US9298944B2 - Confidential information delivery in a multi-device environment - Google Patents
Confidential information delivery in a multi-device environment Download PDFInfo
- Publication number
- US9298944B2 US9298944B2 US14/153,639 US201414153639A US9298944B2 US 9298944 B2 US9298944 B2 US 9298944B2 US 201414153639 A US201414153639 A US 201414153639A US 9298944 B2 US9298944 B2 US 9298944B2
- Authority
- US
- United States
- Prior art keywords
- confidential information
- computing device
- user
- mask
- confidential
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 31
- 230000000873 masking effect Effects 0.000 claims abstract description 11
- 238000013500 data storage Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 10
- 230000002596 correlated effect Effects 0.000 claims description 5
- 230000001413 cellular effect Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 230000000875 corresponding effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 230000002085 persistent effect Effects 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000001276 controlling effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008867 communication pathway Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Definitions
- the present invention relates to the sharing of confidential data between computers and other intelligent devices. More particularly, the invention is directed to protecting the confidentiality of such data when it is viewed on a device.
- a user may have problems viewing confidential data received from another device without nearby persons also being able to glimpse the data.
- Examples of such confidential data include a bank account number, a credit card number, salary information, etc.
- the confidential data may be present in an email body, chat content, any opened document, etc, that is received at the user's device. Showing the confidential information can be a security risk.
- the present disclosure is directed to a confidential information handling technique that addresses this issue.
- a system, a machine-implemented method and a computer program product are provided to implement an automated technique for delivering confidential information in a multi-device environment.
- the technique includes receiving confidential information at a first computing device associated with a first user from a second computing device associated with a second user, masking the confidential information on the first computing device while displaying non-confidential information received from the second computing device (if any), and forwarding the confidential information for display on a third computing device that is capable of displaying the confidential information more securely than the first computing device, the third computing device being associated with the first user or a third party authorized to view the confidential information.
- the masking includes displaying a mask on the first computing device in lieu of the confidential information, the mask being displayed at a location where the confidential information would normally appear.
- the mask is displayed in a manner that allows the confidential information to be correlated with the mask.
- the mask is color coded with a color that matches a color associated with said display of said confidential information.
- the confidential information is received at the first computing device in combination with the non-confidential information, and the technique further includes a confidential information identification operation to distinguish the confidential information from the non-confidential information.
- the confidential information identification operation supports one or both of manual identification or automated identification of the confidential information.
- the confidential information identification operation is performed at one or both of the first computing device or the second computing device.
- FIG. 1 is a functional block diagram showing an example multi-device computing environment that includes first, second and third computing devices;
- FIG. 2 is a functional block diagram showing the communication and display of information on the first, second and third computing devices if FIG. 1 ;
- FIG. 3 is a functional block diagram showing example components of the first, second and third computing devices of FIG. 1 ;
- FIG. 4 is a functional block diagram additionally showing example program logic that may be variously implemented on the first, second and third computing devices of FIG. 1 ;
- FIG. 5 a flow diagram showing example operations that may be performed by the program logic of FIG. 4 ;
- FIG. 6 is a diagrammatic perspective view showing example data storage media that may be used to store program instructions for implementing instances of the program logic of FIG. 4 .
- FIG. 1 illustrates a first example computing device, shown by reference number 2 , that receives information, including confidential information, via a network 4 (or other communication pathway) from a second example computing device, shown by reference number 6 .
- the first computing device 2 (serving as the information receiver) is operated by a first user (not shown).
- the second computing device 6 (serving as the information sender) is operated by a second user (also not shown).
- the first computing device 2 additionally communicates with a third example computing device, shown by reference number 8 , that is in close proximity to the first computing device.
- the third computing device 8 serves as an adjunct information receiver to handle the confidential portion of the information sent by the second computing device 6 to the first computing device 2 .
- the third computing device 8 will typically be operated by the first user, but this need not always be the case.
- the first computing device 2 is assumed to have a display 2 A that is relatively large in size, such that the information shown thereon is potentially readable by nearby persons without permission from the first user. This poses a security risk if the first user is operating the first computing device 2 in a public place.
- the third computing device 8 is assumed to have a display 8 A that is relatively small in size, such that it can be viewed more confidentially by the first user (or a different authorized user), even in a public place.
- the second computing device 6 may also have a display 6 A, but its size is not relevant to the present discussion. Indeed, the system 6 might not have any display at all (see below).
- the first computing device 2 is depicted as a species of portable computer commonly referred to a laptop computer. However, it could also be a tablet or any other type of portable computing apparatus having a relatively large display.
- Non-portable computers such as desktop systems or workstations, could also be used to implement the first computing device 2 .
- Such non-portable devices are pervasively used in public or quasi-public places such as business offices, libraries, government facilities, and other locations where the displayed information is potentially viewable by multiple persons.
- Additional examples of apparatus that could be used to implement the first computing device 2 are gaming consoles and television set-top devices (such as digital television receivers and digital video recording devices) that display information on a television monitor.
- the third computing device 3 is depicted as wireless hand-held device, such as a cellular telephone, a personal digital assistant, or a portable entertainment system, but it could also be some other type of portable computing device (wireless or wireline) having a relatively small display, such as a small tablet.
- the second computing device 6 is depicted as a species of computer commonly referred to a personal desktop computer. However, it could also be any other type of computing system, portable or non-portable. As previously noted, the second computing device 6 could operate without the display 6 A, such as when the system 6 is implemented as a server system (such as a web server, for example). Non-limiting examples of the second computing device 6 include any of the device types mentioned in connection with the first computing device 2 , as well as single-node or multi-node server-type systems implemented using real or virtualized computing resources.
- the confidential portion of the information is not displayed via the display 2 A.
- the first computing device 2 only displays the non-confidential portion of the information that it receives from the second computing device 6 .
- the confidential portion of the information is sent by the second computing device 2 to the third computing device 8 , and this device outputs the confidential information on its display 8 A.
- the first user (or a different authorized user) can view the confidential information more securely than if that information was output (together with the non-confidential information) to the relatively large display 2 A of the first computing device 2 .
- the terms “relatively large” and “relatively small” when referring to the displays 2 A and 8 A pertain to the relative size difference between these two displays.
- the display 2 A is relatively large compared to the display 8 A
- the display 8 A is relatively small compared to the display 2 A.
- These terms are not meant to signify absolute sizes.
- the display 8 A will be small enough so as to be securely viewable without much effort to block third party viewing.
- the display 8 A can be easily shielded from view by the second user's hand, or by virtue of being held close to the second user's body, or under an article of clothing, or by being positioned so as to be blocked by some other object (e.g., under a table).
- a cellular telephone with a screen size of around 3.5-5.5 inches (diagonal dimension) would thus be one example of the relatively small display 8 A.
- a small tablet computer with a screen size of about 5.5-10.5 inches (diagonal dimension) would be another example even though it would be more difficult to shield than a cellular telephone.
- handheld devices are the most secure because they are easy to maneuver so as to hide whatever confidential information is being displayed.
- the relatively large display 2 A would typically have a screen size (diagonal dimension) in excess of 10.5 inches, and the computing device 2 would typically not be handheld.
- FIG. 2 illustrates one possible example of the disclosed technique in which the first computing device 2 and the third computing device 6 each run respective instances of a chat program 10 .
- “User A” represents the first user operating the computing device 2
- “User B” represents the second user operating the computing device 6 .
- the chat instance 10 associated with the second computing device 6 the second user generates a message that reads “I got a 20% salary increase!”, and causes the message to be sent to the first computing device 2 via the network 4 .
- the amount of the salary increase i.e., “20%” represents confidential information.
- the “20%” value is identified as constituting confidential information.
- the chat program instance 10 on the first computing device 2 processes the message, it displays the non-confidential portions of the message on the display 2 A, but masks the confidential information by displaying a suitable mask (a white color bar in this example) in lieu of the confidential information.
- the mask is display at a location in the display 2 A wherein the confidential information would normally appear. This is the location where the confidential information would be presented if it was not masked.
- the computing device 2 sends it to the third computing device 8 to be displayed on the display 8 A as the alphanumeric characters “20%”.
- the third computing device 8 runs a confidential information application 12 with suitable program logic (described in more detail below) that performs the required operations.
- confidential information delivery would be where the second user sends a document containing confidential information from the second computing device 6 .
- the confidential information might, for example, comprise a bank code, a bank account number, a PIN number, etc.
- the document would be displayed on the first computing device 2 with the confidential information being appropriately masked, and the confidential information would only be displayed on the third computing device 8 .
- a further example of confidential information delivery would be where the second computing device 6 is an online transaction processing web server owned by a bank, brokerage firm or other financial institution, or an online retailer, etc., that serves up web pages containing confidential information.
- the confidential information would be appropriately masked on the first computing device 2 , and would only be displayed on the third computing device 8 .
- the first user will not necessarily be the person that views the confidential information displayed by the third computing device 8 .
- This person could be a third user who is authorized to view the confidential information.
- the first user may not be authorized to view such information.
- the first user could be operating the first computing device 2 to receive and forward confidential information on behalf of the third user operating the third computing device 8 , and the first user might only have permission to view non-confidential information.
- An example scenario would be a corporate manager operating the first computing device 2 to show an employee operating the third computing device 8 certain information relating to the employee.
- the employee's non-confidential employment information could be presented on the display 2 A of the first computing device 2 for viewing by both the manager and the employee.
- the employee's confidential information would be masked on the display 2 A and viewable only by the employee on the display 8 A of the third computing device 8 .
- the second user operating the second computing device 6 to send the employment information in this scenario might be the corporate human resources manager.
- FIG. 3 illustrates example hardware components 20 that may be used to implement each of the computing devices 2 , 6 and 8 .
- the hardware components 20 may include one or more CPUs or other logic-implementing hardware 22 that may operate in conjunction with a memory 24 (e.g., RAM, ROM, or a combination thereof) to provide a data processing core.
- Additional components may include a display adapter 26 for generating visual output information to the associated display 2 A, 6 A or 8 A (e.g., text and/or graphics), a persistent storage resource 28 (e.g., a disk drive, a solid state drive, flash storage, etc.), and various peripheral devices 30 .
- the peripheral devices 30 may include an input device such as a mouse, touch pad or other pointing device, a keyboard (real or virtual), and/or a touch screen, depending on the nature of the computing device being implemented.
- the peripheral devices 30 may also include other I/O resources, such as network I/O devices (Ethernet, WiFi, Cellular, etc.), and various other types of devices.
- a bus infrastructure 32 which may include a memory controller hub or chip 34 (e.g., a northbridge) and an I/O (input/output) controller hub or chip 36 (e.g., a southbridge), may be used to interconnect the foregoing components.
- a memory controller hub or chip 34 e.g., a northbridge
- I/O (input/output) controller hub or chip 36 e.g., a southbridge
- the hardware components 20 are exemplary in nature, and that other component arrangements may also be used to implement the computing devices 2 , 6 and 8 .
- the operating system 40 may be provided by any conventional operating system program capable of controlling the underlying hardware components 20 , including but not limited to general purpose operating systems, embedded operating systems, guest operating systems running in a virtual machine, virtual machine managers, hypervisors, etc.
- the application program logic 42 runs in conjunction with the operating system 40 to control the hardware components 20 to perform the confidential information delivery functions described herein.
- the program logic 42 respectively runs in separate instances 42 A, 42 B and 42 C on the computing devices 2 , 6 and 8 , with each program logic instance performing different operations on each device.
- the program logic instances 42 A and 42 B on the first and second computing devices 2 and 6 are incorporated into a larger program, such as the chat program 10 , an email client program, a word processing program, etc.
- Another example would be a web server running on the second computing device 6 (comprising program logic instance 42 B) and a web browser running on the first computing device 2 (providing program logic instance 42 A).
- the program logic instance 42 C on the third computing device 8 is a dedicated program designed specifically to support confidential information delivery as disclosed herein, such as the confidential application 12 .
- the program logic instance 42 C could part of a larger program that provides other functionality, such as an email client, a text messaging program, a web browser, etc.
- a first operation that can be performed by either the first program logic instance 42 A on the first computing device 2 , or the second program logic instance 42 B on the second computing device 6 is to identify the confidential information so that it can be handled separately from any associated non-confidential information.
- the confidential information identification operation can be performed in various ways. In one embodiment, a manual technique may be used that allows the second user operating the second computing device 6 to select any information that the user deems to be confidential (such as by highlighting portions of text).
- the second program logic instance 42 B would then flag the designated confidential information in a suitable manner, such as by associating it with an appropriate code (e.g., a tag), encrypting it, removing or segregating it from the remaining non-confidential information (e.g., for separate transmission), etc.
- the confidential information identification operation would then include the first program logic 42 A on the first computing device 2 identifying the confidential information from the flagging operation.
- the manual technique is particularly suitable for email messages, chat messages, documents, and other information content that is manually authored by the second user.
- confidential information may be automatically identified using a rule-based technique in which confidential information designation rules are created, stored and applied to information communicated between the first and second computing devices 2 and 6 .
- This embodiment would be particularly suitable for information content that is automatically generated, such as web pages produced during online transaction processing.
- a confidential information designation rule could be formulated that designates all numeric information having a certain format.
- Format examples could include all numerals following a dollar sign ($) (or other currency indicator), all numerals preceding a percent sign (%), sixteen-digit numeric sequences that are indicative of a credit card number, three-digit numeric sequences that are indicative of credit card security codes, four-digit numeric sequences that are indicative of debit card PIN numbers, nine-digit numeric sequences that are indicative of social security numbers, etc.
- Rules based on the location of information within a web page or other document could also be used, as could many other types of rule-based processing, including the processing employed in prior art confidential information masking techniques.
- Rule-based confidential information identification could be performed by the second program logic instance 42 B on the second computing device 6 before it sends information to the first computing device 2 .
- the confidential information would then be flagged and sent to the first computing device 2 (together with the non-confidential information, if any), which would identify the confidential information from the non-confidential information based on the flagging operation, as in the manual embodiment.
- the ruled-based confidential information identification could be performed by the first program logic instance 42 A on the first computing device 2 when it receives information content from the second computing device 6 .
- the first and second program logic instances 42 A and 42 b could support both manual and automated identification of confidential information.
- a learning algorithm could be used to create confidential information identification rules from the manual designations.
- a second operation which would be performed strictly by the first program logic instance 42 A on the first computing device 2 , is to mask all identified confidential information on the display 2 A while displaying any non-confidential information received from the second computing device 6 .
- the confidential information masking operation entails displaying a mask in the display 2 A in lieu of the confidential information at a location where the confidential information would normally appear.
- the mask can take many forms, including but not limited to a solid bar as is shown on the display 2 A in FIG. 2 .
- This mask which is identified by reference numeral 44 , represents only one possible type of mask. Other mask types would include replacement alphanumeric text (e.g., “xxxx” or “1111”), a text or graphic pattern, an icon, an image, etc.
- the mask can be displayed in a manner that allows the confidential information displayed on the the third computing device 8 to be correlated with the mask as it is displayed on the first computing device 2 .
- the mask may be color coded with a color that matches a color associated with the confidential information shown in the display 8 A.
- FIG. 2 shows confidential information 46 displayed with a color bar (white) that matches the color of the mask 44 (also white). Note that the confidential information 46 could be displayed with appropriately colored text in lieu of the color bar shown in FIG. 2 .
- Color coding the mask and the confidential information has several advantages. For example, if the information sent from the second computing device 6 contains more than one item of confidential information, the use of a different color for each mask and corresponding confidential information item allows the context of that information to be determined. As previously noted, the mask is displayed in the display 2 A at a location where the confidential information would normally be presented. Thus, the color coding allows the first user to match an item of confidential information shown on the display 8 A with its correct location on the display 2 A. The color coding could also be used to identify the source of the confidential information in case the first computing device 2 is being used to interact with more than one information sender.
- the color coding could be used to help the first user associate the confidential information displayed on the third computing device 8 with a particular application running on the first computing device 2 .
- other techniques could also be used for identifying the source of the confidential information, such as by differentiated icons, images, patterns, alphanumeric identifiers, etc., as the masks, and by displaying all or part of the mask in association with the corresponding confidential information on the third computing device 8 (in addition to displaying it on the first computing device 2 ).
- Another use of color coding would be to indicate a degree of confidentiality of the confidential information.
- the confidential information identification operation would include assigning the confidentiality level, and this level would map to an appropriate mask color. For example, high-level confidential information could be masked with a red color, medium-level confidential information could be masked with a blue color, etc. If there is multiple confidential information with the same degree of confidentiality (e.g., multiple instances of high-level confidential information), each instance could be masked using a different shade of the same color.
- a third operation which would also be performed by the first program logic instance 42 A on the first computing device 2 , is to forward the confidential information to the third computing device 8 .
- the confidential information forwarding operation can be performed using any suitable communication technique. This operation includes forwarding the confidential information itself, and my further include sending mask correlation information so that the confidential information can be displayed on the third computing device 8 in a manner that correlates it with the mask displayed on the first computing device 8 .
- the mask correlation information could comprise color code information specifying the color of the mask.
- the mask has other identifying characteristics (e.g., if it comprises an image, pattern, alphanumeric identifiers, etc.), one or more of those characteristics could be sent to the third computing device 8 to be displayed in association with the confidential information.
- a wireless technology such as Bluetooth pairing, may be used to establish the underlying communication link between the first and third computing devices 2 and 8 .
- Other wireless technologies such as WiFi and Cellular, could also be used, as could a wireline technology such as Ethernet, if so desired.
- the first program logic instance 42 A may itself forward the confidential information to the third program logic instance 42 C.
- the first program logic instance 42 A could forward the confidential information via a proxy program, such as an email client, a text messaging application, a web server, etc.
- a fourth operation, which is performed by the third program logic instance 42 C, is to of display the confidential information to the first user on the third computing device 8 , together with mask correlation information that associates the confidential information with a corresponding mask displayed by the first computing device 2 .
- This functionality can be provided by any application running on the third computing device 8 that is capable of receiving the confidential information from the first device 2 and presenting it to the third user via the display 8 A.
- the third program logic instance 42 C may communicate directly with the first program logic instance 42 A, or it may receive the confidential information from a proxy, such as an email client application, a text messaging application, or some other program acting on behalf of the first program logic instance 42 A.
- the program logic instance 42 C may be a dedicated program designed specifically to support confidential information delivery as disclosed herein, such as the confidential application 12 .
- the program logic instance 42 C could part of a larger program that provides other functionality, such as an email client, a text messaging program, a web browser, etc.
- FIG. 5 presents a flow diagram depicting the above-described operations of the first, second and third program logic instances 42 A, 42 B and 42 C.
- Block 50 represents the confidential information identification operation. As noted above, this operation may be performed manually or with an automated technique using confidential information identification rules. The manual technique would typically be performed by the second user using the second program logic instance 42 B on the second computing device 6 . The automated technique could be performed by either the first program logic instance 42 A on the first computing device 2 or the second program logic instance 42 B on the second computing device 6 . If either manual or automated confidential information identification operation is performed on the second computing device 6 , the confidential information will be appropriately flagged and the confidential information identification operation will include the the first computing device 2 identifying the confidential information based on the flagging operation.
- the first computing device 2 masks the identified confidential information on the display 2 A, while displaying any non-confidential information that may have been received from the second computing device 6 . Note that there may be cases were there is no non-confidential information, such as when the second computing device 6 sends only confidential information. In that case, the first computing device 2 might only display the mask that uses to hide the confidential information.
- the first computing device 2 forwards the confidential information to the third computing device 8 , and in block 56 , the information is displayed on the display 8 A in association with mask correlation information.
- Each instance 42 A, 42 B and 42 C of the program logic 42 may be implemented in software, firmware or a combination thereof, and with some (or all) operations potentially being performed by dedicated hardware logic. If implemented in software, the program logic 42 may be loaded from the persistent storage 28 (see FIG. 3 ) into a portion of the main memory 24 that comprises RAM (see FIG. 3 ). If implemented in firmware, the program logic 42 could reside in a portion of the main memory 24 that comprises ROM, such as EPROM memory. Each of the program logic instances 42 A, 42 B and 42 C may comprise a collection of program instructions, possibly having entry and exit points, written in a suitable programming language.
- Such programming languages may include, but are not limited to, a high level procedural language such as C, a high level object oriented language such as C++, an interpreted language such as Java, BASIC, Perl, Python, or a lower level language such as assembly.
- the program instructions written in such languages may be compiled and/or interpreted and/or assembled (as the case may be) into machine language program instructions that are capable of execution on the CPU(s) 22 .
- the machine language program instructions When the machine language program instructions are loaded into and executed by the CPU(s) 22 , the resultant programmed computing device 2 , 6 or 8 becomes a particular machine for practicing the subject matter described herein.
- Program instructions of a software implementation of the program logic 42 may be embodied in one or more modules, each of which may be compiled and linked into an executable program, installed in a dynamically linked library, or otherwise made ready for invocation and execution by the computing devices 2 , 6 and 8 .
- the module(s) may be implemented to run with or without the support of the underlying operating system 40 . They may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts.
- program logic 42 could be implemented using dedicated logic hardware.
- hardware would include connected logic units such as gates and flip-flops, and/or integrated devices, such as application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs)), reconfigurable data path arrays (rDPAs) or other computing devices.
- ASICs application specific integrated circuits
- FPGAs field programmable gate arrays
- rDPAs reconfigurable data path arrays
- a technique for delivering confidential information in a multi-device environment. It will be appreciated that the foregoing concepts may be variously embodied in any of a machine implemented method, a system, and a computer program product. Example embodiments of a machine-implemented method and a system have been described in connection with FIGS. 1-5 .
- digitally encoded program instructions may be stored on one or more computer-readable, non-transitory data storage media for use in controlling a CPU or other instruction processing device to perform operations.
- the program instructions may be embodied as machine language code that is ready for loading and execution by the machine apparatus, or the program instructions may comprise a higher level language that can be compiled and/or interpreted and/or assembled into machine language.
- Example languages include, but are not limited to C, C++, Java, assembly, to name but a few.
- the program instructions When implemented on a machine apparatus comprising a processor, the program instructions combine with the processor to provide a particular machine that operates analogously to specific logic circuits, which themselves could be used to implement the disclosed subject matter.
- Example non-transitory data storage media for storing digitally encoded program instructions are shown by reference numerals 24 (memory) and 48 (persistent storage) of the computing devices 2 , 6 and 8 shown in FIG. 3 .
- a further example of non-transitory data storage media that may be used to store the program instructions is shown by reference numeral 100 in FIG. 6 .
- the non-transitory data storage media 100 are illustrated as being portable optical storage disks of the type that are conventionally used for commercial software sales, such as compact disk-read only memory (CD-ROM) disks, compact disk-read/write (CD-R/W) disks, and digital versatile disks (DVDs).
- CD-ROM compact disk-read only memory
- CD-R/W compact disk-read/write
- DVDs digital versatile disks
- non-transitory data storage media can store the program instructions either alone or in conjunction with an operating system or other software product that incorporates the required functionality.
- the non-transitory data storage media could also be provided by portable electrical storage media (such as USB flash devices).
- the non-transitory data storage media may also be combined with drive systems (e.g. disk drives), or incorporated in a computing device (e.g., as random access memory (RAM), read-only memory (ROM) or other semiconductor or solid state memory).
- non-transitory data storage media could comprise any electronic, magnetic, optical, magneto-optical, infrared, semiconductor system or apparatus or device, or any other non-transitory entity representing a machine, manufacture or composition of matter that can contain, store, communicate, or transport the program instructions for use by or in connection with an instruction execution system, apparatus or device, such as a computer.
- the program instructions when the program instructions are loaded into and executed by a computing device, the resultant programmed system becomes a particular machine for practicing embodiments of the method(s) and system(s) described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/153,639 US9298944B2 (en) | 2014-01-13 | 2014-01-13 | Confidential information delivery in a multi-device environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/153,639 US9298944B2 (en) | 2014-01-13 | 2014-01-13 | Confidential information delivery in a multi-device environment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150199538A1 US20150199538A1 (en) | 2015-07-16 |
US9298944B2 true US9298944B2 (en) | 2016-03-29 |
Family
ID=53521647
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/153,639 Active 2034-06-01 US9298944B2 (en) | 2014-01-13 | 2014-01-13 | Confidential information delivery in a multi-device environment |
Country Status (1)
Country | Link |
---|---|
US (1) | US9298944B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230036516A1 (en) * | 2021-08-02 | 2023-02-02 | Lenovo (Beijing) Limited | Page processing method and device, and electronic device |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227524B (en) | 2014-06-12 | 2018-10-12 | 阿里巴巴集团控股有限公司 | A kind of information security method and relevant apparatus |
US9335862B1 (en) * | 2014-11-14 | 2016-05-10 | International Business Machines Corporation | Virtual multi-device navigation in surface computing system |
US10346634B2 (en) * | 2014-11-20 | 2019-07-09 | Lenovo (Singapore) Pte. Ltd. | Obscuring and deleting information from a messaging account |
US10037432B2 (en) | 2015-02-27 | 2018-07-31 | Lenovo (Singapore) Pte. Ltd. | Implementing file security settings based on context |
US10834027B2 (en) * | 2015-06-27 | 2020-11-10 | Mcafee, Llc | Protection of sensitive chat data |
US11412303B2 (en) * | 2018-08-28 | 2022-08-09 | International Business Machines Corporation | Filtering images of live stream content |
US11475146B2 (en) * | 2018-11-08 | 2022-10-18 | Citrix Systems, Inc. | Systems and methods for a privacy screen for secure SaaS applications |
US11727151B2 (en) * | 2020-03-03 | 2023-08-15 | International Business Machines Corporation | Pseudonymizing sensitive objects in online content exchanges |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090019553A1 (en) * | 2007-07-10 | 2009-01-15 | International Business Machines Corporation | Tagging private sections in text, audio, and video media |
US20090116643A1 (en) | 2007-10-31 | 2009-05-07 | Yasuo Hatano | Encryption apparatus, decryption apparatus, and cryptography system |
US20100302586A1 (en) * | 2009-05-29 | 2010-12-02 | Konica Minolta Business Technologies, Inc. | Image forming apparatus, server apparatus and recording medium |
US20120036452A1 (en) | 2010-08-09 | 2012-02-09 | Art Technology Group, Inc. | Masking sensitive information in a screen sharing session |
US8179556B2 (en) | 2007-03-26 | 2012-05-15 | Xerox Corporation | Masking of text in document reproduction |
-
2014
- 2014-01-13 US US14/153,639 patent/US9298944B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8179556B2 (en) | 2007-03-26 | 2012-05-15 | Xerox Corporation | Masking of text in document reproduction |
US20090019553A1 (en) * | 2007-07-10 | 2009-01-15 | International Business Machines Corporation | Tagging private sections in text, audio, and video media |
US20090116643A1 (en) | 2007-10-31 | 2009-05-07 | Yasuo Hatano | Encryption apparatus, decryption apparatus, and cryptography system |
US20100302586A1 (en) * | 2009-05-29 | 2010-12-02 | Konica Minolta Business Technologies, Inc. | Image forming apparatus, server apparatus and recording medium |
US20120036452A1 (en) | 2010-08-09 | 2012-02-09 | Art Technology Group, Inc. | Masking sensitive information in a screen sharing session |
Non-Patent Citations (5)
Title |
---|
Certificall, "Confidential Data Delivery", , at least as early as Aug. 2013, 1 page. |
Certificall, "Confidential Data Delivery", <http://www/certificall.net/usages/confidential-delivery.html>, at least as early as Aug. 2013, 1 page. |
ISACA, "Mobile Devices May Pose Greatest Threat to Confidential Information: New ISACA White Paper", Press Release, Aug. 3, 2010, 2 pages. |
M. Cooney, "IBM researchers build security software to mask confidential info", Layer 8, Network World, Jul. 8, 2009, 4 pages. |
Y. Ikawa et al., "A New Document Masking Approach for Removing Confidential Information", E-Commerce and the 4th IEEE International Conference on Enterprise Computing, Jul. 2007, Abstract, 2 pages. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230036516A1 (en) * | 2021-08-02 | 2023-02-02 | Lenovo (Beijing) Limited | Page processing method and device, and electronic device |
US11704478B2 (en) * | 2021-08-02 | 2023-07-18 | Lenovo (Beijing) Limited | Page processing method and device, and electronic device |
Also Published As
Publication number | Publication date |
---|---|
US20150199538A1 (en) | 2015-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9298944B2 (en) | Confidential information delivery in a multi-device environment | |
US20210124872A1 (en) | Digital processing systems and methods for automatic relationship recognition in tables of collaborative work systems | |
US10936274B2 (en) | Selective screen sharing | |
US10701079B1 (en) | Collaborative data sharing and co-browsing with natural language masking | |
US10162974B2 (en) | Concealing sensitive information on a display | |
Kelly et al. | Resources and resourcefulness: Roles, opportunities and risks for women working at artisanal mines in South Kivu, Democratic Republic of the Congo | |
US9754098B2 (en) | Providing policy tips for data loss prevention in collaborative environments | |
US9104659B2 (en) | Systems and methods for providing content aware document analysis and modification | |
US10318744B2 (en) | Touchscreen image mapping for augmented reality devices | |
US20180075254A1 (en) | Automated classification and detection of sensitive content using virtual keyboard on mobile devices | |
US9003551B2 (en) | System and method for obscuring displayed information | |
US8887245B1 (en) | Browser-based prevention of unsecure online transmission of sensitive information | |
US20130185634A1 (en) | Automated document redaction | |
CN108153468A (en) | Image processing method and device | |
KR20130121692A (en) | Contextual control of dynamic input device | |
US8838554B2 (en) | Systems and methods for providing content aware document analysis and modification | |
US20210342796A1 (en) | Message processor with application prompts | |
US10311425B2 (en) | Integrating mobile payment application with other mobile applications while preventing security exposures | |
US9411438B1 (en) | Utilization of multiple keypads for password inputs | |
TWI686725B (en) | Method and device for displaying sensitive information | |
Mueller | Security for Web Developers: Using JavaScript, HTML, and CSS | |
EP4092618B1 (en) | Picture processing method and apparatus, electronic device and storage medium | |
US11100237B2 (en) | Identify and protect sensitive text in graphics data | |
Cunha et al. | Navigating the landscape of AI ethics and responsibility | |
US20080115067A1 (en) | Method and system for controlling security of a user interface in a computer system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KRITT, BARRY A.;RAKSHIT, SARBAJIT K.;REEL/FRAME:031953/0865 Effective date: 20131203 |
|
AS | Assignment |
Owner name: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:034194/0353 Effective date: 20140926 Owner name: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD., Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:034194/0353 Effective date: 20140926 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: LENOVO INTERNATIONAL LIMITED, HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.;REEL/FRAME:038483/0940 Effective date: 20160505 |
|
AS | Assignment |
Owner name: LENOVO INTERNATIONAL LIMITED, HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE LTD.;REEL/FRAME:050301/0033 Effective date: 20160401 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |