DATA OBFUSCATION OF TEXT DATA USING ENTITY DETECTION AND REPLACEMENT
First Claim
1. A method of selectively obfuscating text data in a document, said method comprising the steps of:
- (a) identifying configuration parameters to be used in said obfuscation;
(b) identifying text data in said document for obfuscation using said identified configuration parameters;
(c) transforming said identified text data using obfuscating data associated with at least one of said configuration parameters; and
(d) substituting said transformed data form the respective said identified text data into said document.
0 Assignments
0 Petitions
Accused Products
Abstract
A data obfuscation method, apparatus and computer program product are disclosed in which at least selected text entities such as words or abbreviations in a document are obfuscated to prevent the disclosure of private information if the document is disclosed. A user establishes various configuration parameters for selected text entities desired to obfuscated. The document is processed and text entities matching the configuration parameters are tagged for obfuscation. The tagged entities are then substituted in the document with obfuscating text. The obfuscating text can be derived from a hash table. The hash table may be used to provide a reverse obfuscation method by which original data can be restored to an obfuscated document.
-
Citations
13 Claims
-
1. A method of selectively obfuscating text data in a document, said method comprising the steps of:
-
(a) identifying configuration parameters to be used in said obfuscation; (b) identifying text data in said document for obfuscation using said identified configuration parameters; (c) transforming said identified text data using obfuscating data associated with at least one of said configuration parameters; and (d) substituting said transformed data form the respective said identified text data into said document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of restoring an obfuscated document to an original form, said method comprising the steps of:
-
(a) sequentially parsing said obfuscated document to examine text entities in the document; (b) determining whether a current text entity in said document is found in a hash table used in formation of said obfuscated document; (c) selecting a next text entity and repeating step (b) where the current text entity is not found in the hash table; (d) obtaining a text entity corresponding to the current text entity from the hash table; (e) substituting said obtained text entity into said document in place of said current text entity; and (f) repeating steps (a)-(e) until the entire document has been parsed.
-
-
11. A computer readable medium having a computer program recorded thereon, the program being executable by a computer to selectively obfuscating text data in a document, said program comprising:
-
code means for identifying configuration parameters to be used in said obfuscation; code means for identifying text data in said document for obfuscation using said identified configuration parameters; code means for transforming said identified text data using obfuscating data associated with at least one of said configuration parameters; and code means for substituting said transformed data form the respective said identified text data in said document.
-
-
12. Computer apparatus for selectively obfuscating text data in a document, said apparatus comprising:
-
means for identifying configuration parameters to be used in said obfuscation; means for identifying text data in said document for obfuscation using said identified configuration parameters; means for transforming said identified text data using obfuscating data associated with at least one of said configuration parameters; and means for substituting said transformed data form the respective said identified text data in said document.
-
-
13. An obfuscated document formed by the method of:
-
(a) identifying configuration parameters to be used in said obfuscation; (b) identifying text data in said document for obfuscation using said identified configuration parameters; (c) transforming said identified text data using obfuscating data associated with at least one of said configuration parameters; and (d) substituting said transformed data form the respective said identified text data in said document.
-
Specification