Privacy firewall
First Claim
1. A method comprising:
- receiving, by a privacy computer located within a secure area, a message directed at a recipient computer located outside the secure area, wherein the message includes sensitive data;
identifying, by the privacy computer, the sensitive data using a plurality of privacy rules;
anonymizing, by the privacy computer, the sensitive data according to the plurality of privacy rules to generate anonymized data, wherein anonymizing the sensitive data according to the plurality of privacy rules includes;
removing unnecessary sensitive data,masking the sensitive data to maintain format,separating the sensitive data into associated data groupings, andde-contexting the sensitive data;
generating, by the privacy computer, a hidden record including the anonymized data; and
forwarding the hidden record and the message including the anonymized data to the recipient computer located outside the secure area.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.
-
Citations
19 Claims
-
1. A method comprising:
-
receiving, by a privacy computer located within a secure area, a message directed at a recipient computer located outside the secure area, wherein the message includes sensitive data; identifying, by the privacy computer, the sensitive data using a plurality of privacy rules; anonymizing, by the privacy computer, the sensitive data according to the plurality of privacy rules to generate anonymized data, wherein anonymizing the sensitive data according to the plurality of privacy rules includes; removing unnecessary sensitive data, masking the sensitive data to maintain format, separating the sensitive data into associated data groupings, and de-contexting the sensitive data; generating, by the privacy computer, a hidden record including the anonymized data; and forwarding the hidden record and the message including the anonymized data to the recipient computer located outside the secure area. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer comprising one or more processors and a non-transitory machine-readable storage medium, including instructions that, when executed by the one or more processors, cause the one or more processors to:
-
receive a message directed at a recipient computer located outside the secure area, wherein the message includes sensitive data; identify the sensitive data using a plurality of privacy rules; anonymize the sensitive data according to the plurality of privacy rules, wherein anonymizing the sensitive data according to the plurality of privacy rules includes; removing unnecessary sensitive data, masking the sensitive data to maintain format, separating the sensitive data into associated data groupings, and de-contexting the sensitive data; generate a hidden record including the anonymized data; and forward the hidden record and the message including the anonymized data to the recipient computer located outside the secure area. - View Dependent Claims (7, 8, 9)
-
-
10. A method comprising:
-
receiving a request for sensitive data from a requesting computer; determining a sensitive data record including the sensitive data associated with the request; determining anonymization rules and search criteria associated with the requesting computer, wherein the search criteria specifies a portion of the sensitive data in the sensitive data record to be searched by the requesting computer; flagging the portion of the sensitive data in the sensitive data record specified by the search criteria; anonymizing, by an anonymization computer, the sensitive data record without anonymizing the flagged portion of the sensitive data, wherein anonymizing the sensitive data record includes using the anonymization rules to generate an anonymized data record by; removing unnecessary sensitive data from the sensitive data record; masking the sensitive data to maintain format; separating the sensitive data into associated data groupings; and de-contexting the sensitive data; and sending the anonymized data record to the requesting computer, wherein the requesting computer thereafter searches the anonymized data record using the search criteria. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer comprising one or more processors and a non-transitory machine-readable storage medium, including instructions that, when executed by the one or more processors, cause the one or more processors to:
-
receive a request for sensitive data from a requesting computer; determine a sensitive data record including sensitive data associated with the request; determine anonymization rules and search criteria associated with the requesting computer, wherein the search criteria specifies a portion of the sensitive data in the sensitive data record to be searched by the requesting computer; flag the portion of the sensitive data in the sensitive data record specified by the search criteria; anonymize the sensitive data record without anonymizing the flagged portion of the sensitive data, wherein anonymizing the sensitive data record includes using the anonymization rules to generate an anonymized data record by; removing unnecessary sensitive data from the sensitive data record; masking the sensitive data to maintain format; separating the sensitive data into associated data groupings; identifying search criteria from the sensitive data record; and de-contexting the sensitive data; and send the anonymized data record to the requesting computer, wherein the requesting computer thereafter searches the anonymized data record using the search criteria. - View Dependent Claims (16, 17, 18, 19)
-
Specification