×

Systems and methods for providing content aware document analysis and modification

  • US 9,104,659 B2
  • Filed: 01/20/2010
  • Issued: 08/11/2015
  • Est. Priority Date: 01/20/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for using an electronic processing platform for analyzing a document based on the document'"'"'s content, the electronic processing platform comprising a document editing application, the method comprising:

  • loading a set of rules into the document editing application, the set of rules defining a set of confidential expression patterns;

    analyzing the document to detect when one member of the set of confidential expression patterns occurs a threshold number of times in the document content;

    providing, in response to the detection of the threshold number of occurrences of the one member of the set of confidential expression patterns in the document content, visual feedback that the threshold number of the one member of the confidential expression patterns occurs in the document content by;

    visibly tagging each occurrence of the one member of the set of confidential expression patterns in the document content with a dotted underline;

    altering each occurrence of the one member of the set of confidential expression patterns in the document content such that in response to a mouse-over of any occurrence of the one member of the set of confidential expression patterns in the document content, the electronic platform;

    displays a button, the button for accessing a rule that defined one of the confidential expression patterns used to detect the occurrence that was moused-over; and

    offers one or more corrective actions applicable to the occurrence that was moused-over;

    disabling printing to a local or networked host, wherein the entirety of the document is prevented from being printed when the threshold number of occurrences of the one member of the set of confidential expression patterns are visually tagged; and

    embedding a hidden flag in the document such that the document itself is identified as confidential by document scanning software, wherein the embedded hidden flag identifies the document as confidential to the document scanning software without opening the document.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×