17932049. DYNAMIC DATA SECURITY REQUIREMENTS IN A NETWORK simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

DYNAMIC DATA SECURITY REQUIREMENTS IN A NETWORK

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Partho Ghosh of Kolkata (IN)

Sarbajit K. Rakshit of Kolkata (IN)

Venkata Vara Prasad Karri of VISAKHAPATNAM (IN)

Akash U. Dhoot of Pune (IN)

DYNAMIC DATA SECURITY REQUIREMENTS IN A NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 17932049 titled 'DYNAMIC DATA SECURITY REQUIREMENTS IN A NETWORK

Simplified Explanation

The patent application describes a system for dynamically adjusting levels of data security, encryption enforcement, confidentiality, network policies, and other parameters within a network based on the type of datasets being processed.

  • The system implements heightened levels of security and encryption as needed, adding headers to the source dataset to prescribe the level of security or encryption being enforced at each node of the network.
  • Footers are added to the completed dataset to indicate the conditions for removing the heightened security, encryption, confidentiality, and network policies prescribed by the headers.

Potential Applications

This technology could be applied in industries such as finance, healthcare, and government where sensitive data needs varying levels of security based on the type of information being processed.

Problems Solved

This system solves the problem of maintaining appropriate levels of security and encryption for different types of datasets within a network, ensuring data protection and compliance with regulations.

Benefits

- Enhanced data security and confidentiality - Dynamic adjustment of security levels based on data type - Efficient enforcement and removal of encryption requirements

Potential Commercial Applications

Optimizing Data Security in Healthcare Networks


Original Abstract Submitted

Systems, methods and/or computer program products for dynamically adjusting levels of data security, encryption enforcement, confidentiality, network policies and other parameters within a network and at processing nodes thereof, implementing heightened levels of security and encryption as needed, based on the type of datasets being processed. Enforcement and removal of data security, encryption requirements, confidentiality, network policies and other parameters at the nodes of the network is performed using headers and footers added to the source dataset. Headers prescribe the heightened level of security or encryption being enforced at each node of the network along the source dataset's flow trajectory, while footers follow the completed processing of the source dataset and indicates to the nodes along the data flow trajectory the conditions for removing the heightened level of security, encryption, confidentiality, network policies and other parameters prescribed by the headers.