Cisco technology, inc. (20240346180). TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS simplified abstract
Contents
TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS
Organization Name
Inventor(s)
Nagendra Kumar Nainar of Morrisville NC (US)
Suresh Kumar Shanmugam of Bangalore (IN)
Rajiv Asati of Morrisville NC (US)
TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240346180 titled 'TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS
The abstract describes techniques for managing access to sensitive data detected within an electronic communication. In some embodiments, these techniques involve identifying sensitive data, storing it in a memory location, updating the communication to replace the sensitive data with a reference to the memory location, and transmitting the communication to the recipient.
- Receiving an electronic communication directed towards a recipient
- Identifying sensitive data within the communication
- Storing the sensitive data in a memory location
- Updating the communication to reference the memory location instead of the sensitive data
- Transmitting the communication to the recipient
Potential Applications: - Secure communication systems - Data protection in emails - Privacy management in electronic communications
Problems Solved: - Protecting sensitive data in electronic communications - Ensuring secure transmission of information - Preventing unauthorized access to confidential data
Benefits: - Enhanced data security - Improved privacy protection - Efficient management of sensitive information
Commercial Applications: Title: Secure Communication Solutions for Businesses This technology can be used in industries such as healthcare, finance, and legal services to safeguard sensitive information and comply with data protection regulations.
Questions about the technology: 1. How does this technology ensure the secure storage of sensitive data? 2. What measures are in place to prevent unauthorized access to the memory location storing the sensitive data?
Frequently Updated Research: Stay updated on advancements in data encryption and secure communication protocols to enhance the effectiveness of this technology.
Original Abstract Submitted
techniques are described herein for managing access to sensitive data detected within an electronic communication. in some embodiments, such techniques may comprise receiving, from a sender, an electronic communication directed toward a first recipient. the techniques may then comprise identifying one or more pieces of sensitive data within the electronic communication, providing a content of the one or more pieces of sensitive data to a data hosting device to be stored in a memory location and first information associated with the first recipient used to access the memory location, updating the electronic communication to replace the one or more pieces of sensitive data with a reference to the memory location, and transmitting the electronic communication to the first recipient.