Method and system for monitoring personal computer documents for sensitive data
First Claim
1. An apparatus for electronically securing text transmitted over a computer network, comprising:
- a communications module, wherein the communications module is coupled to the computer network, and wherein the communications module is at least configured to transmit text;
at least one application, wherein the at least one application is at least configured to allow the user to generate text;
a parsing function, wherein the parsing function is at least configured to analyze transmitted text for sensitive data; and
a processor, wherein the processor is at least configured to operate the at least one application, and wherein the processor is at least configured to transmit text generated by the at least one application, and wherein the processor is at least configured to employ the parsing function on text generated by the at least one application.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, a method, and a computer program are provided for securing transmitted text. Once text has been produced by an application, the potential exists for an unintended third party to obtain sensitive data transmitted over computer networks. However, a parsing function can then operate either on an individual computer or on a network to scan text at an Open Systems Interconnection (OSI) Layer 1 to assist in the prevention of sensitive data transmission. By utilizing the parsing function, text can be scanned for potentially sensitive data by using a variety of techniques, such as a learning algorithm. The sensitive data can then be verified by a user, bypassed, or autostripped.
-
Citations
26 Claims
-
1. An apparatus for electronically securing text transmitted over a computer network, comprising:
-
a communications module, wherein the communications module is coupled to the computer network, and wherein the communications module is at least configured to transmit text;
at least one application, wherein the at least one application is at least configured to allow the user to generate text;
a parsing function, wherein the parsing function is at least configured to analyze transmitted text for sensitive data; and
a processor, wherein the processor is at least configured to operate the at least one application, and wherein the processor is at least configured to transmit text generated by the at least one application, and wherein the processor is at least configured to employ the parsing function on text generated by the at least one application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for electronically securing text transmitted over a computer network, comprising:
-
a gateway, wherein the gateway is coupled to the computer network, and wherein the gateway is at least configured to transmit text;
a parsing function, wherein the parsing function is at least configured to analyze transmitted text for sensitive data; and
a processor, wherein the processor is at least configured to receive text, and wherein the processor is at least configured to transmit text generated by the at least one application, and wherein the processor is at least configured to employ the parsing function on text generated by the at least one application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for electronically securing text transmitted over a computer network, comprising:
-
scanning text generated by a parsing function at an Open Systems Interconnection (OSI) layer to provide scanned text, wherein the OSI layer is Layer 1 or Layer 3;
determining if the scanned text contains sensitive data; and
verifying the scanned text. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A computer program product for electronically securing text transmitted over a computer network, the computer program product having a medium with a computer program embodied thereon, the computer program comprising:
-
computer code for scanning text generated by a parsing function at an OSI layer to produce scanned text, wherein the OSI layer is Layer 1 or Layer 3;
computer code for determining if the scanned text contains sensitive data; and
computer code for verifying the scanned text. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification