Privacy firewall
First Claim
1. A method comprising:
- receiving, by a recipient computer located outside a secure area, an anonymized message from a privacy computer located within the secure area, wherein the privacy computer generated the anonymized message by anonymizing a message including sensitive data based on a context of the message, and wherein the message was received by the privacy computer from a user computer, wherein anonymizing the message includes at least two different data alteration processes;
obtaining, by the recipient computer, one or more privacy rules applicable to the anonymized message; and
recreating, by the recipient computer, at least a portion of the sensitive data by applying the one or more privacy rules to the anonymized message,wherein the anonymized message includes an embedded hidden record, and wherein the embedded hidden record includes instructions for recreating at least the portion of the sensitive data using the one or more privacy rules,wherein the at least two different data alteration processes include two or more of the following;
removing unnecessary sensitive data;
masking the sensitive data to maintain format;
separate the sensitive data into associated data groupings; and
de-contexting the sensitive data.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.
537 Citations
12 Claims
-
1. A method comprising:
-
receiving, by a recipient computer located outside a secure area, an anonymized message from a privacy computer located within the secure area, wherein the privacy computer generated the anonymized message by anonymizing a message including sensitive data based on a context of the message, and wherein the message was received by the privacy computer from a user computer, wherein anonymizing the message includes at least two different data alteration processes; obtaining, by the recipient computer, one or more privacy rules applicable to the anonymized message; and recreating, by the recipient computer, at least a portion of the sensitive data by applying the one or more privacy rules to the anonymized message, wherein the anonymized message includes an embedded hidden record, and wherein the embedded hidden record includes instructions for recreating at least the portion of the sensitive data using the one or more privacy rules, wherein the at least two different data alteration processes include two or more of the following; removing unnecessary sensitive data; masking the sensitive data to maintain format; separate the sensitive data into associated data groupings; and de-contexting the sensitive data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A recipient computer located outside a secure area, the recipient computer comprising one or more processors and a non-transitory machine-readable storage medium, including instructions that, when executed by the one or more processors, cause the one or more processors to:
-
receive an anonymized message from a privacy computer located within the secure area, wherein the privacy computer generated the anonymized message by anonymizing a message including sensitive data based on a context of the message, and wherein the message was received by the privacy computer from a user computer located within the secure area, wherein anonymizing the message includes at least two different data alteration processes; obtain one or more privacy rules applicable to the anonymized message; and recreate at least a portion of the sensitive data by applying the one or more privacy rules to the anonymized message, wherein the anonymized message includes an embedded hidden record, and wherein the embedded hidden record includes instructions for recreating at least the portion of the sensitive data using the one or more privacy rules, wherein the at least two different data alteration processes include two or more of the following; removing unnecessary sensitive data; masking the sensitive data to maintain format; separate the sensitive data into associated data groupings; and de-contexting the sensitive data. - View Dependent Claims (8, 9)
-
-
10. A method comprising:
-
receiving, by a privacy computer located within a secure area, a message directed at a recipient computer located outside the secure area, wherein the message includes sensitive data; identifying, by the privacy computer, the sensitive data using a plurality of privacy rules; anonymizing, by the privacy computer, the sensitive data according to the plurality of privacy rules to generate anonymized data, wherein anonymizing the sensitive data according to the plurality of privacy rules includes using at least two data alteration processes; generating, by the privacy computer, a hidden record including the anonymized data; and forwarding the hidden record and the message including the anonymized data to the recipient computer located outside the secure area, wherein the hidden record includes instructions for recreating at least a portion of the sensitive data using the plurality of privacy rules, wherein the at least two different data alteration processes include two or more of the following; removing unnecessary sensitive data; masking the sensitive data to maintain format; separate the sensitive data into associated data groupings; and de-contexting the sensitive data. - View Dependent Claims (11, 12)
-
Specification