Systems and methods for securing information in an electronic file
First Claim
Patent Images
1. A computer-implemented method for securing information in an electronic file, comprising:
- receiving credentials for at least one selected online data store of a plurality of online data stores that are subscribed to by a user;
securing sensitive information in at least one electronic file that is stored in the at least one selected online data store, wherein securing sensitive information comprises;
automatically accessing the at least one selected online data store using the credentials;
automatically scanning data in the at least one electronic file;
identifying sensitive information in the at least one electronic file;
extracting the sensitive information from the at least one electronic file;
encrypting the sensitive information;
storing the encrypted sensitive information in a storage location; and
replacing the extracted sensitive information in the at least one electronic file with a redaction identifier, the redaction identifier referencing the storage location of the encrypted sensitive information.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for securing information in an electronic file is described. Data in the electronic file is automatically scanned. Sensitive information in the electronic file is identified. The sensitive information is extracted from the electronic file. The sensitive information is encrypted. The encrypted sensitive information is stored.
58 Citations
15 Claims
-
1. A computer-implemented method for securing information in an electronic file, comprising:
-
receiving credentials for at least one selected online data store of a plurality of online data stores that are subscribed to by a user; securing sensitive information in at least one electronic file that is stored in the at least one selected online data store, wherein securing sensitive information comprises; automatically accessing the at least one selected online data store using the credentials; automatically scanning data in the at least one electronic file; identifying sensitive information in the at least one electronic file; extracting the sensitive information from the at least one electronic file; encrypting the sensitive information; storing the encrypted sensitive information in a storage location; and replacing the extracted sensitive information in the at least one electronic file with a redaction identifier, the redaction identifier referencing the storage location of the encrypted sensitive information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device configured to secure information in an electronic file, comprising:
-
a processor; memory in electronic communication with the processor; instructions being stored in the memory, the instructions being executable by the processor to; receive credentials for at least one selected online data store of a plurality of online data stores that are subscribed to by a user; secure sensitive information in at least one electronic file that is stored in the at least one selected online data store, wherein the instructions to secure sensitive information comprise instructions executable by the processor to; automatically access the at least one selected online data store using the credentials; automatically scan data in the at least one electronic file; identify sensitive information in the at least one electronic file; extract the sensitive information from the at least one electronic file; encrypt the sensitive information; store the encrypted sensitive information in a storage location; and replace the extracted sensitive information in the at least one electronic file with a redaction identifier, the redaction identifier referencing the storage location of the encrypted sensitive information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-program product for securing information in an electronic file, the computer-program product comprising a non-transitory computer-readable medium having instructions thereon, the instructions being executable by a processor to:
-
receive credentials for at least one selected online data store of a plurality of online data stores that are subscribed to by a user; secure sensitive information in at least one electronic file that is stored in the at least one selected online data store, wherein the instructions to secure sensitive information comprise instructions executable by the processor to; automatically access the at least one selected online data store using the credentials; automatically scan data in the at least one electronic file; identify sensitive information in the at least one electronic file; extract the sensitive information from the at least one electronic file; encrypt the sensitive information; store the encrypted sensitive information in a storage location; and replace the extracted sensitive information in the at least one electronic file with a redaction identifier, the redaction identifier referencing the storage location of the encrypted sensitive information.
-
Specification