Secure Handling of Documents with Fields that Possibly Contain Restricted Information
First Claim
Patent Images
1. A computer-implemented method for processing one or more documents, the documents containing restricted information, the restricted information not to be disclosed at a minimally secure location, the method comprising software executing on a computer system to execute the steps of:
- identifying one or more sections in each document, the sections defined as either critical, possibly critical or non-critical;
each critical section containing data that is defined by information security rules as individually or collectively corresponding to restricted information, each non-critical section containing data that is defined by information security rules as not corresponding to restricted information, and each possibly critical section containing data that is defined by information security rules as possibly corresponding to restricted information;
for the possibly critical sections, identifying whether that section is critical or non-critical based on the data contained in the section;
based on identification of sections as critical or non-critical, segmenting the documents into non-critical segments, sub-critical segments and critical segments, the non-critical segments and sub-critical segments suitable for processing at a minimally secure location and the critical segments suitable for processing at a secure location; and
recombining the non-critical segments, sub-critical segments and critical segments after processing.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer program product for processing documents containing restricted information. One aspect concerns identifying which sections of a document may be critical, non-critical or possibly critical.
19 Citations
15 Claims
-
1. A computer-implemented method for processing one or more documents, the documents containing restricted information, the restricted information not to be disclosed at a minimally secure location, the method comprising software executing on a computer system to execute the steps of:
-
identifying one or more sections in each document, the sections defined as either critical, possibly critical or non-critical;
each critical section containing data that is defined by information security rules as individually or collectively corresponding to restricted information, each non-critical section containing data that is defined by information security rules as not corresponding to restricted information, and each possibly critical section containing data that is defined by information security rules as possibly corresponding to restricted information;for the possibly critical sections, identifying whether that section is critical or non-critical based on the data contained in the section; based on identification of sections as critical or non-critical, segmenting the documents into non-critical segments, sub-critical segments and critical segments, the non-critical segments and sub-critical segments suitable for processing at a minimally secure location and the critical segments suitable for processing at a secure location; and recombining the non-critical segments, sub-critical segments and critical segments after processing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system implemented on a computer for processing one or more documents, the documents containing restricted information, the restricted information not to be disclosed at a minimally secure location, the system comprising:
-
a section-identifying module for identifying one or more sections in each document, the sections defined as either critical, possibly critical or non-critical;
each critical section containing data that is defined by information security rules as individually or collectively corresponding to restricted information, each non-critical section containing data that is defined by information security rules as not corresponding to restricted information, and each possibly critical section containing data that is defined by information security rules as possibly corresponding to restricted information;the section-identifying module further, for the possibly critical sections, identifying whether that section is critical or non-critical based on the data contained in the section; a document-dividing module for, based on identification of sections as critical or non-critical, segmenting the documents into non-critical segments, sub-critical segments and critical segments, the non-critical segments and sub-critical segments suitable for processing at a minimally secure location and the critical segments suitable for processing at a secure location; and a recombining module for recombining the non-critical segments, sub-critical segments and critical segments after processing.
-
-
15. A computer program product for use with a computer, the computer program product comprising a tangible computer usable medium having a computer program code embodied therein for processing one or more documents, the documents containing restricted information, the restricted information not to be disclosed at a minimally secure location, the computer program code performing the steps of:
-
identifying one or more sections in each document, the sections defined as either critical, possibly critical or non-critical;
each critical section containing data that is defined by information security rules as individually or collectively corresponding to restricted information, each non-critical section containing data that is defined by information security rules as not corresponding to restricted information, and each possibly critical section containing data that is defined by information security rules as possibly corresponding to restricted information;for the possibly critical sections, identifying whether that section is critical or non-critical based on the data contained in the section; based on identification of sections as critical or non-critical, segmenting the documents into non-critical segments, sub-critical segments and critical segments, the non-critical segments and sub-critical segments suitable for processing at a minimally secure location and the critical segments suitable for processing at a secure location; and recombining the non-critical segments, sub-critical segments and critical segments after processing.
-
Specification