By Topic

Dynamic masking of application displays using OCR technologies

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Porat, S. ; IBM Research Division, Haifa Research Laboratories, Haifa University Campus, Mount Carmel, 31905, Israel ; Carmeli, B. ; Domany, T. ; Drory, T.
more authors

Industry coalitions are developing regulations to govern information sharing and to protect sensitive business data and the privacy of individuals. In many cases, these regulations make it impossible to outsource business operations, unless the companies have effective technologies to protect sensitive information. This paper addresses scenarios in which data servers and applications are owned and maintained on the premises of a company, and the service providers remotely access the data and the applications. We present a unique solution called Masking Gateway for Enterprises (MAGEN) that masks sensitive information appearing on application displays, without any interference with the applications that generate those screens. The major novelty lies in the utilization of optical character recognition (OCR) for analyzing and understanding application screens. Together with a comprehensive rule language, this approach makes it possible to characterize fields containing sensitive information and mask them according to predefined rules. The rule language is very flexible, abstract, and intuitive and is designed to cope with a vast set of policies and security needs. We describe the major challenges in implementing MAGEN and the results of experimenting with it in situations that occur in actual business settings. We outline techniques that optimize the OCR process to minimize latency and ensure robust operation.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Journal of Research and Development  (Volume:53 ,  Issue: 6 )