Unlock instant, AI-driven research and patent intelligence for your innovation.

Segmented Mapping

a segmentation mapping and data technology, applied in the field of segmentation mapping, can solve problems such as mention lawsuits, privacy leaks that companies fear, and customer confidence declines

Inactive Publication Date: 2012-08-16
AXIS TECH SOFTWARE
View PDF15 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Banks and healthcare providers—to name just a few—face embarrassment, decreased customer confidence, not to mention lawsuits, if they inadvertently release customer or patient data.
But migrating real world data to testing and development environments—where dozens or hundreds of employees may access the environment—can lead to the very privacy leaks that companies fear.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Segmented Mapping
  • Segmented Mapping
  • Segmented Mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]FIG. 1A depicts an architecture that the present invention operates in. There are typically two environments, “production”100 and “user acceptance testing”105 or “UAT.” The production environment 100 is the live data in which an external website user interacts. The UAT environment 105 is a testing ground for new code and bug fixes so that any changes can be vetted before they are pushed to the live system. If changes are not tested before being deployed to the production environment 100, users' service may be interrupted if the code causes a malfunction, or worse, the changes allow unauthorized access to the data that drives the website. Therefore it is important that UAT 105 match the production environment 100 as closely as possible. It is not uncommon, in some embodiments, for UAT 105 to execute the exact same software and on a computer that is a duplicate of the production environment 100.

[0025] A typical environment, whether production or UAT, often has an Application Se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked. The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value.

Description

RELATED APPLICATIONS [0001] The present application is a continuation of prior co-pending U.S. application Ser. No. 12 / 818,808, filed on Jun. 18, 2010, the entire disclosure of which is incorporated by reference herein.FIELD OF THE INVENTION [0002] The present invention relates generally to migrating data from a production environment to a non-production environment and, more specifically, to obfuscating live data to protect the privacy of individuals that use the system. BACKGROUND [0003] Many industries are required to keep their users' data private. Banks and healthcare providers—to name just a few—face embarrassment, decreased customer confidence, not to mention lawsuits, if they inadvertently release customer or patient data. Furthermore, many governments are passing legislation that requires the protection of personal data, e.g., “Mass 201” which sets out guidelines and obligations for anyone that receives personal information from residents of Massachusetts. But the very syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/24
CPCH04L9/28H04L63/0428H04L9/0643H04L9/085H04L9/0894H04L2209/04H04L2209/16
Inventor TASKAYA, ILKERNAUDA, ALEX
Owner AXIS TECH SOFTWARE