17957057. Stream-Based Database Alteration Architecture and Methods for Managing Databases simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

Stream-Based Database Alteration Architecture and Methods for Managing Databases

Organization Name

Capital One Services, LLC

Inventor(s)

Andrew Chouman of Seattle WA (US)

Chih-Hsiang Chow of Coppell TX (US)

Stream-Based Database Alteration Architecture and Methods for Managing Databases - A simplified explanation of the abstract

This abstract first appeared for US patent application 17957057 titled 'Stream-Based Database Alteration Architecture and Methods for Managing Databases

Simplified Explanation

The abstract describes a system and method for altering a database by receiving client tracking identification numbers, encrypting or decrypting client records, and updating the database accordingly.

  • The system receives client tracking identification numbers from a database via a communication network.
  • The received numbers are assigned to virtual consumer processors for encryption or decryption of client records.
  • The client records are then encrypted or decrypted based on the assigned processors.
  • The database is updated to reflect the encryption or decryption of the client records.

Potential Applications

This technology could be applied in industries such as finance, healthcare, and e-commerce for secure data management and protection.

Problems Solved

This technology solves the problem of securely altering a database with sensitive client information without compromising data integrity.

Benefits

The benefits of this technology include enhanced data security, efficient database alteration processes, and improved compliance with data protection regulations.

Potential Commercial Applications

A potential commercial application of this technology could be in data security software solutions for businesses looking to protect sensitive customer information.

Possible Prior Art

One possible prior art for this technology could be existing database encryption methods used in various industries to secure sensitive data.

Unanswered Questions

How does this technology handle large volumes of client tracking identification numbers efficiently?

This technology likely utilizes virtual consumer processors to handle large volumes of client tracking identification numbers efficiently by distributing the workload effectively.

What measures are in place to ensure the encryption and decryption processes are secure and reliable?

To ensure the encryption and decryption processes are secure and reliable, this technology may incorporate encryption algorithms, access controls, and audit trails to track and monitor data alterations.


Original Abstract Submitted

Systems and methods for providing stream-based database alteration architecture are disclosed. The systems and methods can receive a plurality of client tracking identification numbers in a data stream from a database via a communication network, wherein the plurality of client tracking identification numbers comprises customer metadata. The received plurality of client tracking identification numbers is assigned to one or more virtual consumer processors for encrypting or decrypting a client record associated with each of the plurality of received client tracking identification numbers. The client record associated with each of the received plurality of client tracking identification numbers is encrypted or decrypted. A database is updated to indicate the client record associated with each of the received plurality of client tracking identification numbers is encrypted or decrypted using the assigned one or more virtual consumer processors.