Unlock instant, AI-driven research and patent intelligence for your innovation.

Outsourcing document-transformation tasks while protecting sensitive information

A document and sensitive technology, applied in the direction of digital data protection, data processing applications, instruments, etc., can solve problems that are not suitable

Active Publication Date: 2017-05-10
MICROSOFT TECH LICENSING LLC
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This strategy may be less suitable for other more complex transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourcing document-transformation tasks while protecting sensitive information
  • Outsourcing document-transformation tasks while protecting sensitive information
  • Outsourcing document-transformation tasks while protecting sensitive information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present disclosure is organized as follows. Section A describes an illustrative environment for outsourcing document transformation tasks to worker entities in a secure manner, i.e., without exposing sensitive information that may be contained in documents to the worker entities in raw form. Section B sets forth an illustrative method for explaining the operation of the environment of Section A. Section C describes illustrative computational functions that may be used to implement any aspect of the features described in Sections A and B.

[0020] As a preliminary matter, some of the figures depict concepts in the context of one or more structural components, variously referred to as functions, modules, features, elements, etc. The various components shown in the figures may be implemented in any way by any physical and tangible mechanism, such as by software running on a computer device, hardware (eg, chip-implemented logical functions), etc., and / or any combinatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An outsourcing environment is described herein by which an outsourcing entity may delegate document-transformation tasks to at least one worker entity, while preventing the worker entity from gaining knowledge of sensitive items that may be contained within a non-obfuscated original document (NOD). In one example, the environment may transform the NOD into an obfuscated original document (OOD) by removing sensitive items from the NOD. The worker entity may perform formatting and / or other document-transformation tasks on the OOD, without gaining knowledge of the sensitive items in the NOD, to produce an obfuscated transformed document (OTD). The environment may then allow for the outsourcing entity to view a content-restored version of the OTD.

Description

Background technique [0001] Authors can create documents with information suitable for consumption by some readers but not others. For example, medical records can contain sensitive information about patients; in many jurisdictions, laws may prevent authors from disclosing sensitive information to unauthorized individuals. To address this issue, authors may choose to obfuscate sensitive items within a document to produce an obfuscated or "cleaned" document. Obfuscation may constitute removal of sensitive items, and possible replacement of sensitive items with virtual items that do not have sensitive content (eg, by substituting the fictional name "John Doe" for the actual patient name). The author can then distribute the obfuscated document to the appropriate recipients. To complete the transaction, the recipient can read or analyze the obfuscated document according to different application-specific goals. In this paper, recipients operate as "end-point consumers" of obfusc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q10/10
CPCG06F21/6209G06F21/6254G06Q10/101G06F2221/2141G06F21/6218G06F21/6245G06F21/60
Inventor L·H·利登D·J·德里斯科尔A·F·蒙罗伊-赫南德兹
Owner MICROSOFT TECH LICENSING LLC