18187114. DATA SECURITY simplified abstract (Ford Global Technologies, LLC)

From WikiPatents
Jump to navigation Jump to search

DATA SECURITY

Organization Name

Ford Global Technologies, LLC

Inventor(s)

John Moore of Canton MI (US)

Bradley Warren Smith of Ann Arbor MI (US)

Elizabeth Kanous of Southfield MI (US)

Dajiang Suo of Cambridge MA (US)

Sanjay Emani Sarma of Lexington MA (US)

DATA SECURITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 18187114 titled 'DATA SECURITY

The abstract of the patent application describes a computer system that can generate obscured received data from input data by applying Boolean operations and transmit this obscured data to another computer, along with a key, through different communication channels.

  • Simplified Explanation:

- A computer system can manipulate data using Boolean operations to create obscured data. - The obscured data is then sent to another computer along with a key for decryption.

  • Key Features and Innovation:

- Ability to generate obscured data from input data using Boolean operations. - Transmission of obscured data and key through separate communication channels for security.

  • Potential Applications:

- Secure data transmission between computers. - Data encryption and decryption processes. - Privacy protection for sensitive information.

  • Problems Solved:

- Ensures secure communication of data. - Protects data from unauthorized access. - Facilitates safe transmission of sensitive information.

  • Benefits:

- Enhanced data security. - Efficient encryption and decryption processes. - Secure communication between computers.

  • Commercial Applications:

- Data security software for businesses. - Secure messaging applications. - Encryption tools for sensitive data protection.

  • Questions about the Technology:

1. How does the computer system ensure the key is securely transmitted to the receiving computer? 2. What types of Boolean operations can be applied to the data for obscuring purposes?

  • Frequently Updated Research:

- Stay updated on advancements in data encryption technologies. - Monitor developments in secure communication protocols.


Original Abstract Submitted

A computer includes a processor and a memory, the memory stores instructions executable by the processor to generate obscured received data from received data by applying at least one Boolean operation to the data and to transmit, via a first communications channel, the obscured received data to a second computer. The executable instructions are additionally to transmit, via a second communications channel, a key to the second computer.