18145332. Selective Memory Duplication Control simplified abstract (Google LLC)

From WikiPatents
Jump to navigation Jump to search

Selective Memory Duplication Control

Organization Name

Google LLC

Inventor(s)

Jonathan Charles Masters of Boston MA (US)

Selective Memory Duplication Control - A simplified explanation of the abstract

This abstract first appeared for US patent application 18145332 titled 'Selective Memory Duplication Control

The abstract describes a method for securing data by identifying sensitive information stored in a memory location and automatically copying it to a secure memory location.

  • The approach involves encountering a pointer to a memory location.
  • Determining that the memory location stores sensitive data.
  • Automatically copying the sensitive data to a secure memory location.

Potential Applications: - Data security in computer systems - Protection of sensitive information in software applications

Problems Solved: - Preventing unauthorized access to sensitive data - Mitigating the risk of data breaches

Benefits: - Enhanced data security - Improved protection of sensitive information

Commercial Applications: Title: Secure Data Management System This technology can be used in industries such as finance, healthcare, and government where data security is crucial. It can also be integrated into software applications to ensure the protection of sensitive information.

Questions about Secure Data Management System: 1. How does this technology compare to traditional data encryption methods?

  - The technology offers an automated approach to securing data, which can be more efficient and effective than manual encryption methods.

2. What are the potential challenges in implementing this system in large-scale networks?

  - The main challenge may be ensuring compatibility with existing systems and addressing scalability issues.


Original Abstract Submitted

Generally disclosed herein is an approach for securing data. The approach may include encountering a pointer to a first memory location and determining, based on the pointer, that the first memory location is storing sensitive data. The approach may further include automatically copying the sensitive data to a secure memory location in response to determining that the first memory location is storing sensitive data.