Method and system for monitoring personal computer documents for sensitive data
First Claim
1. A method for electronically securing text transmitted over a computer network, comprising:
- scanning text generated by a parsing function at an Open Systems Interconnection (OSI) layer to provide scanned text, wherein the OSI layer is Layer 1 or Layer 3;
determining if the scanned text contains sensitive data; and
verifying the scanned text, wherein the step of verifying comprises;
notifying a user of presence of the sensitive data in the scanned text, wherein the step of notifying comprises autostripping, and wherein the step of autostripping automatically deletes detected, sensitive data in the scanned text.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, a method, and a computer program are provided for securing transmitted text. Once text has been produced by an application, the potential exists for an unintended third party to obtain sensitive data transmitted over computer networks. However, a parsing function can then operate either on an individual computer or on a network to scan text at an Open Systems Interconnection (OSI) Layer 1 to assist in the prevention of sensitive data transmission. By utilizing the parsing function, text can be scanned for potentially sensitive data by using a variety of techniques, such as a learning algorithm. The sensitive data can then be verified by a user, bypassed, or autostripped.
55 Citations
6 Claims
-
1. A method for electronically securing text transmitted over a computer network, comprising:
-
scanning text generated by a parsing function at an Open Systems Interconnection (OSI) layer to provide scanned text, wherein the OSI layer is Layer 1 or Layer 3; determining if the scanned text contains sensitive data; and verifying the scanned text, wherein the step of verifying comprises; notifying a user of presence of the sensitive data in the scanned text, wherein the step of notifying comprises autostripping, and wherein the step of autostripping automatically deletes detected, sensitive data in the scanned text. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification