Patent classifications
H04N1/4446
Methods, systems, and media for data anonymization
Aspects of the disclosure provide for mechanisms data anonymization. A method of the disclosure includes: receiving, by a processing device, a user input initiating anonymization of a first electronic document, wherein the first electronic document comprises at least one first data item relating to personally identifiable information and at least one second data item not related to the personally identifiable information; in response to receiving the user input, generating a second electronic document, wherein the second electronic document comprises a digital fingerprint of the first electronic document and the at least one second data item; and transmitting, to a server, the second electronic document as an anonymized version of the first electronic document.
METHODS, SYSTEMS, AND MEDIA FOR DATA ANONYMIZATION
Aspects of the disclosure provide for mechanisms data anonymization. A method of the disclosure includes: receiving, by a processing device, a user input initiating anonymization of a first electronic document, wherein the first electronic document comprises at least one first data item relating to personally identifiable information and at least one second data item not related to the personally identifiable information; in response to receiving the user input, generating a second electronic document, wherein the second electronic document comprises a digital fingerprint of the first electronic document and the at least one second data item; and transmitting, to a server, the second electronic document as an anonymized version of the first electronic document.
IMAGE SCANNING APPARATUS FOR PROTECTING PERSONAL INFORMATION AND METHOD FOR SCANNING IMAGE THEREOF
An image scanning apparatus and method for protecting personal information are provided. The image scanning apparatus may include an image sensor which scans a manuscript, a memory, and a processor to generate a scan image using a signal that is output from the image sensor, perform a masking process for personal information included in the generated scan image, generate scan data that includes additional information for recovering the masked personal information and the masked scan image, and store the same in the memory.
Detection of steganography on the perimeter
A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual hashed version of the detected multimedia file to the detected version of the multimedia file based on the detected multimedia file not matching the stored hashed version of the detected multimedia file. The method may further include assigning a flag attribute to the detected multimedia file based on the detected multimedia file matching the stored perceptual hashed version of the detected multimedia file.
Scan privacy tool and methods using sensors or control buttons
A multi-functional printing (MFP) includes a scan privacy tool to allow edits and changes to a scanned document image to remove or hide private information within a document. The scan privacy tool is enabled for jobs on the MFP device and launches when a job is run. The document is scanned and a scanned document image displayed on a display and edit interface of the scan privacy tool. Changes are made to the image using tools available through the scan privacy tool. The changes are applied to the scanned document image. The modified image is saved and transmitted to an engine in the MFP device to complete the job. An external input device, such as control buttons or a motion sensor device, is used to input instructions to the scan privacy tool in order to modify the scanned image.
OBSCURED MEDIA COMMUNICATION
Portable computing devices, software operating on and stored in such devices, and methods are described herein that decrypt media in response to one or more input actions. The input actions can be measured or sensed by one or more components of the device. In some versions, a sender can cause a media file to be obscured and provide the one or more actions required to restore the obscured media file. The media file can be shared between client devices of a sender and receiver through messaging application software operating on the client devices.
SYSTEMS AND METHODS FOR CREATING ENHANCED DOCUMENTS FOR PERFECT AUTOMATED PARSING
The disclosed enhanced document creation and parsing systems deal with enhanced documents that allow for the presentation of document content in a preferred visual manner, while ensuring that the document content can be captured accurately by an automated parser with nothing being discarded or misrepresented. The enhanced document creation system may create an enhanced document by encoding document content in accordance with a defined schema, optionally encrypting the resulting structured data into an encrypted byte string, and embedding the encrypted byte string as non-visible metadata in a rendered document. The resulting enhanced document can be completely and accurately parsed by an enhanced document parsing system that is capable of extracting, decrypting and decoding the embedded document metadata.
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM PROVIDING CONCEALED HISTORY INFORMATION IN ACCORDANCE WITH AUTHORIZATION OF A VIEWER
An information processing apparatus includes a reception unit, a generating unit, and a presenting unit. The reception unit acquires identification information used for identifying a user and receives a request for executing a job with respect to an apparatus to be used. The generating unit executes the job by using a function included in the apparatus and generates history information using the identification information and an execution result of the job. The presenting unit entirely or partially conceals the history information in accordance with authorization of a viewer and presents the concealed history information.
METHODS AND SYSTEM OF DEVICES FOR MANAGING CONFIDENTIAL DOCUMENTS USING EXPIRATION PARAMETERS
A system of devices receives and stores documents based on confidential information redacted from the documents. An electronic document is analyzed to identify character blocks having confidential information. The confidential information can be in different formats within the document. Redaction rules are applied to the character blocks to identify confidential categories for the confidential information within the blocks. The confidential information is redacted based on the rules such that the confidential information is removed from the document. A new electronic document is generated with the information redacted such that it is not viewable or printable. The two documents with different levels of confidential information is then stored on separate devices within the system.
METHODS AND SYSTEM FOR MANAGING CONFIDENTIAL DOCUMENTS OVER A PLURALITY OF DEVICES
A system of devices receives and stores documents based on confidential information redacted from the documents. An electronic document is analyzed to identify character blocks having confidential information. The confidential information can be in different formats within the document. Redaction rules are applied to the character blocks to identify confidential categories for the confidential information within the blocks. The confidential information is redacted based on the rules such that the confidential information is removed from the document. A new electronic document is generated with the information redacted such that it is not viewable or printable. The two documents with different levels of confidential information is then stored on separate devices within the system. The documents are transferred when a device is removed from the system according to various criteria.