Secure processing of secure information in a non-secure environment
First Claim
1. A method of completing a task in a non-secure environment with respect to a secure object, the method comprising:
- receiving, in a secure environment, the secure object with respect to which the task is to be performed;
dividing the secure object into at least one or more secure sub-objects each comprising data and a context associated therewith, the context characterizing the data as secure;
disassociating each data of the one or more sub-objects from the associated context, the secure characterization of the data being substantially non-discernable from the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the one or more secure sub-objects; and
distributing to the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is substantially reduced.
1 Assignment
0 Petitions
Accused Products
Abstract
A secured process sourcing and work management system for processing secure information in a non-secure environment is disclosed. The system permits a user, referred to herein as a customer or requester, to submit a project, involving a human intelligence task (“HIT”), referred to as a task or task specification, to be performed with respect to secure, confidential or sensitive information, referred to herein as secure information, and have that project completed in a non-secure environment without compromising the security, confidentiality or sensitivity of the secure information. The system may be incorporated into the requestor'"'"'s workflow, receiving projects therefrom and providing the results thereto. Further, a system is disclosed for implementing a processing workflow for such tasks, the system permitting, based on projects submitted by requestors, the “posting” or distribution of jobs, and subsequent management thereof, to be performed by a workforce operating in or via a non-secure-environment, while protecting the underlying security, confidentiality or sensitivity of the overall project.
-
Citations
28 Claims
-
1. A method of completing a task in a non-secure environment with respect to a secure object, the method comprising:
-
receiving, in a secure environment, the secure object with respect to which the task is to be performed; dividing the secure object into at least one or more secure sub-objects each comprising data and a context associated therewith, the context characterizing the data as secure; disassociating each data of the one or more sub-objects from the associated context, the secure characterization of the data being substantially non-discernable from the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the one or more secure sub-objects; and distributing to the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is substantially reduced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for facilitating completion of a task in a non-secure environment with respect to a secure object, the system comprising:
-
a project receiver operative to receive, in a secure environment, the secure object with respect to which the task is to be performed; an object separator coupled with the project receiver and operative to divide the secure object into at least one or more secure sub-objects each comprising data and a context associated therewith, the context characterizing the data as secure; an object disassociator coupled with the object separator and operative to disassociate each data of the one or more sub-objects from the associated context, the secure characterization of the data being substantially non-discernable from the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the one or more secure sub-objects; and a distributor coupled with the object disassociator and the task divider and operative to distribute to the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is substantially reduced. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for facilitating completion of a task in a non-secure environment with respect to a secure object, the system comprising:
-
means for receiving, in a secure environment, the secure object with respect to which the task is to be performed; means for dividing the secure object into at least one or more secure sub-objects each comprising data and a context associated therewith, the context characterizing the data as secure; means for disassociating each data of the one or more sub-objects from the associated context, the secure characterization of the data being substantially non-discernable from the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the one or more secure sub-objects; and means for distributing to the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is substantially reduced.
-
-
28. A system for facilitating completion of a task in a non-secure environment with respect to a secure object, the system comprising a processor and a memory coupled with the processor, the system further comprising:
-
first logic stored in the memory and executable by the processor to receive, in a secure environment, the secure object with respect to which the task is to be performed; second logic stored in the memory and executable by the processor to divide the secure object into at least one or more secure sub-objects each comprising data and a context associated therewith, the context characterizing the data as secure; third logic stored in the memory and executable by the processor to disassociate each data of the one or more sub-objects from the associated context, the secure characterization of the data being substantially non-discernable from the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the one or more secure sub-objects; and fourth logic stored in the memory and executable by the processor to distribute to the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is substantially reduced.
-
Specification