18301058. TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS simplified abstract (Cisco Technology, Inc.)
Contents
TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS
Organization Name
Inventor(s)
Nagendra Kumar Nainar of Morrisville NC (US)
Suresh Kumar Shanmugam of Bangalore (IN)
Rajiv Asati of Morrisville NC (US)
TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18301058 titled 'TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS
The patent application describes techniques for managing access to sensitive data detected within an electronic communication.
- Receiving an electronic communication from a sender directed toward a first recipient.
- Identifying sensitive data within the electronic communication.
- Providing the sensitive data to a data hosting device to be stored in a memory location.
- Using first information associated with the first recipient to access the memory location.
- Updating the electronic communication to replace the sensitive data with a reference to the memory location.
- Transmitting the electronic communication to the first recipient.
Potential Applications: - Secure communication systems - Data privacy protection - Information security protocols
Problems Solved: - Preventing unauthorized access to sensitive data - Ensuring data privacy in electronic communications
Benefits: - Enhanced data security - Improved privacy protection - Efficient management of sensitive information
Commercial Applications: Title: Secure Data Management System for Electronic Communications This technology can be utilized in industries such as healthcare, finance, and legal services to safeguard sensitive information shared through electronic communications. It can also be integrated into messaging platforms and email services to enhance data security for businesses and individuals.
Questions about the Technology: 1. How does this technology ensure the secure storage of sensitive data in electronic communications? 2. What are the potential implications of this technology for data privacy regulations and compliance?
Original Abstract Submitted
Techniques are described herein for managing access to sensitive data detected within an electronic communication. In some embodiments, such techniques may comprise receiving, from a sender, an electronic communication directed toward a first recipient. The techniques may then comprise identifying one or more pieces of sensitive data within the electronic communication, providing a content of the one or more pieces of sensitive data to a data hosting device to be stored in a memory location and first information associated with the first recipient used to access the memory location, updating the electronic communication to replace the one or more pieces of sensitive data with a reference to the memory location, and transmitting the electronic communication to the first recipient.