Jump to content

18203855. DATABASE TABLE DATA OBFUSCATION TECHNIQUES simplified abstract (Insight Direct USA, Inc.)

From WikiPatents

DATABASE TABLE DATA OBFUSCATION TECHNIQUES

Organization Name

Insight Direct USA, Inc.

Inventor(s)

Abhijit Moharil of Tempe AZ (US)

DATABASE TABLE DATA OBFUSCATION TECHNIQUES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18203855 titled 'DATABASE TABLE DATA OBFUSCATION TECHNIQUES

The abstract describes an obfuscation system that involves accessing raw data from a production database, copying it to a quality assurance testing database, identifying sensitive data for obfuscation, replacing the sensitive data with unique descriptors and primary keys, and storing the modified data for user access.

  • The system includes a first database for raw data and a quality assurance testing database for modified data.
  • One or more processors execute instructions to perform the obfuscation process.
  • Sensitive data in the raw data is identified and obfuscated by replacing it with unique descriptors and primary keys.
  • The obfuscated data is stored in the quality assurance testing database for user interface access.

Potential Applications: - Data security and privacy protection in testing environments - Compliance with data protection regulations - Secure data sharing within organizations

Problems Solved: - Protecting sensitive data during testing processes - Ensuring data privacy and confidentiality - Minimizing the risk of data breaches

Benefits: - Enhanced data security in testing environments - Compliance with data protection laws - Improved confidentiality of sensitive information

Commercial Applications: Title: Secure Data Obfuscation System for Testing Environments This technology can be used in industries such as healthcare, finance, and technology for secure testing of systems and applications. It can also be valuable for companies handling sensitive customer data.

Questions about the technology: 1. How does the obfuscation system ensure the confidentiality of sensitive data during testing? 2. What are the potential challenges in implementing this system in different industries?


Original Abstract Submitted

An obfuscation system includes a first database for storing raw data, a quality assurance testing database for storing modified data, one or more processors, and computer-readable memory. The computer-readable memory is encoded with instructions that, when executed by the one or more processors, cause the obfuscation system to: access raw data from the production database, copy the raw data from the production database to the quality assurance testing database, identify sensitive data within the raw data for obfuscation in the quality assurance testing database, obfuscate the sensitive data that has been identified by replacing the sensitive data in each field with a concatenation of a unique descriptor that describes the sensitive data in the field and a primary key, and store the modified data in the quality assurance testing database for access via a user interface.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.