17957057. Stream-Based Database Alteration Architecture and Methods for Managing Databases simplified abstract (Capital One Services, LLC)
Contents
- 1 Stream-Based Database Alteration Architecture and Methods for Managing Databases
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Stream-Based Database Alteration Architecture and Methods for Managing Databases - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
Stream-Based Database Alteration Architecture and Methods for Managing Databases
Organization Name
Inventor(s)
Andrew Chouman of Seattle WA (US)
Chih-Hsiang Chow of Coppell TX (US)
Stream-Based Database Alteration Architecture and Methods for Managing Databases - A simplified explanation of the abstract
This abstract first appeared for US patent application 17957057 titled 'Stream-Based Database Alteration Architecture and Methods for Managing Databases
Simplified Explanation
The abstract describes a system and method for altering a database by receiving client tracking identification numbers, encrypting or decrypting client records, and updating the database accordingly.
- The system receives client tracking identification numbers from a database via a communication network.
- The received numbers are assigned to virtual consumer processors for encryption or decryption of client records.
- The client records are then encrypted or decrypted based on the assigned processors.
- The database is updated to reflect the encryption or decryption of the client records.
Potential Applications
This technology could be applied in industries such as finance, healthcare, and e-commerce for secure data management and protection.
Problems Solved
This technology solves the problem of securely altering a database with sensitive client information without compromising data integrity.
Benefits
The benefits of this technology include enhanced data security, efficient database alteration processes, and improved compliance with data protection regulations.
Potential Commercial Applications
A potential commercial application of this technology could be in data security software solutions for businesses looking to protect sensitive customer information.
Possible Prior Art
One possible prior art for this technology could be existing database encryption methods used in various industries to secure sensitive data.
Unanswered Questions
How does this technology handle large volumes of client tracking identification numbers efficiently?
This technology likely utilizes virtual consumer processors to handle large volumes of client tracking identification numbers efficiently by distributing the workload effectively.
What measures are in place to ensure the encryption and decryption processes are secure and reliable?
To ensure the encryption and decryption processes are secure and reliable, this technology may incorporate encryption algorithms, access controls, and audit trails to track and monitor data alterations.
Original Abstract Submitted
Systems and methods for providing stream-based database alteration architecture are disclosed. The systems and methods can receive a plurality of client tracking identification numbers in a data stream from a database via a communication network, wherein the plurality of client tracking identification numbers comprises customer metadata. The received plurality of client tracking identification numbers is assigned to one or more virtual consumer processors for encrypting or decrypting a client record associated with each of the plurality of received client tracking identification numbers. The client record associated with each of the received plurality of client tracking identification numbers is encrypted or decrypted. A database is updated to indicate the client record associated with each of the received plurality of client tracking identification numbers is encrypted or decrypted using the assigned one or more virtual consumer processors.