Secure processing of secure information in a non-secure environment
First Claim
1. A method of completing a task in a non-secure environment with respect to a secure object, the method comprising:
- receiving, by a processor, in a secure environment, the secure object with respect to which the task is to be performed;
dividing, by the processor, the secure object into at least two or more secure sub-objects each comprising data and one or more contexts associated therewith, the one or more contexts each characterizing the data as secure;
further dividing, by the processor, the secure sub-objects such that each data of the two or more secure sub-objects is disassociated from each of the associated one or more contexts such that none of the secure characterization of the data is distributed with the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the two or more secure sub-objects;
arranging, by the processor, for the performance of the one or more sub-tasks with one or more available participants of a workforce, the one or more available participants being in the non-secure environment and unaware of the secure characterization of the data; and
distributing, by the processor, to the one or more available participants in the non-secure environment, at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is reduced.
1 Assignment
0 Petitions
Accused Products
Abstract
A secured process sourcing and work management system for processing secure information in a non-secure environment is disclosed. The system permits a user, referred to herein as a customer or requester, to submit a project, involving a human intelligence task (“HIT”), referred to as a task or task specification, to be performed with respect to secure, confidential or sensitive information, referred to herein as secure information, and have that project completed in a non-secure environment without compromising the security, confidentiality or sensitivity of the secure information. The system may be incorporated into the requestor'"'"'s workflow, receiving projects therefrom and providing the results thereto. Further, a system is disclosed for implementing a processing workflow for such tasks, the system permitting, based on projects submitted by requestors, the “posting” or distribution of jobs, and subsequent management thereof, to be performed by a workforce operating in or via a non-secure-environment, while protecting the underlying security, confidentiality or sensitivity of the overall project.
43 Citations
27 Claims
-
1. A method of completing a task in a non-secure environment with respect to a secure object, the method comprising:
-
receiving, by a processor, in a secure environment, the secure object with respect to which the task is to be performed; dividing, by the processor, the secure object into at least two or more secure sub-objects each comprising data and one or more contexts associated therewith, the one or more contexts each characterizing the data as secure; further dividing, by the processor, the secure sub-objects such that each data of the two or more secure sub-objects is disassociated from each of the associated one or more contexts such that none of the secure characterization of the data is distributed with the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the two or more secure sub-objects; arranging, by the processor, for the performance of the one or more sub-tasks with one or more available participants of a workforce, the one or more available participants being in the non-secure environment and unaware of the secure characterization of the data; and distributing, by the processor, to the one or more available participants in the non-secure environment, at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is reduced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for facilitating completion of a task in a non-secure environment with respect to a secure object, the system comprising:
at least one processor device configured to operate as; a project receiver operative to receive, in a secure environment, the secure object with respect to which the task is to be performed; an object separator coupled with the project receiver and operative to divide the secure object into at least two or more secure sub-objects each comprising data and one or more contexts associated therewith, the one or more contexts each characterizing the data as secure; an object disassociator coupled with the object separator and operative to further separate the two or more secure sub-objects so as to disassociate each data of the two or more secure sub-objects from each of the associated one or more contexts such that none of the secure characterization of the data is distributed with the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the two or more secure sub-objects; and a distributor coupled with the object disassociator and the task divider and operative to distribute to one or more participants of a workforce in the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is reduced. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
26. A system for facilitating completion of a task in a non-secure environment with respect to a secure object, the system comprising a processor device and a computer readable storage media coupled with the processor device, the system further comprising:
-
means stored in the computer readable media and executable by the processor device for receiving in a secure environment, the secure object with respect to which the task is to be performed; means stored in the computer readable media and executable by the processor device for dividing the secure object into at least two or more secure sub-objects each comprising data and one or more contexts associated therewith, the one or more contexts each characterizing the data as secure; means stored in the computer readable media and executable by the processor device for further dividing the two or more secure sub-objects such that each data of the two or more secure sub-objects is disassociated from each of the associated one or more contexts such that none of the secure characterization of the data is distributed with the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the two or more secure sub-objects; and means stored in the computer readable media and executable by the processor device for distributing to one or more participants of a workforce in the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is reduced.
-
-
27. A non-transitory computer readable medium including instructions that when executed by a processor are operable to cause a system to facilitate completion of a task in a non-secure environment with respect to a secure object, the instructions operative to:
-
receive, in a secure environment, the secure object with respect to which the task is to be performed; divide the secure object into at least two or more secure sub-objects each comprising data and one or more contexts associated therewith, the one or more contexts each characterizing the data as secure; further divide the secure sub-objects so as to disassociate each data of the two or more secure sub-objects from each of the associated one or more contexts such that none of the secure characterization of the data is distributed with the disassociated data, the task comprising one or more sub-tasks to be performed with respect to the disassociated data of each of the two or more secure sub-objects; and distribute to one or more participants of a workforce in the non-secure environment at least one of the disassociated data such that the respective sub-task may be performed with respect thereto, and wherein the ability to discern the secure characterization of the data in the non-secure environment is reduced.
-
Specification