Method and system for managing personally identifiable information and sensitive information in an application-independent manner
First Claim
1. A computer-readable medium having stored thereon computer-executable instructions which when executed by a computer perform a method of managing sensitive information in a computer-generated document, comprising:
- receiving an identification of sensitive information in a computer-generated document;
receiving a marking of the identified sensitive information in the document electronically to allow the marked sensitive information to be detected;
parsing the document for locating the marked sensitive information;
locating the marked sensitive information in the document; and
modifying the marked sensitive information located in the document.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for managing personally identifiable and/or sensitive information (PII/SI) in a manner that is independent of a software application that is used for creating or editing a document containing the PII/SI. PII/SI in a document is marked or flagged in an application-independent manner so that a solution application programmed to discover and process marked PII/SI may readily discover the marked information for redacting the information, editing the information, or otherwise disposing of the information as desired. PII/SI in documents may be annotated according to the Extensible Markup Language (XML). A separate XML namespace may be used to distinguish the annotated PII/SI from other content in the document. An application-independent solution may be built for scanning a given document for all annotated information belonging to the namespace associated with the PII/SI. Once the annotated information is located in a given document, it may be redacted, edited, or otherwise processed or disposed of as desired.
-
Citations
20 Claims
-
1. A computer-readable medium having stored thereon computer-executable instructions which when executed by a computer perform a method of managing sensitive information in a computer-generated document, comprising:
-
receiving an identification of sensitive information in a computer-generated document;
receiving a marking of the identified sensitive information in the document electronically to allow the marked sensitive information to be detected;
parsing the document for locating the marked sensitive information;
locating the marked sensitive information in the document; and
modifying the marked sensitive information located in the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of managing sensitive information in a computer-generated document, comprising:
-
receiving an application of Extensible Markup Language (XML) tags to sensitive information in a computer-generated document for marking the sensitive information to allow the marked sensitive information to be detected;
parsing the document for locating the XML tags applied to the marked sensitive information; and
upon locating the marked sensitive information in the document, modifying the marked sensitive information in the document. - View Dependent Claims (15)
-
-
16. A computer-readable medium having stored thereon computer-executable instructions which when executed by a computer perform a method of managing sensitive information in a computer-generated document, comprising:
-
receiving an identification of personally identifiable information in a computer-generated document;
receiving an application of Extensible Markup Language (XML) tags to the identified personally identifiable information to allow the marked personally identifiable information to be detected;
parsing the document for locating the XML tags applied to the identified personally identifiable information;
locating the marked personally identifiable information in the document; and
modifying the marked personally identifiable information located in the document. - View Dependent Claims (17, 18, 19, 20)
-
Specification