17988268. SECURING SENSITIVE DEBUG DATA simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

SECURING SENSITIVE DEBUG DATA

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Raja Das of Bengaluru (IN)

Sandeep Korrapati of BANGALORE (IN)

Akhilesh S of BANGALORE (IN)

SECURING SENSITIVE DEBUG DATA - A simplified explanation of the abstract

This abstract first appeared for US patent application 17988268 titled 'SECURING SENSITIVE DEBUG DATA

Simplified Explanation

The embodiment of the patent application monitors the operational state of a processor-based system, identifies a system error that meets a reboot condition, generates debug data, stores it in memory, intercepts debug data requests from untrusted entities, analyzes the debug data for sensitive information, generates modified debug data through data protection processes, and sends the modified debug data to the untrusted entity in response to their requests.

  • Monitoring operational state and identifying system errors
  • Generating and storing debug data
  • Intercepting debug data requests from untrusted entities
  • Analyzing debug data for sensitive information
  • Generating modified debug data through data protection processes

Potential Applications

This technology could be applied in various industries such as cybersecurity, software development, and system maintenance where sensitive data needs to be protected during debugging processes.

Problems Solved

1. Protecting sensitive data during debugging processes 2. Preventing unauthorized access to debug data

Benefits

1. Enhanced security for sensitive data 2. Improved control over debug data access 3. Compliance with data protection regulations

Potential Commercial Applications

"Data Protection in Debugging Processes" - This technology could be utilized in cybersecurity software, system monitoring tools, and data protection services.

Possible Prior Art

One possible prior art could be the use of encryption techniques to protect debug data in memory during system reboots.

What are the potential risks associated with intercepting debug data requests from untrusted entities?

There is a risk of potential data breaches if the interception process is not secure enough, leading to unauthorized access to sensitive information.

How can the modified debug data be securely transmitted to untrusted entities?

The modified debug data can be securely transmitted using encryption protocols and secure communication channels to ensure data protection during transmission.


Original Abstract Submitted

An embodiment monitors an operational state of a processor-based system and identifies a system error that satisfies a reboot condition for a reboot event. The embodiment generates debug data indicative of the operational state of the system when the system error occurred. The embodiment stores the debug data in a memory that retains data during the reboot event. The embodiment intercepts a debug data requests from an untrusted entity, thereby preventing the untrusted entity from directly accessing the debug data in the memory. The embodiment analyzes the debug data using a sensitive data detection process where the analyzing detects sensitive data in the debug data. The embodiment generates modified debug data by performing a data protection process on the debug data and then sends, as a response to the debug data requests, the modified debug data to the untrusted entity.