BR112017002940A2 - terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial - Google Patents
terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencialInfo
- Publication number
- BR112017002940A2 BR112017002940A2 BR112017002940A BR112017002940A BR112017002940A2 BR 112017002940 A2 BR112017002940 A2 BR 112017002940A2 BR 112017002940 A BR112017002940 A BR 112017002940A BR 112017002940 A BR112017002940 A BR 112017002940A BR 112017002940 A2 BR112017002940 A2 BR 112017002940A2
- Authority
- BR
- Brazil
- Prior art keywords
- nod
- outsourcing
- transformation tasks
- document
- entity
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/101—Collaborative creation, e.g. joint development of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
é descrito aqui um ambiente de terceirização pelo qual uma entidade de terceirização pode delegar tarefas de transformação de documentos para pelo menos uma entidade colaboradora, ao mesmo tempo em que impede que a entidade colaboradora tenha conhecimento de itens confidenciais que possam estar contidos em um documento original não ocultos (nod). em um exemplo, o ambiente pode transformar o nod em um documento original oculto (ood) ao remover itens confidenciais do nod. a entidade colaboradora pode realizar a formatação e/ou outras tarefas de transformação de documento no ood, sem obter conhecimento dos itens confidenciais no nod, para produzir um documento transformado oculto (otd). o ambiente pode, então, permitir que a entidade de terceirização exiba uma versão com conteúdo restaurado do otd.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/475,964 US9390282B2 (en) | 2014-09-03 | 2014-09-03 | Outsourcing document-transformation tasks while protecting sensitive information |
PCT/US2015/047634 WO2016036628A1 (en) | 2014-09-03 | 2015-08-31 | Outsourcing document-transformation tasks while protecting sensitive information |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112017002940A2 true BR112017002940A2 (pt) | 2017-12-05 |
Family
ID=54207670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112017002940A BR112017002940A2 (pt) | 2014-09-03 | 2015-08-31 | terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial |
Country Status (6)
Country | Link |
---|---|
US (1) | US9390282B2 (pt) |
JP (1) | JP2017530460A (pt) |
CN (1) | CN106663175B (pt) |
BR (1) | BR112017002940A2 (pt) |
RU (1) | RU2017106903A (pt) |
WO (1) | WO2016036628A1 (pt) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10949504B2 (en) | 2015-06-04 | 2021-03-16 | Datchat, Inc. | Systems and methods of transforming electronic content |
US10387674B2 (en) * | 2015-06-04 | 2019-08-20 | Datchat, Inc. | Systems and methods of transforming electronic content |
US10614249B2 (en) * | 2015-07-01 | 2020-04-07 | Allscripts Software, Llc | Sanitization of content displayed by web-based applications |
KR102180508B1 (ko) * | 2016-05-27 | 2020-11-18 | 차터 커뮤니케이션즈 오퍼레이팅, 엘엘씨 | 민감한 데이터의 보안 전송 |
JP7152766B2 (ja) * | 2016-06-29 | 2022-10-13 | 株式会社プロスパークリエイティブ | データマスキングシステム |
FR3061389B1 (fr) | 2016-12-22 | 2019-05-31 | Airbus Defence And Space Sas | Systeme et procede de communication unidirectionnel |
US10380355B2 (en) * | 2017-03-23 | 2019-08-13 | Microsoft Technology Licensing, Llc | Obfuscation of user content in structured user data files |
US10410014B2 (en) | 2017-03-23 | 2019-09-10 | Microsoft Technology Licensing, Llc | Configurable annotations for privacy-sensitive user content |
US10713390B2 (en) | 2017-07-17 | 2020-07-14 | Microsoft Technology Licensing, Llc | Removing sensitive content from documents while preserving their usefulness for subsequent processing |
US10915657B2 (en) * | 2017-07-19 | 2021-02-09 | AVAST Software s.r.o. | Identifying and protecting personal sensitive documents |
US10318729B2 (en) * | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
US10666624B2 (en) * | 2017-08-23 | 2020-05-26 | Qualcomm Incorporated | Systems and methods for optimized network layer message processing |
US10540521B2 (en) * | 2017-08-24 | 2020-01-21 | International Business Machines Corporation | Selective enforcement of privacy and confidentiality for optimization of voice applications |
US10819710B2 (en) * | 2017-09-29 | 2020-10-27 | Jpmorgan Chase Bank, N.A. | Systems and methods for privacy-protecting hybrid cloud and premise stream processing |
JP7003571B2 (ja) | 2017-10-26 | 2022-01-20 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置及びプログラム |
CN108040297A (zh) * | 2017-12-06 | 2018-05-15 | 宁波亿拍客网络科技有限公司 | 一种视频图像、音频信息授权访问方法及系统 |
CN108052916A (zh) * | 2017-12-23 | 2018-05-18 | 宁波亿拍客网络科技有限公司 | 一种受限的涉及隐私信息及特定信息分析处理系统 |
US11675503B1 (en) | 2018-05-21 | 2023-06-13 | Pure Storage, Inc. | Role-based data access |
US11455409B2 (en) * | 2018-05-21 | 2022-09-27 | Pure Storage, Inc. | Storage layer data obfuscation |
US11954220B2 (en) | 2018-05-21 | 2024-04-09 | Pure Storage, Inc. | Data protection for container storage |
CN108900468A (zh) * | 2018-05-31 | 2018-11-27 | 中融万博网络科技有限公司 | 一种安全存储与传递用户业务数据的方法 |
US10936826B2 (en) * | 2018-06-14 | 2021-03-02 | International Business Machines Corporation | Proactive data breach prevention in remote translation environments |
US11263179B2 (en) | 2018-06-15 | 2022-03-01 | Microsoft Technology Licensing, Llc | System for collaborative editing based on document evaluation |
US10798152B2 (en) | 2018-06-20 | 2020-10-06 | Microsoft Technology Licensing, Llc | Machine learning using collaborative editing data |
US11157563B2 (en) * | 2018-07-13 | 2021-10-26 | Bank Of America Corporation | System for monitoring lower level environment for unsanitized data |
JP7418423B2 (ja) * | 2018-10-26 | 2024-01-19 | サービスナウ・カナダ・インコーポレイテッド | 機密データの検出および置き換え |
US20200226231A1 (en) * | 2019-01-14 | 2020-07-16 | Microsoft Technology Licensing, Llc | System for Obfuscating Content in Shared Documents |
US10984137B2 (en) | 2019-02-15 | 2021-04-20 | Charter Communications Operating, Llc | Secure data at rest |
US11176262B2 (en) | 2019-02-15 | 2021-11-16 | Charter Communications Operating, Llc | Secure cloaking of data |
US11803481B2 (en) * | 2019-02-28 | 2023-10-31 | Hewlett Packard Enterprise Development Lp | Data anonymization for a document editor |
US11113095B2 (en) | 2019-04-30 | 2021-09-07 | Automation Anywhere, Inc. | Robotic process automation system with separate platform, bot and command class loaders |
CN110348187A (zh) * | 2019-05-30 | 2019-10-18 | 北京邮电大学 | Cp-abe和随机响应融合的隐私保护方法和装置 |
CN110505203B (zh) * | 2019-07-16 | 2022-03-08 | 广东高捷航运物流有限公司 | 一种报文数据处理方法、装置和存储介质 |
WO2021111324A1 (en) * | 2019-12-06 | 2021-06-10 | 3M Innovative Properties Company | Natural psedonymization and downstream processing |
US11481304B1 (en) | 2019-12-22 | 2022-10-25 | Automation Anywhere, Inc. | User action generated process discovery |
CN111193751B (zh) * | 2020-01-13 | 2022-02-08 | 临沂大学 | 一种恢复出厂设置的方法及设备 |
US11513670B2 (en) * | 2020-04-27 | 2022-11-29 | Automation Anywhere, Inc. | Learning user interface controls via incremental data synthesis |
WO2023041971A1 (en) * | 2021-09-14 | 2023-03-23 | Sensetime International Pte. Ltd. | Data security processing method and apparatus, device and storage medium |
AU2021240235A1 (en) * | 2021-09-14 | 2023-03-30 | Sensetime International Pte. Ltd. | Data security processing method and apparatus, device and storage medium |
US20230107191A1 (en) * | 2021-10-05 | 2023-04-06 | Matthew Wong | Data obfuscation platform for improving data security of preprocessing analysis by third parties |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US6978367B1 (en) | 1999-10-21 | 2005-12-20 | International Business Machines Corporation | Selective data encryption using style sheet processing for decryption by a client proxy |
US7003800B1 (en) * | 2000-11-06 | 2006-02-21 | Ralph Victor Bain | Self-decrypting web site pages |
GB0410180D0 (en) * | 2004-05-07 | 2004-06-09 | Hewlett Packard Development Co | An adaptive privacy management system for data repositories |
JP4918544B2 (ja) | 2005-10-28 | 2012-04-18 | パナソニック株式会社 | 難読化評価方法、難読化評価装置、難読化評価プログラム、記憶媒体および集積回路 |
EP1850263A1 (en) | 2006-04-25 | 2007-10-31 | Microsoft Corporation | Metadata processing assurance |
US8001607B2 (en) | 2006-09-27 | 2011-08-16 | Direct Computer Resources, Inc. | System and method for obfuscation of data across an enterprise |
US7724918B2 (en) | 2006-11-22 | 2010-05-25 | International Business Machines Corporation | Data obfuscation of text data using entity detection and replacement |
US20090132419A1 (en) | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
US8824684B2 (en) | 2007-12-08 | 2014-09-02 | International Business Machines Corporation | Dynamic, selective obfuscation of information for multi-party transmission |
US9305180B2 (en) | 2008-05-12 | 2016-04-05 | New BIS Luxco S.à r.l | Data obfuscation system, method, and computer implementation of data obfuscation for secret databases |
US8069053B2 (en) | 2008-08-13 | 2011-11-29 | Hartford Fire Insurance Company | Systems and methods for de-identification of personal data |
EP2189925A3 (en) | 2008-11-25 | 2015-10-14 | SafeNet, Inc. | Database obfuscation system and method |
US10102398B2 (en) | 2009-06-01 | 2018-10-16 | Ab Initio Technology Llc | Generating obfuscated data |
CN102141985B (zh) * | 2010-02-02 | 2015-07-29 | 新奥特(北京)视频技术有限公司 | 一种文稿在线编辑器 |
US8667301B2 (en) * | 2010-04-01 | 2014-03-04 | Apple Inc. | Obfuscating transformations on data array content and addresses |
US9298878B2 (en) | 2010-07-29 | 2016-03-29 | Oracle International Corporation | System and method for real-time transactional data obfuscation |
SG182015A1 (en) | 2010-12-14 | 2012-07-30 | C3S Pte Ltd | Method and system for protecting intellectual property in software |
US10963584B2 (en) * | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
US8635700B2 (en) * | 2011-12-06 | 2014-01-21 | Raytheon Company | Detecting malware using stored patterns |
US8707035B2 (en) * | 2012-03-30 | 2014-04-22 | Decho Corporation | High privacy of file synchronization with sharing functionality |
US20140173503A1 (en) * | 2012-12-18 | 2014-06-19 | Michael R. Catania | System and Method for the Obfuscation, Non-Obfuscation, and De-Obfuscation of Online Text and Images |
US9021262B2 (en) * | 2013-01-25 | 2015-04-28 | Concurix Corporation | Obfuscating trace data |
US9300645B1 (en) * | 2013-03-14 | 2016-03-29 | Ip Holdings, Inc. | Mobile IO input and output for smartphones, tablet, and wireless devices including touch screen, voice, pen, and gestures |
US9544205B2 (en) * | 2013-04-09 | 2017-01-10 | Twin Prime, Inc. | Cognitive data delivery optimizing system |
US9558358B2 (en) * | 2013-06-27 | 2017-01-31 | Visa International Service Association | Random number generator in a virtualized environment |
US9361469B2 (en) * | 2014-03-26 | 2016-06-07 | Amazon Technologies, Inc. | Electronic communication with secure screen sharing of sensitive information |
US9253639B1 (en) * | 2014-08-11 | 2016-02-02 | Afirma Consulting & Technologies, S.L. | Methods and systems to enable presence related services |
-
2014
- 2014-09-03 US US14/475,964 patent/US9390282B2/en active Active
-
2015
- 2015-08-31 JP JP2017512774A patent/JP2017530460A/ja active Pending
- 2015-08-31 BR BR112017002940A patent/BR112017002940A2/pt not_active Application Discontinuation
- 2015-08-31 CN CN201580047220.2A patent/CN106663175B/zh active Active
- 2015-08-31 WO PCT/US2015/047634 patent/WO2016036628A1/en active Application Filing
- 2015-08-31 RU RU2017106903A patent/RU2017106903A/ru not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
CN106663175A (zh) | 2017-05-10 |
CN106663175B (zh) | 2022-06-21 |
JP2017530460A (ja) | 2017-10-12 |
WO2016036628A1 (en) | 2016-03-10 |
US9390282B2 (en) | 2016-07-12 |
RU2017106903A (ru) | 2018-09-04 |
US20160063269A1 (en) | 2016-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112017002940A2 (pt) | terceirização de tarefas de transformação de documento ao mesmo tempo em que se protege informação confidencial | |
Becker | HOTPANTS: high order transform of PSF and template subtraction | |
BR112019003706A8 (pt) | Método para processamento de dados e aparelho para processamento de dados | |
MX2018009876A (es) | Encapsulamiento y desencapsulamiento de medios. | |
WO2016183316A8 (en) | Automatic threat detection of executable files based on static data analysis | |
GB2545621A (en) | Labeling computing objects for improved threat detection | |
BR112018074032A2 (pt) | composições e métodos relacionados a construtos de fc manipulados | |
NZ586691A (en) | Method for estimating time required for a data processing job based on job parameters and known times for similar jobs | |
BR112017027861A2 (pt) | dispositivo e método de transmissão, e, dispositivo e método de recepção. | |
BR112017026590A2 (pt) | técnicas para monitorar dados para mitigar problema transitivo em contextos orientados a objeto | |
SG10201901587VA (en) | Application testing | |
WO2016099422A3 (en) | Content sensitive document ranking method by analyzing the citation contexts | |
IN2015CH01602A (pt) | ||
GB2561177A8 (en) | Method for identification of digital content | |
BR112016018748A2 (pt) | Sistema implementado através da utilização de um computador para análise e gerenciamento de benefícios derivados da utilização de uma substância de ocorrência natural, método que facilita a análise dos benefícios derivados da utilização de uma substância de ocorrência natural, implementado através da utilização de um computador, e método que facilita o gerenciamento de benefícios derivados da utilização de uma substância de ocorrência natural em uma região ou terra particular, implementado através da utilização de um computador | |
Jun et al. | Comparative Analysis of the Production Performance of Oat-vetch Mixture at Different Mowing Stages | |
Vaes et al. | The role of the private sector in development cooperation. Three case studies in South Africa | |
Eiamchamroonlarp | Combating corruption in the Petroleum Sector: Implementation of Extractive Industries Transparency Initiative (EITI) | |
Crow | date: 2018-04-24T12: 24: 00Z cp: revision: 2 extended-properties: AppVersion: 14.0000 meta: paragraph-count: 4 meta: word-count: 309 | |
Rinthaisong et al. | Antecedents and consequences of behavioral competencies for competitiveness and success of Thai-Malaysia border trade entrepreneurs to support the ASEAN Economic Community | |
Politano | date: 2016-11-21T00: 39: 00Z cp: revision: 3 Total-Time: 3 extended-properties: AppVersion: 15.0000 meta: paragraph-count: 18 | |
Gurrala | date: 2017-11-24T13: 28: 00Z cp: revision: 6 Total-Time: 4 extended-properties: AppVersion: 12.0000 meta: paragraph-count: 61 | |
Bringmann | date: 2016-07-12T08: 05: 00Z cp: revision: 3 Total-Time: 8 extended-properties: AppVersion: 14.0000 meta: paragraph-count: 10 | |
Busch et al. | VizieR Online Data Catalog: Low-luminosity type-1 QSO sample (Busch+, 2014) | |
Vijayaragavan | date: 2017-04-21T04: 57: 00Z cp: revision: 1 extended-properties: AppVersion: 14.0000 meta: paragraph-count: 2 meta: word-count: 179 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B11A | Dismissal acc. art.33 of ipl - examination not requested within 36 months of filing | ||
B11Y | Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette] |