Provide Insensitive Summary For An Encrypted Document
First Claim
1. A method comprising:
- classifying, by a computing device, information of an electronic document with at least a linguistic category;
identifying, by the computing device, sensitive information in the information of the electronic document based on the linguistic category;
masking, by the computing device, sensitive information in the electronic document based on the linguistic category to provide an electronic document having sensitive information that is masked;
summarizing, by the computing device, the electronic document having the sensitive information that is masked to provide an insensitive summary of the electronic document;
encrypting, by the computing device, the electronic document to provide an encrypted electronic document; and
outputting, by the computing device, the insensitive summary of the electronic document and the encrypted electronic document.
1 Assignment
0 Petitions
Accused Products
Abstract
An insensitive summary of an encrypted electronic document, such as email, is provided. The insensitive summary provides a summary of the encrypted electronic document without providing sensitive information, such as passwords. The electronic document may be an email, text (such as in a word processing file), spreadsheet and/or presentation. Natural language processing methods, such as parts of speech (POS) tagging, word clustering, regular expression evaluating, sensitive key word searching and/or other methods, may be used to identify and mask sensitive words before summarization and encryption of the electronic document. A user'"'"'s efficiency in operating a computing device may be increased having an associated insensitive summary without compromising security of the encrypted electronic document. A user may direct a computing device to perform a search (or similarly categorize or use rules) to identify the encrypted electronic document by searching for contents of the associated insensitive summary.
16 Citations
20 Claims
-
1. A method comprising:
-
classifying, by a computing device, information of an electronic document with at least a linguistic category; identifying, by the computing device, sensitive information in the information of the electronic document based on the linguistic category; masking, by the computing device, sensitive information in the electronic document based on the linguistic category to provide an electronic document having sensitive information that is masked; summarizing, by the computing device, the electronic document having the sensitive information that is masked to provide an insensitive summary of the electronic document; encrypting, by the computing device, the electronic document to provide an encrypted electronic document; and outputting, by the computing device, the insensitive summary of the electronic document and the encrypted electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
an integrated circuit processor; and a computer readable storage medium to store computer program code, the computer program code configures the integrated circuit processor to convert text of an email into a plurality of tokens that represents a plurality of words, tag a token in the plurality of tokens so that the token represents a part of speech category, tag the token in the plurality of tokens so the token indicates a word represented by the token is sensitive, mask the word in the text of the email in response to the token that indicates the word represented by the token is sensitive, generate an insensitive summary of the text of the email with the word being masked, encrypt the text of the email into an encrypted email and output the insensitive summary and encrypted email. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product, comprising:
-
a computer readable storage medium having computer program code embodied therewith, the computer program code comprising; computer program code configured to identify sensitive information in an email; computer program code configured to mask the sensitive information in the email; computer program code configured to provide an insensitive summary of the email that has sensitive information that is masked; computer program code configured to encrypt the email into an encrypted email; and computer program code configured to output the insensitive summary of the email and the encrypted email. - View Dependent Claims (17, 18, 19, 20)
-
Specification