Outsourcing document-transformation tasks while protecting sensitive information
A document and sensitive technology, applied in the direction of digital data protection, data processing applications, instruments, etc., can solve problems that are not suitable
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The present disclosure is organized as follows. Section A describes an illustrative environment for outsourcing document transformation tasks to worker entities in a secure manner, i.e., without exposing sensitive information that may be contained in documents to the worker entities in raw form. Section B sets forth an illustrative method for explaining the operation of the environment of Section A. Section C describes illustrative computational functions that may be used to implement any aspect of the features described in Sections A and B.
[0020] As a preliminary matter, some of the figures depict concepts in the context of one or more structural components, variously referred to as functions, modules, features, elements, etc. The various components shown in the figures may be implemented in any way by any physical and tangible mechanism, such as by software running on a computer device, hardware (eg, chip-implemented logical functions), etc., and / or any combinatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


