BR112017002940A2 - terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial - Google Patents

terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial

Info

Publication number
BR112017002940A2
BR112017002940A2 BR112017002940A BR112017002940A BR112017002940A2 BR 112017002940 A2 BR112017002940 A2 BR 112017002940A2 BR 112017002940 A BR112017002940 A BR 112017002940A BR 112017002940 A BR112017002940 A BR 112017002940A BR 112017002940 A2 BR112017002940 A2 BR 112017002940A2
Authority
BR
Brazil
Prior art keywords
nod
outsourcing
transformation tasks
document
entity
Prior art date
Application number
BR112017002940A
Other languages
English (en)
Inventor
F Monroy-Hernandez Andres
J Driscoll Daniel
H Liden Lars
Original Assignee
Microsoft Technology Licensing Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing Llc filed Critical Microsoft Technology Licensing Llc
Publication of BR112017002940A2 publication Critical patent/BR112017002940A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/101Collaborative creation, e.g. joint development of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

é descrito aqui um ambiente de terceirização pelo qual uma entidade de terceirização pode delegar tarefas de transformação de documentos para pelo menos uma entidade colaboradora, ao mesmo tempo em que impede que a entidade colaboradora tenha conhecimento de itens confidenciais que possam estar contidos em um documento original não ocultos (nod). em um exemplo, o ambiente pode transformar o nod em um documento original oculto (ood) ao remover itens confidenciais do nod. a entidade colaboradora pode realizar a formatação e/ou outras tarefas de transformação de documento no ood, sem obter conhecimento dos itens confidenciais no nod, para produzir um documento transformado oculto (otd). o ambiente pode, então, permitir que a entidade de terceirização exiba uma versão com conteúdo restaurado do otd.
BR112017002940A 2014-09-03 2015-08-31 terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial BR112017002940A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/475,964 US9390282B2 (en) 2014-09-03 2014-09-03 Outsourcing document-transformation tasks while protecting sensitive information
PCT/US2015/047634 WO2016036628A1 (en) 2014-09-03 2015-08-31 Outsourcing document-transformation tasks while protecting sensitive information

Publications (1)

Publication Number Publication Date
BR112017002940A2 true BR112017002940A2 (pt) 2017-12-05

Family

ID=54207670

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112017002940A BR112017002940A2 (pt) 2014-09-03 2015-08-31 terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial

Country Status (6)

Country Link
US (1) US9390282B2 (pt)
JP (1) JP2017530460A (pt)
CN (1) CN106663175B (pt)
BR (1) BR112017002940A2 (pt)
RU (1) RU2017106903A (pt)
WO (1) WO2016036628A1 (pt)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10387674B2 (en) * 2015-06-04 2019-08-20 Datchat, Inc. Systems and methods of transforming electronic content
US10949504B2 (en) 2015-06-04 2021-03-16 Datchat, Inc. Systems and methods of transforming electronic content
US10614249B2 (en) * 2015-07-01 2020-04-07 Allscripts Software, Llc Sanitization of content displayed by web-based applications
WO2017204845A1 (en) * 2016-05-27 2017-11-30 Charter Communications Holding Company Secure collection of sensitive data
JP7152766B2 (ja) * 2016-06-29 2022-10-13 株式会社プロスパークリエイティブ データマスキングシステム
FR3061389B1 (fr) * 2016-12-22 2019-05-31 Airbus Defence And Space Sas Systeme et procede de communication unidirectionnel
US10380355B2 (en) 2017-03-23 2019-08-13 Microsoft Technology Licensing, Llc Obfuscation of user content in structured user data files
US10410014B2 (en) 2017-03-23 2019-09-10 Microsoft Technology Licensing, Llc Configurable annotations for privacy-sensitive user content
US10713390B2 (en) * 2017-07-17 2020-07-14 Microsoft Technology Licensing, Llc Removing sensitive content from documents while preserving their usefulness for subsequent processing
US10915657B2 (en) * 2017-07-19 2021-02-09 AVAST Software s.r.o. Identifying and protecting personal sensitive documents
US10318729B2 (en) * 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10666624B2 (en) * 2017-08-23 2020-05-26 Qualcomm Incorporated Systems and methods for optimized network layer message processing
US10540521B2 (en) * 2017-08-24 2020-01-21 International Business Machines Corporation Selective enforcement of privacy and confidentiality for optimization of voice applications
US10819710B2 (en) * 2017-09-29 2020-10-27 Jpmorgan Chase Bank, N.A. Systems and methods for privacy-protecting hybrid cloud and premise stream processing
JP7003571B2 (ja) 2017-10-26 2022-01-20 富士フイルムビジネスイノベーション株式会社 情報処理装置及びプログラム
CN108040297A (zh) * 2017-12-06 2018-05-15 宁波亿拍客网络科技有限公司 一种视频图像、音频信息授权访问方法及系统
CN108052916A (zh) * 2017-12-23 2018-05-18 宁波亿拍客网络科技有限公司 一种受限的涉及隐私信息及特定信息分析处理系统
US11675503B1 (en) 2018-05-21 2023-06-13 Pure Storage, Inc. Role-based data access
US11455409B2 (en) * 2018-05-21 2022-09-27 Pure Storage, Inc. Storage layer data obfuscation
US11954220B2 (en) 2018-05-21 2024-04-09 Pure Storage, Inc. Data protection for container storage
CN108900468A (zh) * 2018-05-31 2018-11-27 中融万博网络科技有限公司 一种安全存储与传递用户业务数据的方法
US10936826B2 (en) * 2018-06-14 2021-03-02 International Business Machines Corporation Proactive data breach prevention in remote translation environments
US11263179B2 (en) 2018-06-15 2022-03-01 Microsoft Technology Licensing, Llc System for collaborative editing based on document evaluation
US10798152B2 (en) 2018-06-20 2020-10-06 Microsoft Technology Licensing, Llc Machine learning using collaborative editing data
US11157563B2 (en) * 2018-07-13 2021-10-26 Bank Of America Corporation System for monitoring lower level environment for unsanitized data
WO2020082187A1 (en) * 2018-10-26 2020-04-30 Element Ai Inc. Sensitive data detection and replacement
US20200226231A1 (en) * 2019-01-14 2020-07-16 Microsoft Technology Licensing, Llc System for Obfuscating Content in Shared Documents
US10984137B2 (en) 2019-02-15 2021-04-20 Charter Communications Operating, Llc Secure data at rest
US11176262B2 (en) 2019-02-15 2021-11-16 Charter Communications Operating, Llc Secure cloaking of data
US11803481B2 (en) * 2019-02-28 2023-10-31 Hewlett Packard Enterprise Development Lp Data anonymization for a document editor
US11113095B2 (en) 2019-04-30 2021-09-07 Automation Anywhere, Inc. Robotic process automation system with separate platform, bot and command class loaders
CN110348187A (zh) * 2019-05-30 2019-10-18 北京邮电大学 Cp-abe和随机响应融合的隐私保护方法和装置
CN110505203B (zh) * 2019-07-16 2022-03-08 广东高捷航运物流有限公司 一种报文数据处理方法、装置和存储介质
EP4070219A1 (en) * 2019-12-06 2022-10-12 3M Innovative Properties Company Natural psedonymization and downstream processing
US11481304B1 (en) 2019-12-22 2022-10-25 Automation Anywhere, Inc. User action generated process discovery
CN111193751B (zh) * 2020-01-13 2022-02-08 临沂大学 一种恢复出厂设置的方法及设备
US11513670B2 (en) * 2020-04-27 2022-11-29 Automation Anywhere, Inc. Learning user interface controls via incremental data synthesis
KR20220012992A (ko) * 2021-09-14 2022-02-04 센스타임 인터내셔널 피티이. 리미티드. 데이터 보안 처리 방법 및 장치, 기기, 저장 매체
WO2023041971A1 (en) * 2021-09-14 2023-03-23 Sensetime International Pte. Ltd. Data security processing method and apparatus, device and storage medium
US20230107191A1 (en) * 2021-10-05 2023-04-06 Matthew Wong Data obfuscation platform for improving data security of preprocessing analysis by third parties

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7430670B1 (en) * 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
US6978367B1 (en) 1999-10-21 2005-12-20 International Business Machines Corporation Selective data encryption using style sheet processing for decryption by a client proxy
US7003800B1 (en) * 2000-11-06 2006-02-21 Ralph Victor Bain Self-decrypting web site pages
GB0410180D0 (en) * 2004-05-07 2004-06-09 Hewlett Packard Development Co An adaptive privacy management system for data repositories
WO2007049817A1 (en) 2005-10-28 2007-05-03 Matsushita Electric Industrial Co., Ltd. Obfuscation evaluation method and obfuscation method
EP1850263A1 (en) 2006-04-25 2007-10-31 Microsoft Corporation Metadata processing assurance
US8001607B2 (en) 2006-09-27 2011-08-16 Direct Computer Resources, Inc. System and method for obfuscation of data across an enterprise
US7724918B2 (en) 2006-11-22 2010-05-25 International Business Machines Corporation Data obfuscation of text data using entity detection and replacement
US20090132419A1 (en) 2007-11-15 2009-05-21 Garland Grammer Obfuscating sensitive data while preserving data usability
US8824684B2 (en) 2007-12-08 2014-09-02 International Business Machines Corporation Dynamic, selective obfuscation of information for multi-party transmission
WO2009139650A1 (en) 2008-05-12 2009-11-19 Business Intelligence Solutions Safe B.V. A data obfuscation system, method, and computer implementation of data obfuscation for secret databases
US8069053B2 (en) 2008-08-13 2011-11-29 Hartford Fire Insurance Company Systems and methods for de-identification of personal data
EP2189925A3 (en) 2008-11-25 2015-10-14 SafeNet, Inc. Database obfuscation system and method
US10102398B2 (en) 2009-06-01 2018-10-16 Ab Initio Technology Llc Generating obfuscated data
CN102141985B (zh) * 2010-02-02 2015-07-29 新奥特(北京)视频技术有限公司 一种文稿在线编辑器
US8667301B2 (en) * 2010-04-01 2014-03-04 Apple Inc. Obfuscating transformations on data array content and addresses
US9298878B2 (en) 2010-07-29 2016-03-29 Oracle International Corporation System and method for real-time transactional data obfuscation
SG182015A1 (en) 2010-12-14 2012-07-30 C3S Pte Ltd Method and system for protecting intellectual property in software
US10963584B2 (en) * 2011-06-08 2021-03-30 Workshare Ltd. Method and system for collaborative editing of a remotely stored document
US8635700B2 (en) * 2011-12-06 2014-01-21 Raytheon Company Detecting malware using stored patterns
US8707035B2 (en) * 2012-03-30 2014-04-22 Decho Corporation High privacy of file synchronization with sharing functionality
US20140173503A1 (en) * 2012-12-18 2014-06-19 Michael R. Catania System and Method for the Obfuscation, Non-Obfuscation, and De-Obfuscation of Online Text and Images
US9021262B2 (en) * 2013-01-25 2015-04-28 Concurix Corporation Obfuscating trace data
US9300645B1 (en) * 2013-03-14 2016-03-29 Ip Holdings, Inc. Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures
US9544205B2 (en) * 2013-04-09 2017-01-10 Twin Prime, Inc. Cognitive data delivery optimizing system
US9558358B2 (en) * 2013-06-27 2017-01-31 Visa International Service Association Random number generator in a virtualized environment
US9361469B2 (en) * 2014-03-26 2016-06-07 Amazon Technologies, Inc. Electronic communication with secure screen sharing of sensitive information
US9253639B1 (en) * 2014-08-11 2016-02-02 Afirma Consulting & Technologies, S.L. Methods and systems to enable presence related services

Also Published As

Publication number Publication date
US9390282B2 (en) 2016-07-12
WO2016036628A1 (en) 2016-03-10
RU2017106903A (ru) 2018-09-04
CN106663175A (zh) 2017-05-10
JP2017530460A (ja) 2017-10-12
US20160063269A1 (en) 2016-03-03
CN106663175B (zh) 2022-06-21

Similar Documents

Publication Publication Date Title
BR112017002940A2 (pt) terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial
Becker HOTPANTS: high order transform of PSF and template subtraction
MX2018009876A (es) Encapsulamiento y desencapsulamiento de medios.
WO2016183316A8 (en) Automatic threat detection of executable files based on static data analysis
GB2545621A (en) Labeling computing objects for improved threat detection
BR112018074032A2 (pt) composições e métodos relacionados a construtos de fc manipulados
NZ586691A (en) Method for estimating time required for a data processing job based on job parameters and known times for similar jobs
BR112017027861A2 (pt) dispositivo e método de transmissão, e, dispositivo e método de recepção.
BR112017026590A2 (pt) técnicas para monitorar dados para mitigar problema transitivo em contextos orientados a objeto
SG10201901587VA (en) Application testing
Marshall On oriented graphs with certain extension properties
WO2016099422A3 (en) Content sensitive document ranking method by analyzing the citation contexts
IN2015CH01602A (pt)
WO2016123472A3 (en) Analyzing characteristics of genomic regions of a genome
Aydemir et al. Asymptotics eigenvalues for many-interval Sturm-Liouville problems
Chitre et al. On edge-3-equitability of K¯ n-union of helms
BR112016018748A2 (pt) Sistema implementado através da utilização de um computador para análise e gerenciamento de benefícios derivados da utilização de uma substância de ocorrência natural, método que facilita a análise dos benefícios derivados da utilização de uma substância de ocorrência natural, implementado através da utilização de um computador, e método que facilita o gerenciamento de benefícios derivados da utilização de uma substância de ocorrência natural em uma região ou terra particular, implementado através da utilização de um computador
Koma et al. Approximating the number of irreducible polynomials over F2 with several prescribed coefficients
Schøler IT IS DEFINITELY UNETHICAL TO MANIPULATE FINANCIAL STATEMENTS, BUT MAYBE IT IS LESS UNETHICAL AND BETTER, THAN REAL MANIPULATION
Werema et al. Preliminary observations on the avifauna of Ikokoto Forest, Udzungwa Mountains, Tanzania
Eiamchamroonlarp Combating corruption in the Petroleum Sector: Implementation of Extractive Industries Transparency Initiative (EITI)
Crow date: 2018-04-24T12: 24: 00Z cp: revision: 2 extended-properties: AppVersion: 14.0000 meta: paragraph-count: 4 meta: word-count: 309
Gurrala date: 2017-11-24T13: 28: 00Z cp: revision: 6 Total-Time: 4 extended-properties: AppVersion: 12.0000 meta: paragraph-count: 61
Busch et al. VizieR Online Data Catalog: Low-luminosity type-1 QSO sample (Busch+, 2014)
Halsey et al. Windows 10 Features by Edition

Legal Events

Date Code Title Description
B11A Dismissal acc. art.33 of ipl - examination not requested within 36 months of filing
B11Y Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette]