Protect sensitive content for human-only consumption
First Claim
1. A computer implemented method for protecting sensitive content, the computer implemented method comprising:
- responsive to receiving a selection of content, determining that the content contains an email address;
generating, by a computer processor, a sensitive content reference for publication of the content containing the email address on a web page;
responsive to receiving a request from a requestor for the content containing the email address, obfuscating the email address using a selected obfuscation algorithm to form obfuscated content;
returning the obfuscated content to the requestor, wherein the obfuscated content is published on the web page in place of the content, and wherein publishing the obfuscated content protects the email address from detection by a data collection bot; and
responsive to receiving a threshold number of unsolicited emails at the email address, identifying the selected obfuscation algorithm as unsafe, wherein the threshold number is specified in an obfuscation algorithm policy, wherein the selected obfuscation algorithm is selected according to one or more conditions specified in the obfuscation algorithm policy, wherein the one or more conditions comprise a type of the content and an amount of time that the obfuscation algorithm has been used.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method, apparatus, and computer usable program product for protecting sensitive content. In response to receiving a selection of content, the process determines whether the content is of a sensitive content type based on a policy. The process then designates the content as the sensitive content in response to the content being of a sensitive content type. Thereafter, the process generates a sensitive content reference for publication and stores the sensitive content in a data structure, wherein the data structure associates the sensitive content with the sensitive content reference. Subsequently, in response to receiving a request from a requester for the sensitive content reference, the process obfuscates the sensitive content using a selected obfuscation algorithm to form obfuscated content, and returns the obfuscated content to the requester.
-
Citations
18 Claims
-
1. A computer implemented method for protecting sensitive content, the computer implemented method comprising:
-
responsive to receiving a selection of content, determining that the content contains an email address; generating, by a computer processor, a sensitive content reference for publication of the content containing the email address on a web page; responsive to receiving a request from a requestor for the content containing the email address, obfuscating the email address using a selected obfuscation algorithm to form obfuscated content; returning the obfuscated content to the requestor, wherein the obfuscated content is published on the web page in place of the content, and wherein publishing the obfuscated content protects the email address from detection by a data collection bot; and responsive to receiving a threshold number of unsolicited emails at the email address, identifying the selected obfuscation algorithm as unsafe, wherein the threshold number is specified in an obfuscation algorithm policy, wherein the selected obfuscation algorithm is selected according to one or more conditions specified in the obfuscation algorithm policy, wherein the one or more conditions comprise a type of the content and an amount of time that the obfuscation algorithm has been used. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product comprising:
-
a computer usable storage device including computer usable program code for protecting sensitive content, the computer usable program code comprising; computer usable program code for determining, responsive to receiving a selection of content, determining that the content contains an email address; computer usable program code for generating a sensitive content reference for publication of the content containing the email address on a web page; computer usable program code for, responsive to receiving a request from a requestor for the content containing the email address, obfuscating the email address using a selected obfuscation algorithm to form obfuscated content; computer usable program code for returning the obfuscated content to the requestor, wherein the obfuscated content is published on the web page in place of the content, and wherein publishing the obfuscated content protects the email address from detection by a data collection bot; and computer usable program code for identifying the selected obfuscation algorithm as unsafe, in response to receiving a threshold number of unsolicited emails at the email address, wherein the threshold number is specified in an obfuscation algorithm policy, wherein the selected obfuscation algorithm is selected according to one or more conditions specified in the obfuscation algorithm policy, wherein the one or more conditions comprise a type of the content and an amount of time that the obfuscation algorithm has been used. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
a bus system; a communications system connected to the bus system; a memory connected to the bus system, wherein the memory includes computer usable program code; and a processing unit connected to the bus system, wherein the processing unit executes the computer usable program code to determine, responsive to receiving a selection of content, determine whether the content contains an email address;
generate a sensitive content reference for publication of the content containing the email address on a web page;
responsive to receiving a request from a requestor for the content containing the email address obfuscate the email address using a selected obfuscation algorithm to form obfuscated content;
return the obfuscated content to the requestor, wherein the obfuscated content is published on the web page in place of the content, and wherein publishing the obfuscated content protects the email address from detection by a data collection bot; and
identify the selected obfuscation algorithm as unsafe, in response to receiving a threshold number of unsolicited emails at the email address, wherein the threshold number is specified in an obfuscation algorithm policy, wherein the selected obfuscation algorithm is selected according to one or more conditions specified in the obfuscation algorithm policy, wherein the one or more conditions comprise a type of the content and an amount of time that the obfuscation algorithm has been used. - View Dependent Claims (17, 18)
-
Specification