IBM Researchers Develop Shield to Mask Sensitive On-Screen Information

July 9, 2009

IBM Research - Haifa has developed software that more efficiently and effectively hides sensitive or personal information that might otherwise appear on the computer screens of unauthorized personnel. It could prove particularly useful for security conscious fields such as healthcare, insurance, government or financial services.

When refined and fully developed, this technology -- dubbed MAGEN (Masking Gateway for Enterprises), the Hebrew word for "shield" -- might help organizations better comply with privacy laws, and lessen the vulnerability of information to theft.

This is the latest in a string of proofs-of-concept developed by IBM Researchers designed to preserve privacy. For instance, IBM Research - India last year created voice recognition technology that automatically detects and muffles the most sensitive portions of recorded conversations, such as those between customer service representatives and clients. And several weeks ago, an IBM Researcher solved a longstanding cryptography challenge, demonstrating that encrypted information could be thoroughly analyzed, yet protected at the same time.

In the course of developing the MAGEN proof-of-concept, IBM applied for at least two U.S. patents, including one for unique ways of manipulating images, and one for scrambling words. MAGEN treats information on the screen as a picture, and relies on optical character-recognition technology to determine which onscreen fields need to be blanked out or replaced with random values. Unlike other solutions, MAGEN does not change the or the data itself -- it filters the information before it ever reaches the PC screen -- and does not force companies to create modified copies of electronic records where information is masked, scrambled, or eliminated.

This results in an extremely fast and flexible system. If companies had to create and store modified copies, the process would be relatively expensive and slow, as well as take up valuable electronic storage space. MAGEN's rules can also be easily modified as confidentiality regulations change, or for different types of users. The solution can be deployed in any environment where screen images are delivered -- no matter which operating system, application, or protocols are used.

When fully fleshed out, MAGEN will have very practical applications. For example, it might be used by a health insurance company that outsources customer service and claims processing functions to a third-party. Although private medical information in the patient records can't be shared with the contractors, customer service representatives need access to patient records. In these kinds of cases, MAGEN can hide private information so that it never appears on the agents' screens. Or, it can partially hide data, such as for the screens of call center customer service representatives, who only need enough identifying data to access, confirm or update an account.

"MAGEN's screen masking approach eliminates the need to painstakingly tailor 'data masking' solutions to specific environments," says Haim Nelken, Manager Integration Technologies at the IBM's Haifa, Israel Research Lab, where MAGEN was developed. "The bottom line is faster performance, simpler database security, and reduced costs for protecting sensitive data."

Source: IBM

Explore further: IBM Technology to Protect Customer Data in the Call Center Industry

Related Stories

IBM software safeguards consumer identity on the Web

January 26, 2007

IBM today announced software that allows people to hide or anonymize their personal information on the Web, ensuring protection from identity theft and other misuse. Developed by researchers at IBM's laboratory in Zurich, ...

Phishing Attacks in May Jumped More Than 200 Percent

June 30, 2005

The phishing season is officially open. Phishing – using fraudulent emails to try to dupe recipients into revealing personal or financial information -- reached its highest level in May, according to IBM. The month Global ...

IBM Research Unleashes Powerful Speech Software

August 18, 2008

( -- IBM today announced the availability of state-of-the-art speech recognition software to clients and partners exploring the development of real-world consumer and business solutions.

Recommended for you

Microsoft aims at Apple with high-end PCs, 3D software

October 26, 2016

Microsoft launched a new consumer offensive Wednesday, unveiling a high-end computer that challenges the Apple iMac along with an updated Windows operating system that showcases three-dimensional content and "mixed reality."

Making it easier to collaborate on code

October 26, 2016

Git is an open-source system with a polarizing reputation among programmers. It's a powerful tool to help developers track changes to code, but many view it as prohibitively difficult to use.

Dutch unveil giant vacuum to clean outside air

October 25, 2016

Dutch inventors Tuesday unveiled what they called the world's first giant outside air vacuum cleaner—a large purifying system intended to filter out toxic tiny particles from the atmosphere surrounding the machine.


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.