17937122. SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES

Organization Name

International Business Machines Corporation

Inventor(s)

Meghan Mcgrath of Highland NY (US)

Jonathan Fry of Fishkill NY (US)

MICHAEL Kane of Poughkeepsie NY (US)

James Cox of Lagrangeville NY (US)

Ximena Bates-forero of Schererville IN (US)

SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17937122 titled 'SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES

Simplified Explanation

The patent application describes a method, apparatus, system, and computer program product for processing messages. The computer system parses a message to identify key value pairs for confidential information, creates a redacted message with plaintext tags replacing the confidential values, stores the key value pairs in a secure database, and stores the redacted message in a plaintext database.

  • The computer system parses messages to identify key value pairs for confidential information.
  • It creates a redacted message with plaintext tags replacing the confidential values.
  • The key value pairs are stored in a secure database.
  • The redacted message is stored in a plaintext database.

Potential Applications

This technology could be applied in industries where sensitive information needs to be protected, such as healthcare, finance, and government sectors.

Problems Solved

This technology solves the problem of securely handling and storing confidential information within messages, reducing the risk of data breaches and unauthorized access.

Benefits

The benefits of this technology include enhanced data security, compliance with privacy regulations, and improved confidentiality of sensitive information.

Potential Commercial Applications

A potential commercial application of this technology could be in secure messaging platforms for businesses, ensuring the protection of sensitive data shared between employees and clients.

Possible Prior Art

One possible prior art could be encryption methods used in messaging systems to protect sensitive information during transmission and storage.

What are the potential cybersecurity risks associated with this technology?

There could be potential cybersecurity risks if the secure database storing the key value pairs is compromised, leading to unauthorized access to confidential information.

How does this technology compare to existing methods of message redaction and secure data storage?

This technology offers a comprehensive solution for identifying, redacting, and securely storing confidential information within messages, providing a more efficient and secure process compared to traditional methods.


Original Abstract Submitted

A method, an apparatus, a system, and a computer program product for processing messages. A computer system parses a message to identify key value pairs for confidential information in the message. The computer system creates a redacted message in which values in the key value pairs identified for the confidential information are replaced with plaintext tags. The computer system stores the key value pairs in a secure database. The computer system stores the redacted message in a plaintext database.