Rule-based anonymizer for business data
First Claim
Patent Images
1. A computer-implemented method of anonymizing business data, comprising:
- responsive to a request from an application of a server for data objects stored in a database system, retrieving, by a processor residing on the database system from a rule engine residing on the server, pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time;
comparing, by the processor, the request against the rules to determine first portions of the data objects that are to be anonymized and second portions of the data objects that are not to be anonymized based on the contents that have been stored beyond a retention time;
retrieving, by the processor, the second portions of the data objects from a storage of the database system;
anonymizing, by the processor, the first portions of the data objects; and
transmitting, by the processor, the data object including the first and second portions to the application.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of anonymize business data. The method includes responsive to a request from an application for data objects stored in a database system, retrieving the data objects from a non-transitory storage of the database system, prior to transmitting the data object to the application, retrieving pre-determined rules from a rule engine, wherein the rules include conditions for retaining data, comparing the request against the rules to determine portions of the data objects that are to be anonymized, anonymizing the portions of the data objects, and transmitting the data object to the application.
-
Citations
18 Claims
-
1. A computer-implemented method of anonymizing business data, comprising:
-
responsive to a request from an application of a server for data objects stored in a database system, retrieving, by a processor residing on the database system from a rule engine residing on the server, pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time; comparing, by the processor, the request against the rules to determine first portions of the data objects that are to be anonymized and second portions of the data objects that are not to be anonymized based on the contents that have been stored beyond a retention time; retrieving, by the processor, the second portions of the data objects from a storage of the database system; anonymizing, by the processor, the first portions of the data objects; and transmitting, by the processor, the data object including the first and second portions to the application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method of anonymizing business data, comprising:
-
responsive to a request from an application of a server for data objects stored in a database system, retrieving, by a processor residing on the database system, the data objects from a non-transitory storage of the database system; prior to transmitting the data objects to the application, retrieving, by the processor from a rule engine residing on the server, pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time; comparing, by the processor, the data objects against the rules to determine portions of the data objects that are to be anonymized based on the contents that have been stored beyond a retention time; anonymizing, by the processor, the portions of the data objects; and responsive to anonymizing, transmitting, by the processor, the data object to the application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for anonymizing business data, comprising:
-
a server including; a processor configured with an application; and a rule engine; and a database system including a view processor and a non-transitory storage, wherein the view processor is configured to; responsive to a request from the application for data objects stored in the database system, retrieve from the rule engine pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time; compare the request against the rules to determine first portions of the data objects that are to be anonymized and second portions of the data objects that are not to be anonymized based on the contents that have been stored beyond a retention time; retrieve second portions of the data objects from the non-transitory storage; anonymize the first portions of the data objects; and transmit the data object including the first and second portions to the application.
-
-
16. A system for anonymizing business data, comprising:
-
a server including; a processor configured with an application; and a rule engine; and a database system including a view processor and a non-transitory storage, wherein the view processor is configured to; responsive to a request from the application for data objects stored in the database system, retrieve the data objects from the non-transitory storage; prior to transmitting the data objects to the application, retrieve from the rule engine pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time; compare the request against the rules to determine portions of the data objects that are to be anonymized based on the contents that have been stored beyond a retention time; anonymize the portions of the data objects; and transmit the data object to the application.
-
-
17. A machine-readable non-transitory medium stored thereon executable codes that when executed, perform a method of anonymize business data, the method comprising:
-
responsive to a request from an application of a server for data objects stored in a database system, retrieving from a rule engine residing on the server pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time; comparing the request against the rules to determine first portions of the data objects that are to be anonymized and second portions of the data objects that are not to be anonymized based on the contents that have been stored beyond a retention time; retrieving second portions of the data objects from a non-transitory storage of the database system; anonymizing the first portions of the data objects; and transmitting the data object including the first and second portions to the application.
-
-
18. A machine-readable non-transitory medium stored thereon executable codes that when executed, perform a method of anonymize business data, the method comprising:
-
responsive to a request from an application of a server for data objects stored in a database system, retrieving the data objects from a non-transitory storage of the database system; prior to transmitting the data objects to the application, retrieving, from a rule engine residing on the server, pre-determined rules based on which portions of the data objects are anonymized, wherein the request includes key words to be anonymized, and the rules include a rule of anonymizing contents that match the key words and that have been stored beyond a retention time; comparing the request against the rules to determine portions of the data objects that are to be anonymized based on the contents that have been stored beyond a retention time; anonymizing the portions of the data objects; and transmitting the data object to the application.
-
Specification