Systems and methods for providing content aware document analysis and modification
First Claim
1. One or more non-transitory machine-readable media storing machine-executable instructions which, when executed by a processor device, perform a method for altering confidential and non-confidential portions of a document based on the document content, the method comprising:
- using a processor device to process a set of machine executable rules in conjunction with a document editing application, the set of rules defining a set of confidential expression patterns, each set of confidential expression patterns including alphanumeric characters that correspond to a social security number;
using the processor device to analyze the document to determine the existence of a threshold number of two or more social security numbers in the document;
in response to the detection of the threshold number of social security numbers in the document, using the processor device to;
alter the entire document whereby;
e-mail transmittal of confidential and non-confidential portions of the document are restricted;
the confidential and non-confidential portions of the document are only available via a laptop computer when the laptop computer is docked at a predetermined docking station; and
a watermark is attached to the document that identifies the confidential and non-confidential portions of the document as being confidential;
monitor patterns of use of the document content;
select the watermark based on a number of social security numbers in the document above the threshold number;
determine whether the patterns of use correspond to fraudulent activity; and
whitelist the document when the number of social security numbers in the document is below the threshold number.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and consumer-readable media for providing content-aware document analysis and modification are provided. A system for analyzing document content according to the invention may include a rules server that stores a set of expressions. Such expressions may define predetermined confidential information and/or patterns of confidential expressions. The system may further include a communication plugin that provides a platform for incorporating the set of confidential expression patterns as part of a document-producing application. Following incorporation of the communication plugin, an inline document monitor module according to the invention may form part of the document-producing application. The inline document monitor may monitor for the occurrence of at least one of the set of confidential expression patterns in a document.
44 Citations
20 Claims
-
1. One or more non-transitory machine-readable media storing machine-executable instructions which, when executed by a processor device, perform a method for altering confidential and non-confidential portions of a document based on the document content, the method comprising:
-
using a processor device to process a set of machine executable rules in conjunction with a document editing application, the set of rules defining a set of confidential expression patterns, each set of confidential expression patterns including alphanumeric characters that correspond to a social security number; using the processor device to analyze the document to determine the existence of a threshold number of two or more social security numbers in the document; in response to the detection of the threshold number of social security numbers in the document, using the processor device to; alter the entire document whereby; e-mail transmittal of confidential and non-confidential portions of the document are restricted; the confidential and non-confidential portions of the document are only available via a laptop computer when the laptop computer is docked at a predetermined docking station; and a watermark is attached to the document that identifies the confidential and non-confidential portions of the document as being confidential; monitor patterns of use of the document content; select the watermark based on a number of social security numbers in the document above the threshold number; determine whether the patterns of use correspond to fraudulent activity; and whitelist the document when the number of social security numbers in the document is below the threshold number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more non-transitory machine-readable media storing machine-executable instructions which, when executed by a processor device, perform a method for altering confidential and non-confidential portions of a document based on the document content, the method comprising:
-
using the processor device to process a set of machine executable rules that identify the confidential portion of the document, the set of rules defining a set of expressions corresponding to a social security number, each of the defined set of expressions including three numeric characters followed by a hyphen followed by two numeric characters followed by a hyphen followed by four numeric characters; using the processor device to analyze the document to determine the existence of a threshold number of at least two social security numbers in the document; and in response to the detection of the threshold number of social security numbers in the document, using the processor device to; alter the entire document whereby; e-mail transmittal of the confidential and non-confidential portions of the document are restricted; the confidential and non-confidential portions of the document are only available using a laptop computer when the laptop computer is docked at a predetermined docking station; and a watermark is attached to the document that identifies the confidential and non-confidential portions of the document as being confidential; monitor patterns of use of the document content; select the watermark based on a number of social security numbers in the document above the threshold number; determine whether the patterns of use correspond to fraudulent activity; and whitelist the document when the number of social security numbers in the document is below the threshold number. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for altering confidential and non-confidential document content, the system comprising:
-
a processor device configured to function as a rules server, said rules server comprising a set of expressions, said expressions that define predetermined confidential information that includes a social security number; machine-executable instructions comprising a communication plugin stored on one or more machine-readable media that provides a platform for incorporating the set of expressions into a document-producing application; machine-executable instructions comprising an inline document monitor module stored on one or more machine-readable media that forms part of the document-producing application, the inline document monitor for monitoring for the occurrence of a threshold number of social security numbers in the document; and in response to the occurrence of the threshold number of social security numbers in the document, the processor device is configured to; alter the entire document whereby; e-mail transmittal of confidential and non-confidential portions of the document is restricted; the confidential and non-confidential portions of the document are only available via a laptop computer when the laptop computer is docked at a predetermined docking station; and a watermark is attached to the document that identifies the confidential and non-confidential portions of the document as being confidential; monitor patterns of use of the document content; select the watermark based on a number of social security numbers in the document above the threshold; determine whether the patterns of use correspond to fraudulent activity; and whitelist the document when the number of social security numbers in the document is below the threshold number. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification