Systems and methods for providing content aware document analysis and modification
First Claim
1. A method for using an electronic processing platform for analyzing a document based on the document'"'"'s content, the electronic processing platform comprising a document editing application, the method comprising:
- loading a set of rules into the document editing application, the set of rules defining a set of confidential expression patterns;
analyzing the document to detect when one member of the set of confidential expression patterns occurs a threshold number of times in the document content;
providing, in response to the detection of the threshold number of occurrences of the one member of the set of confidential expression patterns in the document content, visual feedback that the threshold number of the one member of the confidential expression patterns occurs in the document content by;
visibly tagging each occurrence of the one member of the set of confidential expression patterns in the document content with a dotted underline;
altering each occurrence of the one member of the set of confidential expression patterns in the document content such that in response to a mouse-over of any occurrence of the one member of the set of confidential expression patterns in the document content, the electronic platform;
displays a button, the button for accessing a rule that defined one of the confidential expression patterns used to detect the occurrence that was moused-over; and
offers one or more corrective actions applicable to the occurrence that was moused-over;
disabling printing to a local or networked host, wherein the entirety of the document is prevented from being printed when the threshold number of occurrences of the one member of the set of confidential expression patterns are visually tagged; and
embedding a hidden flag in the document such that the document itself is identified as confidential by document scanning software, wherein the embedded hidden flag identifies the document as confidential to the document scanning software without opening the document.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and consumer-readable media for providing content-aware document analysis and modification are provided. A system for analyzing document content according to the invention may include a rules server that stores a set of expressions. Such expressions may define predetermined confidential information and/or patterns of confidential expressions. The system may further include a communication plugin that provides a platform for incorporating the set of confidential expression patterns as part of a document-producing application. Following incorporation of the communication plugin, an inline document monitor module according to the invention may form part of the document-producing application. The inline document monitor may monitor for the occurrence of at least one of the set of confidential expression patterns in a document.
56 Citations
28 Claims
-
1. A method for using an electronic processing platform for analyzing a document based on the document'"'"'s content, the electronic processing platform comprising a document editing application, the method comprising:
-
loading a set of rules into the document editing application, the set of rules defining a set of confidential expression patterns; analyzing the document to detect when one member of the set of confidential expression patterns occurs a threshold number of times in the document content; providing, in response to the detection of the threshold number of occurrences of the one member of the set of confidential expression patterns in the document content, visual feedback that the threshold number of the one member of the confidential expression patterns occurs in the document content by; visibly tagging each occurrence of the one member of the set of confidential expression patterns in the document content with a dotted underline; altering each occurrence of the one member of the set of confidential expression patterns in the document content such that in response to a mouse-over of any occurrence of the one member of the set of confidential expression patterns in the document content, the electronic platform; displays a button, the button for accessing a rule that defined one of the confidential expression patterns used to detect the occurrence that was moused-over; and offers one or more corrective actions applicable to the occurrence that was moused-over; disabling printing to a local or networked host, wherein the entirety of the document is prevented from being printed when the threshold number of occurrences of the one member of the set of confidential expression patterns are visually tagged; and embedding a hidden flag in the document such that the document itself is identified as confidential by document scanning software, wherein the embedded hidden flag identifies the document as confidential to the document scanning software without opening the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for analyzing a document based on the document'"'"'s content, the method comprising:
-
using a receiving module of a computer to receive a set of rules, the set of rules defining a set of confidential expressions; using an analyzing module of the computer to analyze the document content to determine when the document content exceeds a threshold number of occurrences of one member of the set of confidential expressions; using a display module, providing, in response to detecting the exceeding of the threshold number of occurrences of the one member of the set of confidential expressions-in the document content, visual feedback that the threshold number of occurrences has been detected in the document content by using a processing module to; visibly tag each occurrence of the of the one member of the set of confidential expressions in the document content with a dotted underline; disable a copy/paste module within the computer, wherein the entirety of the document is prevented from being copied or pasted when the threshold number of occurrences of the one member of the set of confidential expressions are visibly tagged; alter each occurrence of the one member of the set of confidential expressions in the document content such that in response to a mouse-over of any of the occurrence of the one member of the set of confidential expressions in the document content, using the processor module to; display an information button, the button for accessing a rule that defined one of the confidential expressions used to detect the occurrence that was moused-over; and offer one or more corrective actions applicable to the occurrence that was moused-over; and embed a hidden flag in the document such that the document itself is identified as confidential by document scanning software, wherein the embedded hidden flag identifies the document as confidential to the document scanning software without opening the document. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. One or more non-transitory computer-readable media storing computer-executable instructions which, when executed by a processor on a computer system, perform a method for analyzing content of a document, the method comprising:
-
a rules server, having rules that comprise a set of expressions, said expressions that define predetermined confidential information; a communication plugin that provides a platform for incorporating the set of expressions into a document-producing application; a processor that detects when there is a threshold number of occurrences of confidential expression patterns in the content of the document; a device configured to display, in response to the detecting of the threshold number of occurrences of confidential expression patterns in the document, visual feedback that the threshold number of occurrences of confidential expression patterns in the document has been detected; and an inline document monitor module that forms part of the document-producing application, and that is adapted to, in response to a detecting of the threshold number of occurrences of confidential expression patterns in the document; visibly tag each occurrence of the confidential expression patterns in the content of the document with a dotted underline; alter each occurrence of the confidential expression patterns in the content of the document such that in response to a mouse-over of any occurrence of the confidential expression patterns in the content of the document, the module; displays an information button, the button for accessing rule that defined one of the confidential expression patterns used to detect the occurrence that was moused-over; and offers a corrective action applicable to the occurrence that was moused-over; embed a hidden flag in the document such that the document itself is identified as confidential by document scanning software, wherein the embedded hidden flag identifies the document as confidential to the document scanning software without opening the document; and perform at least one of disabling a print mechanism for the entirety of the document, disabling a print screen mechanism for the entirety of the document, disabling a copy/paste mechanism for the entirety of the document and flagging the entirety of the document as a high risk document. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. One or more non-transitory computer-readable media storing computer-executable instructions which, when executed by a processor on a computer system, perform a method for analyzing a document based on the document'"'"'s content, the analyzing using a set of rules that define a set of confidential expression patterns, the method comprising:
-
analyzing a document to determine the existence of confidential expression patterns in the document content; detecting when there are a threshold number of occurrences of the confidential expression patterns in the document content; and in response to detecting the threshold number of confidential expression patterns occurring in the document; visibly tagging each occurrence of the confidential expression patterns in the document content with a dotted underline; altering each occurrence of the confidential expression patterns in the document content such that in response to a mouse-over of any occurrence of the confidential expression patterns in the document content; displaying an information button, the button for accessing a rule that defined one of the confidential expression patterns used to detect the occurrence that was moused-over; and offering a corrective action applicable to the occurrence that was moused-over; embedding a hidden flag in the document such that the document itself is identified as confidential by document scanning software, wherein the embedded hidden flag identifies the document as confidential to the document scanning software without opening the document; and disabling printing to a local or networked host for the entirety of the document, disabling a print screen mechanism for the entirety of the document and disabling a copy/paste mechanism for the entirety of the document.
-
Specification