International business machines corporation (20240111896). SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES simplified abstract

From WikiPatents
Jump to navigation Jump to search

SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES

Organization Name

international business machines corporation

Inventor(s)

Meghan Mcgrath of Highland NY (US)

Jonathan Fry of Fishkill NY (US)

MICHAEL Kane of Poughkeepsie NY (US)

James Cox of Lagrangeville NY (US)

Ximena Bates-forero of Schererville IN (US)

SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111896 titled 'SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES

Simplified Explanation

The abstract describes a method, apparatus, system, and computer program product for processing messages. The computer system parses a message to identify key value pairs for confidential information, creates a redacted message with plaintext tags replacing the confidential information, stores the key value pairs in a secure database, and stores the redacted message in a plaintext database.

  • Method, apparatus, system, and computer program product for processing messages
  • Computer system parses messages to identify key value pairs for confidential information
  • Redacted message created with plaintext tags replacing confidential information
  • Key value pairs stored in secure database
  • Redacted message stored in plaintext database

Potential Applications

This technology could be applied in industries where sensitive information needs to be protected, such as healthcare, finance, and government sectors.

Problems Solved

This technology helps prevent unauthorized access to confidential information in messages, reducing the risk of data breaches and ensuring data security and privacy.

Benefits

The benefits of this technology include enhanced data security, compliance with privacy regulations, and peace of mind for organizations handling sensitive information.

Potential Commercial Applications

A potential commercial application of this technology could be in secure messaging platforms for businesses and organizations, ensuring the protection of confidential information in communications.

Possible Prior Art

One possible prior art could be encryption methods used in messaging systems to secure data, but the specific approach of identifying key value pairs for confidential information and replacing them with plaintext tags may be a novel innovation.

Unanswered Questions

How does this technology handle different types of messages, such as emails, text messages, or instant messages?

This article does not specify how the technology adapts to various message formats and structures to identify and redact confidential information effectively.

What measures are in place to ensure the secure storage of key value pairs and redacted messages in the respective databases?

The article does not detail the specific security protocols and encryption methods used to safeguard the stored confidential information and redacted messages.


Original Abstract Submitted

a method, an apparatus, a system, and a computer program product for processing messages. a computer system parses a message to identify key value pairs for confidential information in the message. the computer system creates a redacted message in which values in the key value pairs identified for the confidential information are replaced with plaintext tags. the computer system stores the key value pairs in a secure database. the computer system stores the redacted message in a plaintext database.