18151503. SENSITIVE DATA PROTECTION simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

SENSITIVE DATA PROTECTION

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Jennifer I. Bennett of Rochester MN (US)

Theron Lee Lewis of Rochester MN (US)

SENSITIVE DATA PROTECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18151503 titled 'SENSITIVE DATA PROTECTION

    • Simplified Explanation:**

The patent application describes a method for protecting sensitive data by using an x-ray source to damage and erase the data stored on a memory device in case of unauthorized physical access to the computing system.

    • Key Features and Innovation:**
  • Storing sensitive data on a memory device in a computing system.
  • Detecting unauthorized physical access to the system.
  • Activating an x-ray source to bombard the memory device with energy particles.
  • Deactivating the x-ray source after a set period of time.
  • Damaging the memory device to erase the sensitive data.
    • Potential Applications:**

This technology could be used in industries where data security is crucial, such as healthcare, finance, and government.

    • Problems Solved:**

This technology addresses the issue of protecting sensitive data from unauthorized access and potential breaches.

    • Benefits:**
  • Enhanced data security.
  • Protection against unauthorized access.
  • Prevention of data breaches.
    • Commercial Applications:**

Potential commercial applications include data storage services, cybersecurity firms, and government agencies requiring high levels of data protection.

    • Prior Art:**

Readers can start their search for prior art related to this technology by looking into patents or research papers on data protection methods using physical damage techniques.

    • Frequently Updated Research:**

Stay informed about the latest advancements in data protection technologies, especially those involving physical damage methods for safeguarding sensitive information.

    • Questions about sensitive data protection:**

1. How does this technology compare to other methods of data protection, such as encryption? 2. What are the potential ethical implications of using physical damage to protect sensitive data?


Original Abstract Submitted

Computer-implemented methods for sensitive data protection are provided. Aspects include storing sensitive data on a first memory device disposed in a computing system and detecting an unauthorized physical access to the computing system. Aspects also include activating an x-ray source based on the detected unauthorized physical access and deactivating the x-ray source after a threshold period of time. The x-ray source is configured to bombard the first memory device with energy particles having an energy level sufficient to damage the first memory device and cause erasure of the sensitive data stored on the first memory device.