SG11201908283TA - Obfuscation of user content in structured user data files - Google Patents
Obfuscation of user content in structured user data filesInfo
- Publication number
- SG11201908283TA SG11201908283TA SG11201908283TA SG11201908283TA SG 11201908283T A SG11201908283T A SG 11201908283TA SG 11201908283T A SG11201908283T A SG 11201908283TA SG 11201908283T A SG11201908283T A SG 11201908283TA
- Authority
- SG
- Singapore
- Prior art keywords
- user
- content
- obfuscation
- microsoft
- international
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
- G06F40/169—Annotation, e.g. comment data or footnotes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/205—Parsing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Human Computer Interaction (AREA)
- Document Processing Apparatus (AREA)
- User Interface Of Digital Computer (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
CONTENTAPPORTONER ANNOTATOR 212 MAPPER OBFUSCATOR 214 USER DATA FILE 114 USER CONTENT O CONTENT CHUNKS sTERD,,Lc PE CHUNK METADATA OFFSETS/ SENSITIVE DATA 4 _ LENGTHS FOUND > ANNOTATIONS 201-4 ',..7:41): firwar . . . . . , POTENTIALLY SENSITIVE DAM PRESENT. 220 - 0 OBFUSCATED CHARACTERS SSN # CREDIT CARD # PASSPORT # ADDRESS PHONE # CHUNK METADATA SPECIFIC LOCATIONS OBFUSCATION SUGGESTIONS 123-45-618S, ' 221 (303)55565;~ 1 987-654320 CUT DOPY 202 PASTE PRIVACY OBFUSCATION • REPLACE WITH... XXX-XX-XXXX • REPLACE ALL WITH... XXX-XX-XXXX FIGURE 2 200-4 APP DLP 113 1-1 1-1 N 1-1 00 1-1 O C (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (43) International Publication Date 27 September 2018 (27.09.2018) WIPO I PCT 01E111nm SID o Ho VIII in VII IE (10) International Publication Number WO 2018/175212 Al (51) International Patent Classification: GOOF 21/62 (2013.01) H04W 12/02 (2009.01) H04L 29/06 (2006.01) G06F 3/0484 (2013.01) (21) International Application Number: PCT/US2018/022767 (22) International Filing Date: 16 March 2018 (16.03.2018) (25) Filing Language: English (26) Publication Language: English (30) Priority Data: 15/467,029 23 March 2017 (23.03.2017) US (71) Applicant: MICROSOFT TECHNOLOGY LI- CENSING, LLC [US/US]; One Microsoft Way, Redmond, Washington 98052-6399 (US). (72) Inventors: ALLEN, Phillip David; MICROSOFT TECH- NOLOGY LICENSING, LLC, One Microsoft Way, Red- mond, Washington 98052-6399 (US). HERNANDEZ, Sara Cristina Oropeza; MICROSOFT TECHNOLOGY LICENSING, LLC, One Microsoft Way, Redmond, Wash- ington 98052-6399 (US). (74) Agent: MINHAS, Sandip S. et al.; MICROSOFT TECH- NOLOGY LICENSING, LLC, One Microsoft Way, Red- mond, Washington 98052-6399 (US). (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, (54) Title: OBFUSCATION OF USER CONTENT IN STRUCTURED USER DATA FILES (57) : Systems, methods, and software for data obfuscation frameworks for user applications are provided herein. An exemplary method includes providing user content to a classification service configured to process the user content to classify portions of the user content as comprising sensitive content, and receiving from the classification service indications of the user content that contains the sensitive content. The method includes presenting graphical indications in a user interface to the user application that annotate the user content as containing the sensitive content, and presenting obfuscation options in the user interface for masking the sensitive content within at least a selected portion among the user content. Responsive to a user selection of at least one of the obfuscation options, the method includes replacing associated user content with obfuscated content that maintains a data scheme of the associated user content. [Continued on next page] WO 2018/175212 Al MIDEDIMOIMEMIHINOMOIMIHOHHIMEMOIMIE OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). Declarations under Rule 4.17: as to applicant's entitlement to apply for and be granted a patent (Rule 4.17(ii)) as to the applicant's entitlement to claim the priority of the earlier application (Rule 4.17(iii)) Published: — with international search report (Art. 21(3))
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/467,029 US10380355B2 (en) | 2017-03-23 | 2017-03-23 | Obfuscation of user content in structured user data files |
PCT/US2018/022767 WO2018175212A1 (en) | 2017-03-23 | 2018-03-16 | Obfuscation of user content in structured user data files |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201908283TA true SG11201908283TA (en) | 2019-10-30 |
Family
ID=61874018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201908283T SG11201908283TA (en) | 2017-03-23 | 2018-03-16 | Obfuscation of user content in structured user data files |
Country Status (16)
Country | Link |
---|---|
US (2) | US10380355B2 (en) |
EP (1) | EP3602381A1 (en) |
JP (2) | JP2020516127A (en) |
KR (1) | KR102537275B1 (en) |
CN (1) | CN110447035B (en) |
AU (1) | AU2018239927B2 (en) |
BR (1) | BR112019017319A2 (en) |
CA (1) | CA3053651A1 (en) |
CL (1) | CL2019002635A1 (en) |
CO (1) | CO2019009852A2 (en) |
IL (1) | IL268795B (en) |
MX (1) | MX2019011181A (en) |
PH (1) | PH12019550176A1 (en) |
SG (1) | SG11201908283TA (en) |
WO (1) | WO2018175212A1 (en) |
ZA (1) | ZA201905230B (en) |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10541982B1 (en) * | 2016-06-02 | 2020-01-21 | Jpmorgan Chase Bank, N.A. | Techniques for protecting electronic data |
US10671753B2 (en) | 2017-03-23 | 2020-06-02 | Microsoft Technology Licensing, Llc | Sensitive data loss protection for structured user content viewed in user applications |
US10410014B2 (en) | 2017-03-23 | 2019-09-10 | Microsoft Technology Licensing, Llc | Configurable annotations for privacy-sensitive user content |
US10380355B2 (en) * | 2017-03-23 | 2019-08-13 | Microsoft Technology Licensing, Llc | Obfuscation of user content in structured user data files |
US10460115B2 (en) * | 2017-05-15 | 2019-10-29 | International Business Machines Corporation | Data anonymity |
US10200331B2 (en) * | 2017-06-28 | 2019-02-05 | Xerox Corporation | Methods and systems for performing structure-preserving obfuscation on emails |
US20190384796A1 (en) | 2018-06-13 | 2019-12-19 | Oracle International Corporation | Regular expression generation using longest common subsequence algorithm on regular expression codes |
US11354305B2 (en) * | 2018-06-13 | 2022-06-07 | Oracle International Corporation | User interface commands for regular expression generation |
US11580166B2 (en) | 2018-06-13 | 2023-02-14 | Oracle International Corporation | Regular expression generation using span highlighting alignment |
US11941018B2 (en) | 2018-06-13 | 2024-03-26 | Oracle International Corporation | Regular expression generation for negative example using context |
US10817617B1 (en) * | 2018-06-28 | 2020-10-27 | Ca, Inc. | Data loss prevention for biometric data |
US11450069B2 (en) | 2018-11-09 | 2022-09-20 | Citrix Systems, Inc. | Systems and methods for a SaaS lens to view obfuscated content |
US11201889B2 (en) | 2019-03-29 | 2021-12-14 | Citrix Systems, Inc. | Security device selection based on secure content detection |
US11340863B2 (en) * | 2019-03-29 | 2022-05-24 | Tata Consultancy Services Limited | Systems and methods for muting audio information in multimedia files and retrieval thereof |
US11562134B2 (en) * | 2019-04-02 | 2023-01-24 | Genpact Luxembourg S.à r.l. II | Method and system for advanced document redaction |
US11100087B2 (en) | 2019-04-26 | 2021-08-24 | Microsoft Technology Licensing, Llc | Data tokenization system maintaining data integrity |
KR102196547B1 (en) * | 2019-05-20 | 2020-12-29 | 주식회사 무하유 | Method and apparatus for blind processing of specific information in document |
US11412370B2 (en) * | 2019-07-23 | 2022-08-09 | Jpmorgan Chase Bank, N.A. | Method and system for low density hosted telephony regulatory compliance |
CN110704861B (en) * | 2019-08-07 | 2023-03-24 | 荣邦科技有限公司 | Method, device and system for real-time desensitization based on open interface |
US11755760B2 (en) * | 2019-10-18 | 2023-09-12 | Asg Technologies Group, Inc. | Systems and methods for secure policies-based information governance |
EP4049161A4 (en) * | 2019-10-24 | 2023-11-01 | Canopy Software Inc. | Systems and methods for identifying compliance-related information associated with data breach events |
US10915653B1 (en) * | 2019-11-26 | 2021-02-09 | Lee David Buckland | System and methods for the management and security of data variations in an electronic spreadsheet |
CN111177667B (en) * | 2019-12-16 | 2021-08-10 | 浙江信网真科技股份有限公司 | Authority control method and system for content partition processing |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
US11582266B2 (en) * | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
US11361113B2 (en) | 2020-03-26 | 2022-06-14 | Citrix Systems, Inc. | System for prevention of image capture of sensitive information and related techniques |
US11782928B2 (en) | 2020-06-30 | 2023-10-10 | Microsoft Technology Licensing, Llc | Computerized information extraction from tables |
US11308236B2 (en) | 2020-08-12 | 2022-04-19 | Kyndryl, Inc. | Managing obfuscation of regulated sensitive data |
WO2022041058A1 (en) | 2020-08-27 | 2022-03-03 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
WO2022041163A1 (en) | 2020-08-29 | 2022-03-03 | Citrix Systems, Inc. | Identity leak prevention |
US11861039B1 (en) * | 2020-09-28 | 2024-01-02 | Amazon Technologies, Inc. | Hierarchical system and method for identifying sensitive content in data |
US11790103B2 (en) * | 2020-09-29 | 2023-10-17 | Citrix Systems, Inc. | Adaptive data loss prevention |
US11662215B2 (en) * | 2020-11-03 | 2023-05-30 | Here Global B.V. | Method, apparatus, and computer program product for anonymizing trajectories |
US11822650B2 (en) * | 2020-12-16 | 2023-11-21 | Citrix Systems, Inc. | System and method for prevention of transfer of sensitive information |
KR102263111B1 (en) * | 2021-01-15 | 2021-06-09 | (주) 투씨에스지 | Method for data security management and recording medium recording program for performing the method |
CN112818390A (en) * | 2021-01-26 | 2021-05-18 | 支付宝(杭州)信息技术有限公司 | Data information publishing method, device and equipment based on privacy protection |
US11729149B2 (en) | 2021-02-02 | 2023-08-15 | Cisco Technology, Inc. | Coordinated data obfuscation |
CN113971296B (en) * | 2021-12-24 | 2022-04-15 | 每日互动股份有限公司 | ID fuzzification data processing system |
US20240012921A1 (en) * | 2022-07-07 | 2024-01-11 | Cisco Technology, Inc. | Dynamic resolution and enforcement of data compliance |
CN115525879B (en) * | 2022-11-25 | 2023-04-07 | 易方信息科技股份有限公司 | Protection method for SDK internal sensitive data aiming at iOS |
Family Cites Families (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6424980B1 (en) | 1998-06-10 | 2002-07-23 | Nippon Telegraph And Telephone Corporation | Integrated retrieval scheme for retrieving semi-structured documents |
US7127615B2 (en) | 2000-09-20 | 2006-10-24 | Blue Spike, Inc. | Security based on subliminal and supraliminal channels for data objects |
US7352868B2 (en) | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
WO2003098466A1 (en) | 2002-05-14 | 2003-11-27 | Verity, Inc. | Apparatus and method for region sensitive dynamically configurable document relevance ranking |
US7886359B2 (en) | 2002-09-18 | 2011-02-08 | Symantec Corporation | Method and apparatus to report policy violations in messages |
US20040193910A1 (en) | 2003-03-28 | 2004-09-30 | Samsung Electronics Co., Ltd. | Security filter for preventing the display of sensitive information on a video display |
US20060242180A1 (en) | 2003-07-23 | 2006-10-26 | Graf James A | Extracting data from semi-structured text documents |
US20050038788A1 (en) * | 2003-08-14 | 2005-02-17 | International Business Machines Corporation | Annotation security to prevent the divulgence of sensitive information |
EP1521161A3 (en) | 2003-09-25 | 2006-03-15 | Matsushita Electric Industrial Co., Ltd. | An apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use |
US8261058B2 (en) | 2005-03-16 | 2012-09-04 | Dt Labs, Llc | System, method and apparatus for electronically protecting data and digital content |
US8612854B2 (en) | 2005-12-16 | 2013-12-17 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8782436B2 (en) | 2006-05-31 | 2014-07-15 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US7724918B2 (en) * | 2006-11-22 | 2010-05-25 | International Business Machines Corporation | Data obfuscation of text data using entity detection and replacement |
US8655939B2 (en) * | 2007-01-05 | 2014-02-18 | Digital Doors, Inc. | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US8635691B2 (en) | 2007-03-02 | 2014-01-21 | 403 Labs, Llc | Sensitive data scanner |
US7949670B2 (en) * | 2007-03-16 | 2011-05-24 | Microsoft Corporation | Language neutral text verification |
US8504553B2 (en) | 2007-04-19 | 2013-08-06 | Barnesandnoble.Com Llc | Unstructured and semistructured document processing and searching |
US8627403B1 (en) | 2007-07-31 | 2014-01-07 | Hewlett-Packard Development Company, L.P. | Policy applicability determination |
US20090100527A1 (en) * | 2007-10-10 | 2009-04-16 | Adrian Michael Booth | Real-time enterprise data masking |
US20090132419A1 (en) * | 2007-11-15 | 2009-05-21 | Garland Grammer | Obfuscating sensitive data while preserving data usability |
US7877398B2 (en) * | 2007-11-19 | 2011-01-25 | International Business Machines Corporation | Masking related sensitive data in groups |
US8347396B2 (en) * | 2007-11-30 | 2013-01-01 | International Business Machines Corporation | Protect sensitive content for human-only consumption |
US20090144619A1 (en) * | 2007-12-03 | 2009-06-04 | Steven Francis Best | Method to protect sensitive data fields stored in electronic documents |
US8280905B2 (en) | 2007-12-21 | 2012-10-02 | Georgetown University | Automated forensic document signatures |
US8145632B2 (en) | 2008-02-22 | 2012-03-27 | Tigerlogic Corporation | Systems and methods of identifying chunks within multiple documents |
US7996373B1 (en) | 2008-03-28 | 2011-08-09 | Symantec Corporation | Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema |
US20090259670A1 (en) | 2008-04-14 | 2009-10-15 | Inmon William H | Apparatus and Method for Conditioning Semi-Structured Text for use as a Structured Data Source |
US8041695B2 (en) | 2008-04-18 | 2011-10-18 | The Boeing Company | Automatically extracting data from semi-structured documents |
US8346532B2 (en) * | 2008-07-11 | 2013-01-01 | International Business Machines Corporation | Managing the creation, detection, and maintenance of sensitive information |
US8069053B2 (en) | 2008-08-13 | 2011-11-29 | Hartford Fire Insurance Company | Systems and methods for de-identification of personal data |
US8200509B2 (en) * | 2008-09-10 | 2012-06-12 | Expanse Networks, Inc. | Masked data record access |
US20100088296A1 (en) | 2008-10-03 | 2010-04-08 | Netapp, Inc. | System and method for organizing data to facilitate data deduplication |
US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
US8156159B2 (en) | 2009-02-11 | 2012-04-10 | Verizon Patent And Licensing, Inc. | Data masking and unmasking of sensitive data |
US8863304B1 (en) | 2009-03-26 | 2014-10-14 | Symantec Corporation | Method and apparatus for remediating backup data to control access to sensitive data |
BR112012005727A2 (en) | 2009-09-14 | 2019-09-24 | Directv Group Inc | method and system for distributing content. |
US20110219446A1 (en) | 2010-03-05 | 2011-09-08 | Jeffrey Ichnowski | Input parameter filtering for web application security |
CA2735059A1 (en) * | 2010-03-25 | 2011-09-25 | Rl Solutions | Systems and methods for redacting sensitive data entries |
US8949184B2 (en) * | 2010-04-26 | 2015-02-03 | Microsoft Technology Licensing, Llc | Data collector |
SG177018A1 (en) | 2010-06-09 | 2012-01-30 | Smart Communications Inc | System and method for the provision of content to a subscriber |
US8539560B2 (en) * | 2010-06-24 | 2013-09-17 | International Business Machines Corporation | Content protection using automatically selectable display surfaces |
US9298878B2 (en) * | 2010-07-29 | 2016-03-29 | Oracle International Corporation | System and method for real-time transactional data obfuscation |
US8892550B2 (en) | 2010-09-24 | 2014-11-18 | International Business Machines Corporation | Source expansion for information retrieval and information extraction |
JP5827467B2 (en) | 2010-11-12 | 2015-12-02 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method, apparatus, server, and computer program for masking partial text data in electronic document |
US8601594B2 (en) | 2010-11-30 | 2013-12-03 | International Business Machines Corporation | Automatically classifying an input from field with respect to sensitivity of information it is designed to hold |
US9003542B1 (en) | 2010-12-13 | 2015-04-07 | Symantec Corporation | Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same |
US8862522B1 (en) | 2010-12-14 | 2014-10-14 | Symantec Corporation | Incremental machine learning for data loss prevention |
US8769200B2 (en) | 2011-03-01 | 2014-07-01 | Xbridge Systems, Inc. | Method for managing hierarchical storage during detection of sensitive information, computer readable storage media and system utilizing same |
US10534931B2 (en) * | 2011-03-17 | 2020-01-14 | Attachmate Corporation | Systems, devices and methods for automatic detection and masking of private data |
EP2689353B1 (en) * | 2011-03-22 | 2019-11-06 | Informatica LLC | System and method for data masking |
US8930381B2 (en) | 2011-04-07 | 2015-01-06 | Infosys Limited | Methods and systems for runtime data anonymization |
CN103493006B (en) * | 2011-04-19 | 2016-12-28 | 惠普发展公司,有限责任合伙企业 | User content is stoped based on position |
US8688601B2 (en) * | 2011-05-23 | 2014-04-01 | Symantec Corporation | Systems and methods for generating machine learning-based classifiers for detecting specific categories of sensitive information |
US20120324225A1 (en) | 2011-06-20 | 2012-12-20 | Jason Chambers | Certificate-based mutual authentication for data security |
US8914859B2 (en) * | 2011-11-07 | 2014-12-16 | International Business Machines Corporation | Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages |
US9104528B2 (en) | 2011-12-08 | 2015-08-11 | Microsoft Technology Licensing, Llc | Controlling the release of private information using static flow analysis |
US8881296B2 (en) * | 2012-01-18 | 2014-11-04 | Pivotal Software, Inc. | Marking and obscuring sensitive values in traces |
US9183212B2 (en) | 2012-01-26 | 2015-11-10 | Upthere, Inc. | Representing directory structure in content-addressable storage systems |
US8898796B2 (en) * | 2012-02-14 | 2014-11-25 | International Business Machines Corporation | Managing network data |
US8959047B2 (en) | 2012-05-10 | 2015-02-17 | Check Point Software Technologies Ltd. | Reducing false positives in data validation using statistical heuristics |
US9473532B2 (en) | 2012-07-19 | 2016-10-18 | Box, Inc. | Data loss prevention (DLP) methods by a cloud service including third party integration architectures |
AU2013312742B2 (en) * | 2012-09-07 | 2018-08-02 | Kroll Information Assurance, Llc | Snippet matching in file sharing networks |
AU2013204965B2 (en) * | 2012-11-12 | 2016-07-28 | C2 Systems Limited | A system, method, computer program and data signal for the registration, monitoring and control of machines and devices |
US9489376B2 (en) | 2013-01-02 | 2016-11-08 | International Business Machines Corporation | Identifying confidential data in a data item by comparing the data item to similar data items from alternative sources |
US8973149B2 (en) | 2013-01-14 | 2015-03-03 | Lookout, Inc. | Detection of and privacy preserving response to observation of display screen |
US8925099B1 (en) | 2013-03-14 | 2014-12-30 | Reputation.Com, Inc. | Privacy scoring |
CN104166822B (en) * | 2013-05-20 | 2017-10-13 | 阿里巴巴集团控股有限公司 | A kind of method and apparatus of data protection |
US20150040237A1 (en) * | 2013-08-05 | 2015-02-05 | Xerox Corporation | Systems and methods for interactive creation of privacy safe documents |
US9392012B2 (en) | 2013-11-01 | 2016-07-12 | Bank Of America Corporation | Application security testing system |
US9177174B1 (en) * | 2014-02-06 | 2015-11-03 | Google Inc. | Systems and methods for protecting sensitive data in communications |
US9256727B1 (en) | 2014-02-20 | 2016-02-09 | Symantec Corporation | Systems and methods for detecting data leaks |
US9542622B2 (en) | 2014-03-08 | 2017-01-10 | Microsoft Technology Licensing, Llc | Framework for data extraction by examples |
US9330273B2 (en) | 2014-03-19 | 2016-05-03 | Symantec Corporation | Systems and methods for increasing compliance with data loss prevention policies |
US9785795B2 (en) * | 2014-05-10 | 2017-10-10 | Informatica, LLC | Identifying and securing sensitive data at its source |
US9858440B1 (en) * | 2014-05-23 | 2018-01-02 | Shape Security, Inc. | Encoding of sensitive data |
US10129370B2 (en) | 2014-08-01 | 2018-11-13 | Protegrity Corporation | Mapping between user interface fields and protocol information |
US9390282B2 (en) * | 2014-09-03 | 2016-07-12 | Microsoft Technology Licensing, Llc | Outsourcing document-transformation tasks while protecting sensitive information |
US9384357B2 (en) | 2014-10-01 | 2016-07-05 | Quixey, Inc. | Providing application privacy information |
EP3210140A4 (en) * | 2014-10-20 | 2018-06-06 | 3M Innovative Properties Company | Identification of codable sections in medical documents |
US9898610B1 (en) * | 2014-10-22 | 2018-02-20 | State Farm Mutual Automobile Insurance Company | System and method for concealing sensitive data on a computing device |
US9697349B2 (en) | 2014-10-26 | 2017-07-04 | Microsoft Technology Licensing, Llc | Access blocking for data loss prevention in collaborative environments |
US9934406B2 (en) * | 2015-01-08 | 2018-04-03 | Microsoft Technology Licensing, Llc | Protecting private information in input understanding system |
US9454675B2 (en) * | 2015-01-26 | 2016-09-27 | Idis Co., Ltd. | Apparatus and method for protecting personal information of recorded image, and computer-readable recording medium having computer program recorded therein |
CN105991670B (en) * | 2015-01-28 | 2020-02-14 | 中兴通讯股份有限公司 | Data sharing method, data sharing device and terminal |
US10140343B2 (en) * | 2015-02-09 | 2018-11-27 | Ca, Inc. | System and method of reducing data in a storage system |
WO2016166760A1 (en) | 2015-04-16 | 2016-10-20 | Docauthority Ltd. | Structural document classification |
US10083320B2 (en) * | 2015-06-24 | 2018-09-25 | Airwatch Llc | Dynamic content redaction |
EP3166041A1 (en) * | 2015-11-07 | 2017-05-10 | Tata Consultancy Services Limited | Format preserving masking system and method |
US10282557B1 (en) | 2015-11-19 | 2019-05-07 | Veritas Technologies Llc | Systems and methods for protecting sensitive data against data loss |
US9904957B2 (en) | 2016-01-15 | 2018-02-27 | FinLocker LLC | Systems and/or methods for maintaining control over, and access to, sensitive data inclusive digital vaults and hierarchically-arranged information elements thereof |
US10742844B2 (en) * | 2016-06-28 | 2020-08-11 | Hewlett-Packard Development Company, L.P. | Hiding sensitive data |
US10430610B2 (en) * | 2016-06-30 | 2019-10-01 | International Business Machines Corporation | Adaptive data obfuscation |
US10387670B2 (en) | 2016-09-21 | 2019-08-20 | International Business Machines Corporation | Handling sensitive data in an application using external processing |
CN106407843A (en) * | 2016-10-17 | 2017-02-15 | 深圳中兴网信科技有限公司 | Data desensitization method and data desensitization device |
CN106529277A (en) * | 2016-12-14 | 2017-03-22 | 北京小米移动软件有限公司 | Message preview method and device |
US20180253219A1 (en) * | 2017-03-06 | 2018-09-06 | Microsoft Technology Licensing, Llc | Personalized presentation of content on a computing device |
US10380355B2 (en) * | 2017-03-23 | 2019-08-13 | Microsoft Technology Licensing, Llc | Obfuscation of user content in structured user data files |
US10410014B2 (en) | 2017-03-23 | 2019-09-10 | Microsoft Technology Licensing, Llc | Configurable annotations for privacy-sensitive user content |
US10671753B2 (en) | 2017-03-23 | 2020-06-02 | Microsoft Technology Licensing, Llc | Sensitive data loss protection for structured user content viewed in user applications |
US10412139B2 (en) | 2017-05-26 | 2019-09-10 | Streamsure Solutions Limited | Communication event |
US10200331B2 (en) | 2017-06-28 | 2019-02-05 | Xerox Corporation | Methods and systems for performing structure-preserving obfuscation on emails |
-
2017
- 2017-03-23 US US15/467,029 patent/US10380355B2/en active Active
-
2018
- 2018-03-16 WO PCT/US2018/022767 patent/WO2018175212A1/en unknown
- 2018-03-16 KR KR1020197027703A patent/KR102537275B1/en active IP Right Grant
- 2018-03-16 BR BR112019017319-6A patent/BR112019017319A2/en unknown
- 2018-03-16 MX MX2019011181A patent/MX2019011181A/en unknown
- 2018-03-16 JP JP2019552265A patent/JP2020516127A/en active Pending
- 2018-03-16 CN CN201880020344.5A patent/CN110447035B/en active Active
- 2018-03-16 SG SG11201908283T patent/SG11201908283TA/en unknown
- 2018-03-16 AU AU2018239927A patent/AU2018239927B2/en active Active
- 2018-03-16 CA CA3053651A patent/CA3053651A1/en active Pending
- 2018-03-16 EP EP18715420.8A patent/EP3602381A1/en active Pending
-
2019
- 2019-07-09 US US16/506,223 patent/US11182490B2/en active Active
- 2019-08-07 ZA ZA2019/05230A patent/ZA201905230B/en unknown
- 2019-08-20 IL IL268795A patent/IL268795B/en unknown
- 2019-08-31 PH PH12019550176A patent/PH12019550176A1/en unknown
- 2019-09-11 CO CONC2019/0009852A patent/CO2019009852A2/en unknown
- 2019-09-13 CL CL2019002635A patent/CL2019002635A1/en unknown
-
2022
- 2022-10-11 JP JP2022163262A patent/JP7398537B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2018239927A1 (en) | 2019-08-22 |
IL268795A (en) | 2019-10-31 |
KR20190129877A (en) | 2019-11-20 |
JP2020516127A (en) | 2020-05-28 |
CO2019009852A2 (en) | 2019-09-30 |
CN110447035A (en) | 2019-11-12 |
IL268795B (en) | 2022-03-01 |
WO2018175212A1 (en) | 2018-09-27 |
BR112019017319A2 (en) | 2020-03-31 |
US20180276393A1 (en) | 2018-09-27 |
CA3053651A1 (en) | 2018-09-27 |
ZA201905230B (en) | 2020-10-28 |
MX2019011181A (en) | 2019-10-30 |
AU2018239927B2 (en) | 2022-01-13 |
EP3602381A1 (en) | 2020-02-05 |
US20190332784A1 (en) | 2019-10-31 |
US11182490B2 (en) | 2021-11-23 |
JP2023011632A (en) | 2023-01-24 |
CN110447035B (en) | 2023-08-29 |
KR102537275B1 (en) | 2023-05-25 |
PH12019550176A1 (en) | 2020-06-29 |
RU2019133475A (en) | 2021-04-23 |
RU2019133475A3 (en) | 2021-07-30 |
US10380355B2 (en) | 2019-08-13 |
CL2019002635A1 (en) | 2020-01-31 |
JP7398537B2 (en) | 2023-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201908283TA (en) | Obfuscation of user content in structured user data files | |
SG11201908288XA (en) | Configurable annotations for privacy-sensitive user content | |
SG11201903604PA (en) | Iot security service | |
SG11201908293QA (en) | Selective application of reprojection processing on layer sub-regions for optimizing late stage reprojection power | |
SG11201901577SA (en) | Method and system for fast tracking navigation of blockchains via data manipulation | |
SG11201804696RA (en) | Techniques for metadata processing | |
SG11201806823YA (en) | Extended synchronization signal for symbol index detection | |
SG11201906200WA (en) | Nucleic acid-polypeptide compositions and methods of inducing exon skipping | |
SG11201407508RA (en) | Encoding and decoding based on blending of sequences of samples along time | |
SG11201906542YA (en) | Narrowband time-division duplex frame structure for narrowband communications | |
SG11201805795WA (en) | Systems and methods for securing and disseminating time sensitive information using a blockchain | |
SG11201901243VA (en) | Resource allocation patterns for scheduling services in a wireless network | |
SG11201908567UA (en) | Modified cyclic dinucleotide compounds | |
SG11201806404SA (en) | Systems and methods for storing and sharing transactional data using distributed computer systems | |
SG11201909903VA (en) | Containerized deployment of microservices based on monolithic legacy applications | |
SG11201808474YA (en) | Method and system for desychronization recovery for permissioned blockchains using bloom filters | |
SG11201908478SA (en) | Sterilisation method | |
SG11201810288PA (en) | Multi-level control, variable access, multi-user contextual intelligent communication platform | |
SG11201910030SA (en) | Virtual reality mobile pod | |
SG11201908847TA (en) | Apparatuses, systems and methods for imaging flow cytometry | |
SG11201810175YA (en) | Relational rendering of holographic objects | |
SG11201901347UA (en) | Compositions and methods for cancer immunotherapy | |
SG11201806825RA (en) | A data source system agnostic fact category partitioned information repository and methods for the insertion and retrieval of data using the information repository | |
SG11201804085SA (en) | Systems and methods for detection of malicious code in runtime generated code | |
SG11201900845YA (en) | Uses of il-13 antagonists for treating atopic dermatitis |