INFORMATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17839346 titled 'PROTECTING SENSITIVE DATA DUMP INFORMATION

Simplified Explanation

The abstract describes a method and system for protecting sensitive data dump information. Here is a simplified explanation of the abstract:

  • The method involves using a processor to receive a dump file associated with an application.
  • User classification profiles are created to define security access levels to different regions of the dump file.
  • A first encrypted region, which is a subset of the different regions, is encrypted using a first encryption key associated with a specific user classification profile.
  • The encrypted dump file is then produced.
  • The method also involves determining a user who belongs to the specific user classification profile and providing them with access to the encrypted dump file and a decryption key to decrypt the first encrypted region.

Potential applications of this technology:

  • Data protection in applications that deal with sensitive information.
  • Secure storage and transfer of sensitive data dump files.
  • Access control and encryption for different user classification profiles.

Problems solved by this technology:

  • Protecting sensitive data dump information from unauthorized access.
  • Ensuring that only users with the appropriate security access levels can access specific regions of the dump file.
  • Providing a secure method for decrypting encrypted regions of the dump file.

Benefits of this technology:

  • Enhanced security and protection of sensitive data.
  • Efficient access control for different user classification profiles.
  • Simplified encryption and decryption process for specific regions of the dump file.


Original Abstract Submitted

A method and implementing system protects sensitive data dump information. The method comprises using a processor receiving a dump file (DF) associated with an application. The method further comprises allocating user classification profiles defining security access levels to different regions of the DF and encrypting a first encrypted region that is a proper subset of the different regions using a first encryption key associated with a first user classification profile of the user classification profiles to produce an encrypted DF (EDF). The method further comprises determining a first user to be a member of the first user classification profile, and providing access to the EDF and a first decryption key useable to decrypt the first encrypted region to the first user.