BR112017002940A2 - terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial - Google Patents
terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencialInfo
- Publication number
- BR112017002940A2 BR112017002940A2 BR112017002940A BR112017002940A BR112017002940A2 BR 112017002940 A2 BR112017002940 A2 BR 112017002940A2 BR 112017002940 A BR112017002940 A BR 112017002940A BR 112017002940 A BR112017002940 A BR 112017002940A BR 112017002940 A2 BR112017002940 A2 BR 112017002940A2
- Authority
- BR
- Brazil
- Prior art keywords
- nod
- outsourcing
- transformation tasks
- document
- entity
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/101—Collaborative creation, e.g. joint development of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
é descrito aqui um ambiente de terceirização pelo qual uma entidade de terceirização pode delegar tarefas de transformação de documentos para pelo menos uma entidade colaboradora, ao mesmo tempo em que impede que a entidade colaboradora tenha conhecimento de itens confidenciais que possam estar contidos em um documento original não ocultos (nod). em um exemplo, o ambiente pode transformar o nod em um documento original oculto (ood) ao remover itens confidenciais do nod. a entidade colaboradora pode realizar a formatação e/ou outras tarefas de transformação de documento no ood, sem obter conhecimento dos itens confidenciais no nod, para produzir um documento transformado oculto (otd). o ambiente pode, então, permitir que a entidade de terceirização exiba uma versão com conteúdo restaurado do otd.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/475,964 US9390282B2 (en) | 2014-09-03 | 2014-09-03 | Outsourcing document-transformation tasks while protecting sensitive information |
PCT/US2015/047634 WO2016036628A1 (en) | 2014-09-03 | 2015-08-31 | Outsourcing document-transformation tasks while protecting sensitive information |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112017002940A2 true BR112017002940A2 (pt) | 2017-12-05 |
Family
ID=54207670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112017002940A BR112017002940A2 (pt) | 2014-09-03 | 2015-08-31 | terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial |
Country Status (6)
Country | Link |
---|---|
US (1) | US9390282B2 (pt) |
JP (1) | JP2017530460A (pt) |
CN (1) | CN106663175B (pt) |
BR (1) | BR112017002940A2 (pt) |
RU (1) | RU2017106903A (pt) |
WO (1) | WO2016036628A1 (pt) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10387674B2 (en) * | 2015-06-04 | 2019-08-20 | Datchat, Inc. | Systems and methods of transforming electronic content |
US10949504B2 (en) | 2015-06-04 | 2021-03-16 | Datchat, Inc. | Systems and methods of transforming electronic content |
US10614249B2 (en) * | 2015-07-01 | 2020-04-07 | Allscripts Software, Llc | Sanitization of content displayed by web-based applications |
WO2017204845A1 (en) * | 2016-05-27 | 2017-11-30 | Charter Communications Holding Company | Secure collection of sensitive data |
JP7152766B2 (ja) * | 2016-06-29 | 2022-10-13 | 株式会社プロスパークリエイティブ | データマスキングシステム |
FR3061389B1 (fr) * | 2016-12-22 | 2019-05-31 | Airbus Defence And Space Sas | Systeme et procede de communication unidirectionnel |
US10380355B2 (en) | 2017-03-23 | 2019-08-13 | Microsoft Technology Licensing, Llc | Obfuscation of user content in structured user data files |
US10410014B2 (en) | 2017-03-23 | 2019-09-10 | Microsoft Technology Licensing, Llc | Configurable annotations for privacy-sensitive user content |
US10713390B2 (en) * | 2017-07-17 | 2020-07-14 | Microsoft Technology Licensing, Llc | Removing sensitive content from documents while preserving their usefulness for subsequent processing |
US10915657B2 (en) * | 2017-07-19 | 2021-02-09 | AVAST Software s.r.o. | Identifying and protecting personal sensitive documents |
US10318729B2 (en) * | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
US10666624B2 (en) * | 2017-08-23 | 2020-05-26 | Qualcomm Incorporated | Systems and methods for optimized network layer message processing |
US10540521B2 (en) * | 2017-08-24 | 2020-01-21 | International Business Machines Corporation | Selective enforcement of privacy and confidentiality for optimization of voice applications |
US10819710B2 (en) * | 2017-09-29 | 2020-10-27 | Jpmorgan Chase Bank, N.A. | Systems and methods for privacy-protecting hybrid cloud and premise stream processing |
JP7003571B2 (ja) | 2017-10-26 | 2022-01-20 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置及びプログラム |
CN108040297A (zh) * | 2017-12-06 | 2018-05-15 | 宁波亿拍客网络科技有限公司 | 一种视频图像、音频信息授权访问方法及系统 |
CN108052916A (zh) * | 2017-12-23 | 2018-05-18 | 宁波亿拍客网络科技有限公司 | 一种受限的涉及隐私信息及特定信息分析处理系统 |
US11675503B1 (en) | 2018-05-21 | 2023-06-13 | Pure Storage, Inc. | Role-based data access |
US11455409B2 (en) * | 2018-05-21 | 2022-09-27 | Pure Storage, Inc. | Storage layer data obfuscation |
US11954220B2 (en) | 2018-05-21 | 2024-04-09 | Pure Storage, Inc. | Data protection for container storage |
CN108900468A (zh) * | 2018-05-31 | 2018-11-27 | 中融万博网络科技有限公司 | 一种安全存储与传递用户业务数据的方法 |
US10936826B2 (en) * | 2018-06-14 | 2021-03-02 | International Business Machines Corporation | Proactive data breach prevention in remote translation environments |
US11263179B2 (en) | 2018-06-15 | 2022-03-01 | Microsoft Technology Licensing, Llc | System for collaborative editing based on document evaluation |
US10798152B2 (en) | 2018-06-20 | 2020-10-06 | Microsoft Technology Licensing, Llc | Machine learning using collaborative editing data |
US11157563B2 (en) * | 2018-07-13 | 2021-10-26 | Bank Of America Corporation | System for monitoring lower level environment for unsanitized data |
WO2020082187A1 (en) * | 2018-10-26 | 2020-04-30 | Element Ai Inc. | Sensitive data detection and replacement |
US20200226231A1 (en) * | 2019-01-14 | 2020-07-16 | Microsoft Technology Licensing, Llc | System for Obfuscating Content in Shared Documents |
US10984137B2 (en) | 2019-02-15 | 2021-04-20 | Charter Communications Operating, Llc | Secure data at rest |
US11176262B2 (en) | 2019-02-15 | 2021-11-16 | Charter Communications Operating, Llc | Secure cloaking of data |
US11803481B2 (en) * | 2019-02-28 | 2023-10-31 | Hewlett Packard Enterprise Development Lp | Data anonymization for a document editor |
US11113095B2 (en) | 2019-04-30 | 2021-09-07 | Automation Anywhere, Inc. | Robotic process automation system with separate platform, bot and command class loaders |
CN110348187A (zh) * | 2019-05-30 | 2019-10-18 | 北京邮电大学 | Cp-abe和随机响应融合的隐私保护方法和装置 |
CN110505203B (zh) * | 2019-07-16 | 2022-03-08 | 广东高捷航运物流有限公司 | 一种报文数据处理方法、装置和存储介质 |
EP4070219A1 (en) * | 2019-12-06 | 2022-10-12 | 3M Innovative Properties Company | Natural psedonymization and downstream processing |
US11481304B1 (en) | 2019-12-22 | 2022-10-25 | Automation Anywhere, Inc. | User action generated process discovery |
CN111193751B (zh) * | 2020-01-13 | 2022-02-08 | 临沂大学 | 一种恢复出厂设置的方法及设备 |
US11513670B2 (en) * | 2020-04-27 | 2022-11-29 | Automation Anywhere, Inc. | Learning user interface controls via incremental data synthesis |
KR20220012992A (ko) * | 2021-09-14 | 2022-02-04 | 센스타임 인터내셔널 피티이. 리미티드. | 데이터 보안 처리 방법 및 장치, 기기, 저장 매체 |
WO2023041971A1 (en) * | 2021-09-14 | 2023-03-23 | Sensetime International Pte. Ltd. | Data security processing method and apparatus, device and storage medium |
US20230107191A1 (en) * | 2021-10-05 | 2023-04-06 | Matthew Wong | Data obfuscation platform for improving data security of preprocessing analysis by third parties |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US6978367B1 (en) | 1999-10-21 | 2005-12-20 | International Business Machines Corporation | Selective data encryption using style sheet processing for decryption by a client proxy |
US7003800B1 (en) * | 2000-11-06 | 2006-02-21 | Ralph Victor Bain | Self-decrypting web site pages |
GB0410180D0 (en) * | 2004-05-07 | 2004-06-09 | Hewlett Packard Development Co | An adaptive privacy management system for data repositories |
WO2007049817A1 (en) | 2005-10-28 | 2007-05-03 | Matsushita Electric Industrial Co., Ltd. | Obfuscation evaluation method and obfuscation method |
EP1850263A1 (en) | 2006-04-25 | 2007-10-31 | Microsoft Corporation | Metadata processing assurance |
US8001607B2 (en) | 2006-09-27 | 2011-08-16 | Direct Computer Resources, Inc. | System and method for obfuscation of data across an enterprise |
US7724918B2 (en) | 2006-11-22 | 2010-05-25 | International Business Machines Corporation | Data obfuscation of text data using entity detection and replacement |
US20090132419A1 (en) | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
US8824684B2 (en) | 2007-12-08 | 2014-09-02 | International Business Machines Corporation | Dynamic, selective obfuscation of information for multi-party transmission |
WO2009139650A1 (en) | 2008-05-12 | 2009-11-19 | Business Intelligence Solutions Safe B.V. | A data obfuscation system, method, and computer implementation of data obfuscation for secret databases |
US8069053B2 (en) | 2008-08-13 | 2011-11-29 | Hartford Fire Insurance Company | Systems and methods for de-identification of personal data |
EP2189925A3 (en) | 2008-11-25 | 2015-10-14 | SafeNet, Inc. | Database obfuscation system and method |
US10102398B2 (en) | 2009-06-01 | 2018-10-16 | Ab Initio Technology Llc | Generating obfuscated data |
CN102141985B (zh) * | 2010-02-02 | 2015-07-29 | 新奥特(北京)视频技术有限公司 | 一种文稿在线编辑器 |
US8667301B2 (en) * | 2010-04-01 | 2014-03-04 | Apple Inc. | Obfuscating transformations on data array content and addresses |
US9298878B2 (en) | 2010-07-29 | 2016-03-29 | Oracle International Corporation | System and method for real-time transactional data obfuscation |
SG182015A1 (en) | 2010-12-14 | 2012-07-30 | C3S Pte Ltd | Method and system for protecting intellectual property in software |
US10963584B2 (en) * | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
US8635700B2 (en) * | 2011-12-06 | 2014-01-21 | Raytheon Company | Detecting malware using stored patterns |
US8707035B2 (en) * | 2012-03-30 | 2014-04-22 | Decho Corporation | High privacy of file synchronization with sharing functionality |
US20140173503A1 (en) * | 2012-12-18 | 2014-06-19 | Michael R. Catania | System and Method for the Obfuscation, Non-Obfuscation, and De-Obfuscation of Online Text and Images |
US9021262B2 (en) * | 2013-01-25 | 2015-04-28 | Concurix Corporation | Obfuscating trace data |
US9300645B1 (en) * | 2013-03-14 | 2016-03-29 | Ip Holdings, Inc. | Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures |
US9544205B2 (en) * | 2013-04-09 | 2017-01-10 | Twin Prime, Inc. | Cognitive data delivery optimizing system |
US9558358B2 (en) * | 2013-06-27 | 2017-01-31 | Visa International Service Association | Random number generator in a virtualized environment |
US9361469B2 (en) * | 2014-03-26 | 2016-06-07 | Amazon Technologies, Inc. | Electronic communication with secure screen sharing of sensitive information |
US9253639B1 (en) * | 2014-08-11 | 2016-02-02 | Afirma Consulting & Technologies, S.L. | Methods and systems to enable presence related services |
-
2014
- 2014-09-03 US US14/475,964 patent/US9390282B2/en active Active
-
2015
- 2015-08-31 CN CN201580047220.2A patent/CN106663175B/zh active Active
- 2015-08-31 BR BR112017002940A patent/BR112017002940A2/pt not_active Application Discontinuation
- 2015-08-31 RU RU2017106903A patent/RU2017106903A/ru not_active Application Discontinuation
- 2015-08-31 WO PCT/US2015/047634 patent/WO2016036628A1/en active Application Filing
- 2015-08-31 JP JP2017512774A patent/JP2017530460A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
US9390282B2 (en) | 2016-07-12 |
WO2016036628A1 (en) | 2016-03-10 |
RU2017106903A (ru) | 2018-09-04 |
CN106663175A (zh) | 2017-05-10 |
JP2017530460A (ja) | 2017-10-12 |
US20160063269A1 (en) | 2016-03-03 |
CN106663175B (zh) | 2022-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112017002940A2 (pt) | terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial | |
Becker | HOTPANTS: high order transform of PSF and template subtraction | |
MX2018009876A (es) | Encapsulamiento y desencapsulamiento de medios. | |
WO2016183316A8 (en) | Automatic threat detection of executable files based on static data analysis | |
GB2545621A (en) | Labeling computing objects for improved threat detection | |
BR112018074032A2 (pt) | composições e métodos relacionados a construtos de fc manipulados | |
NZ586691A (en) | Method for estimating time required for a data processing job based on job parameters and known times for similar jobs | |
BR112017027861A2 (pt) | dispositivo e método de transmissão, e, dispositivo e método de recepção. | |
BR112017026590A2 (pt) | técnicas para monitorar dados para mitigar problema transitivo em contextos orientados a objeto | |
SG10201901587VA (en) | Application testing | |
Marshall | On oriented graphs with certain extension properties | |
WO2016099422A3 (en) | Content sensitive document ranking method by analyzing the citation contexts | |
IN2015CH01602A (pt) | ||
WO2016123472A3 (en) | Analyzing characteristics of genomic regions of a genome | |
Aydemir et al. | Asymptotics eigenvalues for many-interval Sturm-Liouville problems | |
Chitre et al. | On edge-3-equitability of K¯ n-union of helms | |
BR112016018748A2 (pt) | Sistema implementado através da utilização de um computador para análise e gerenciamento de benefícios derivados da utilização de uma substância de ocorrência natural, método que facilita a análise dos benefícios derivados da utilização de uma substância de ocorrência natural, implementado através da utilização de um computador, e método que facilita o gerenciamento de benefícios derivados da utilização de uma substância de ocorrência natural em uma região ou terra particular, implementado através da utilização de um computador | |
Koma et al. | Approximating the number of irreducible polynomials over F2 with several prescribed coefficients | |
Schøler | IT IS DEFINITELY UNETHICAL TO MANIPULATE FINANCIAL STATEMENTS, BUT MAYBE IT IS LESS UNETHICAL AND BETTER, THAN REAL MANIPULATION | |
Werema et al. | Preliminary observations on the avifauna of Ikokoto Forest, Udzungwa Mountains, Tanzania | |
Eiamchamroonlarp | Combating corruption in the Petroleum Sector: Implementation of Extractive Industries Transparency Initiative (EITI) | |
Crow | date: 2018-04-24T12: 24: 00Z cp: revision: 2 extended-properties: AppVersion: 14.0000 meta: paragraph-count: 4 meta: word-count: 309 | |
Gurrala | date: 2017-11-24T13: 28: 00Z cp: revision: 6 Total-Time: 4 extended-properties: AppVersion: 12.0000 meta: paragraph-count: 61 | |
Busch et al. | VizieR Online Data Catalog: Low-luminosity type-1 QSO sample (Busch+, 2014) | |
Halsey et al. | Windows 10 Features by Edition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B11A | Dismissal acc. art.33 of ipl - examination not requested within 36 months of filing | ||
B11Y | Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette] |