International business machines corporation (20240111896). SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES simplified abstract
Contents
- 1 SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES
Organization Name
international business machines corporation
Inventor(s)
Meghan Mcgrath of Highland NY (US)
Jonathan Fry of Fishkill NY (US)
MICHAEL Kane of Poughkeepsie NY (US)
James Cox of Lagrangeville NY (US)
Ximena Bates-forero of Schererville IN (US)
SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240111896 titled 'SPLITTING AND RECONSTRUCTING DATA BETWEEN SECURE AND NONSECURE DATABASES
Simplified Explanation
The abstract describes a method, apparatus, system, and computer program product for processing messages. The computer system parses a message to identify key value pairs for confidential information, creates a redacted message with plaintext tags replacing the confidential information, stores the key value pairs in a secure database, and stores the redacted message in a plaintext database.
- Method, apparatus, system, and computer program product for processing messages
- Computer system parses messages to identify key value pairs for confidential information
- Redacted message created with plaintext tags replacing confidential information
- Key value pairs stored in secure database
- Redacted message stored in plaintext database
Potential Applications
This technology could be applied in industries where sensitive information needs to be protected, such as healthcare, finance, and government sectors.
Problems Solved
This technology helps prevent unauthorized access to confidential information in messages, reducing the risk of data breaches and ensuring data security and privacy.
Benefits
The benefits of this technology include enhanced data security, compliance with privacy regulations, and peace of mind for organizations handling sensitive information.
Potential Commercial Applications
A potential commercial application of this technology could be in secure messaging platforms for businesses and organizations, ensuring the protection of confidential information in communications.
Possible Prior Art
One possible prior art could be encryption methods used in messaging systems to secure data, but the specific approach of identifying key value pairs for confidential information and replacing them with plaintext tags may be a novel innovation.
Unanswered Questions
How does this technology handle different types of messages, such as emails, text messages, or instant messages?
This article does not specify how the technology adapts to various message formats and structures to identify and redact confidential information effectively.
What measures are in place to ensure the secure storage of key value pairs and redacted messages in the respective databases?
The article does not detail the specific security protocols and encryption methods used to safeguard the stored confidential information and redacted messages.
Original Abstract Submitted
a method, an apparatus, a system, and a computer program product for processing messages. a computer system parses a message to identify key value pairs for confidential information in the message. the computer system creates a redacted message in which values in the key value pairs identified for the confidential information are replaced with plaintext tags. the computer system stores the key value pairs in a secure database. the computer system stores the redacted message in a plaintext database.