Provide insensitive summary for an encrypted document
First Claim
1. A method comprising:
- classifying, by a computing device, content information of an electronic document with at least a linguistic category;
identifying, by the computing device, sensitive information in the content information of the electronic document based on the linguistic category, the content information further including insensitive information;
masking, by the computing device, sensitive information in the electronic document based on the linguistic category to provide an electronic document having sensitive information that is masked by replacing each character of a word that is tagged as sensitive with a masking character;
generating, by the computing device, an insensitive textual summary of the content information in the electronic document, the textual summary comprising only insensitive information from the electronic document having the sensitive information that is masked;
encrypting, by the computing device, the electronic document to provide an encrypted electronic document; and
outputting, by the computing device, both the insensitive textual summary of the electronic document and the encrypted electronic document.
1 Assignment
0 Petitions
Accused Products
Abstract
An insensitive summary of an encrypted electronic document, such as email, is provided. The insensitive summary provides a summary of the encrypted electronic document without providing sensitive information, such as passwords. The electronic document may be an email, text (such as in a word processing file), spreadsheet and/or presentation. Natural language processing methods, such as parts of speech (POS) tagging, word clustering, regular expression evaluating, sensitive key word searching and/or other methods, may be used to identify and mask sensitive words before summarization and encryption of the electronic document. A user'"'"'s efficiency in operating a computing device may be increased having an associated insensitive summary without compromising security of the encrypted electronic document. A user may direct a computing device to perform a search (or similarly categorize or use rules) to identify the encrypted electronic document by searching for contents of the associated insensitive summary.
11 Citations
19 Claims
-
1. A method comprising:
-
classifying, by a computing device, content information of an electronic document with at least a linguistic category; identifying, by the computing device, sensitive information in the content information of the electronic document based on the linguistic category, the content information further including insensitive information; masking, by the computing device, sensitive information in the electronic document based on the linguistic category to provide an electronic document having sensitive information that is masked by replacing each character of a word that is tagged as sensitive with a masking character; generating, by the computing device, an insensitive textual summary of the content information in the electronic document, the textual summary comprising only insensitive information from the electronic document having the sensitive information that is masked; encrypting, by the computing device, the electronic document to provide an encrypted electronic document; and outputting, by the computing device, both the insensitive textual summary of the electronic document and the encrypted electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
an integrated circuit processor; and a non-transitory computer readable storage medium to store computer program code, the computer program code configures the integrated circuit processor to; convert text in the body of an email into a plurality of tokens that represents a plurality of words; tag a token in the plurality of tokens so that the token represents a part of speech category; tag the token in the plurality of tokens so the token indicates a word represented by the token is sensitive; mask the word in the text of the body of the email in response to the token that indicates the word represented by the token is sensitive by replacing each character of a word that is tagged as sensitive with a masking character; generate an insensitive summary of the text of the body of the email, the insensitive summary including insensitive information from the text in the body that has had the word masked; encrypt the text of the email into an encrypted email; and output both the insensitive summary and encrypted email. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer program product, comprising:
-
a computer readable storage medium having computer program code embodied therewith, the computer program code comprising; computer program code configured to identify sensitive information in an email; computer program code configured to mask the sensitive information in the email by replacing each character of a word that is tagged as sensitive with a masking character, the email including insensitive information; computer program code configured to generate an insensitive summary of the email including only insensitive information from the email that has had sensitive information masked; computer program code configured to encrypt the email into an encrypted email; and computer program code configured to output both the insensitive summary of the email and the encrypted email. - View Dependent Claims (16, 17, 18, 19)
-
Specification