PRIVACY FIREWALL
First Claim
1. A method comprising:
- receiving, by a privacy computer located within a secure area, a message directed at a recipient computer located outside the secure area, wherein the message includes private information;
identifying, by the privacy computer, the private information using a plurality of privacy rules;
anonymizing, by the privacy computer, the message according to the plurality of privacy rules; and
forwarding the message to the recipient computer located outside the secure area, wherein the message includes anonymized information.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a privacy computer located within a secure area, a message directed at a recipient computer located outside the secure area, wherein the message includes private information; identifying, by the privacy computer, the private information using a plurality of privacy rules; anonymizing, by the privacy computer, the message according to the plurality of privacy rules; and forwarding the message to the recipient computer located outside the secure area, wherein the message includes anonymized information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A privacy computer located within a secure area comprising:
-
a processor; and a computer-readable medium coupled to the processor, the computer-readable medium comprising code executable by the processor for performing a method, the method comprising; receiving a message directed at a recipient computer located outside the secure area, wherein the message includes private information; identifying the private information using a plurality of privacy rules; anonymizing the message according to the plurality of privacy rules; and forwarding the message to the recipient computer located outside the secure area, wherein the message includes anonymized information. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving a request for sensitive data from a requesting computer; determining a sensitive data record including the sensitive data associated with the request; determining anonymization rules associated with the requesting computer; anonymizing, by an anonymization computer, the sensitive data record using the anonymization rules to generate an anonymized data record by performing at least two of; removing unnecessary sensitive data from the sensitive data record; masking the sensitive data to maintain format; separating the sensitive data into associated data groupings; and de-contexting the sensitive data; and sending the anonymized data record to the requesting computer. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An anonymization computer comprising:
-
a processor; and a computer-readable medium coupled to the processor, the computer-readable medium comprising code executable by the processor for performing a method, the method comprising; receiving a request for sensitive data from a requesting computer; determining a sensitive data record including sensitive data associated with the request; determining anonymization rules associated with the requesting computer; anonymizing, by an anonymization computer, the sensitive data record using the anonymization rules to generate an anonymized data record by performing at least two of; removing unnecessary sensitive data from the sensitive data record; masking the sensitive data to maintain format; separating the sensitive data into associated data groupings; identifying search criteria from the sensitive data record; and de-contexting the sensitive data; and sending the anonymized data record to the requesting computer. - View Dependent Claims (17, 18, 19, 20)
-
Specification