18296245. SELECTIVE DELETION OF SENSITIVE DATA simplified abstract (Hewlett Packard Enterprise Development LP)

From WikiPatents
Jump to navigation Jump to search

SELECTIVE DELETION OF SENSITIVE DATA

Organization Name

Hewlett Packard Enterprise Development LP

Inventor(s)

Vijaya Kumbhashi of Bangalore (IN)

Prashanth Kamath Udyavar of Bangalore (IN)

Venkataraman Sankara Rama Subramanian of Bangalore (IN)

Manikandan Krishnan of Bangalore (IN)

SELECTIVE DELETION OF SENSITIVE DATA - A simplified explanation of the abstract

This abstract first appeared for US patent application 18296245 titled 'SELECTIVE DELETION OF SENSITIVE DATA

    • Simplified Explanation:**

This patent application relates to protecting sensitive data by clearing data from memory based on application sensitivity.

    • Key Features and Innovation:**
  • Application program loaded onto a computing device's memory includes sensitivity information.
  • Sensitivity information is used to determine application sensitivity.
  • Data portion corresponding to the application program is cleared from memory before loading another program.
    • Potential Applications:**

This technology can be applied in industries where data security and privacy are paramount, such as healthcare, finance, and government sectors.

    • Problems Solved:**

This technology addresses the issue of protecting sensitive data from unauthorized access or exposure.

    • Benefits:**
  • Enhanced data security and privacy protection.
  • Prevents sensitive information leakage.
  • Ensures compliance with data protection regulations.
    • Commercial Applications:**

Potential commercial applications include secure data management systems, privacy-focused software solutions, and compliance tools for data-sensitive industries.

    • Prior Art:**

Prior art related to this technology may include research on data protection methods, memory management techniques, and sensitive data handling protocols.

    • Frequently Updated Research:**

Stay updated on advancements in data security, privacy protection technologies, and compliance requirements in data-sensitive industries.

    • Questions about Data Protection:**

1. How does this technology ensure the secure handling of sensitive data? 2. What are the potential implications of not implementing such data protection measures?


Original Abstract Submitted

Examples disclosed herein relate to protecting sensitive data. An application program is loaded on to memory of a computing device. The application program includes application code and sensitivity information. The sensitivity information is detected to determine application sensitivity. In response to the determination of the application sensitivity, a data portion corresponding to the application program is cleared from the memory before loading another application program.