18301058. TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS

Organization Name

Cisco Technology, Inc.

Inventor(s)

Nagendra Kumar Nainar of Morrisville NC (US)

Suresh Kumar Shanmugam of Bangalore (IN)

Rajiv Asati of Morrisville NC (US)

TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18301058 titled 'TECHNIQUES FOR PROTECTING SENSITIVE DATA WITHIN ELECTRONIC COMMUNICATIONS

The patent application describes techniques for managing access to sensitive data detected within an electronic communication.

  • Receiving an electronic communication from a sender directed toward a first recipient.
  • Identifying sensitive data within the electronic communication.
  • Providing the sensitive data to a data hosting device to be stored in a memory location.
  • Using first information associated with the first recipient to access the memory location.
  • Updating the electronic communication to replace the sensitive data with a reference to the memory location.
  • Transmitting the electronic communication to the first recipient.

Potential Applications: - Secure communication systems - Data privacy protection - Information security protocols

Problems Solved: - Preventing unauthorized access to sensitive data - Ensuring data privacy in electronic communications

Benefits: - Enhanced data security - Improved privacy protection - Efficient management of sensitive information

Commercial Applications: Title: Secure Data Management System for Electronic Communications This technology can be utilized in industries such as healthcare, finance, and legal services to safeguard sensitive information shared through electronic communications. It can also be integrated into messaging platforms and email services to enhance data security for businesses and individuals.

Questions about the Technology: 1. How does this technology ensure the secure storage of sensitive data in electronic communications? 2. What are the potential implications of this technology for data privacy regulations and compliance?


Original Abstract Submitted

Techniques are described herein for managing access to sensitive data detected within an electronic communication. In some embodiments, such techniques may comprise receiving, from a sender, an electronic communication directed toward a first recipient. The techniques may then comprise identifying one or more pieces of sensitive data within the electronic communication, providing a content of the one or more pieces of sensitive data to a data hosting device to be stored in a memory location and first information associated with the first recipient used to access the memory location, updating the electronic communication to replace the one or more pieces of sensitive data with a reference to the memory location, and transmitting the electronic communication to the first recipient.