IBM Researchers Develop Shield to Mask Sensitive On-Screen Information

Jul 09, 2009

IBM Research - Haifa has developed software that more efficiently and effectively hides sensitive or personal information that might otherwise appear on the computer screens of unauthorized personnel. It could prove particularly useful for security conscious fields such as healthcare, insurance, government or financial services.

When refined and fully developed, this technology -- dubbed MAGEN (Masking Gateway for Enterprises), the Hebrew word for "shield" -- might help organizations better comply with privacy laws, and lessen the vulnerability of information to theft.

This is the latest in a string of proofs-of-concept developed by IBM Researchers designed to preserve privacy. For instance, IBM Research - India last year created voice recognition technology that automatically detects and muffles the most sensitive portions of recorded conversations, such as those between customer service representatives and clients. And several weeks ago, an IBM Researcher solved a longstanding cryptography challenge, demonstrating that encrypted information could be thoroughly analyzed, yet protected at the same time.

In the course of developing the MAGEN proof-of-concept, IBM applied for at least two U.S. patents, including one for unique ways of manipulating images, and one for scrambling words. MAGEN treats information on the screen as a picture, and relies on optical character-recognition technology to determine which onscreen fields need to be blanked out or replaced with random values. Unlike other solutions, MAGEN does not change the or the data itself -- it filters the information before it ever reaches the PC screen -- and does not force companies to create modified copies of electronic records where information is masked, scrambled, or eliminated.

This results in an extremely fast and flexible system. If companies had to create and store modified copies, the process would be relatively expensive and slow, as well as take up valuable electronic storage space. MAGEN's rules can also be easily modified as confidentiality regulations change, or for different types of users. The solution can be deployed in any environment where screen images are delivered -- no matter which operating system, application, or protocols are used.

When fully fleshed out, MAGEN will have very practical applications. For example, it might be used by a health insurance company that outsources customer service and claims processing functions to a third-party. Although private medical information in the patient records can't be shared with the contractors, customer service representatives need access to patient records. In these kinds of cases, MAGEN can hide private information so that it never appears on the agents' screens. Or, it can partially hide data, such as for the screens of call center customer service representatives, who only need enough identifying data to access, confirm or update an account.

"MAGEN's screen masking approach eliminates the need to painstakingly tailor 'data masking' solutions to specific environments," says Haim Nelken, Manager Integration Technologies at the IBM's Haifa, Israel Research Lab, where MAGEN was developed. "The bottom line is faster performance, simpler database security, and reduced costs for protecting sensitive data."

Source: IBM

Explore further: Tecnalia designs an app to help elderly people get around on public transport

add to favorites email to friend print save as pdf

Related Stories

IBM software safeguards consumer identity on the Web

Jan 26, 2007

IBM today announced software that allows people to hide or anonymize their personal information on the Web, ensuring protection from identity theft and other misuse. Developed by researchers at IBM's laboratory in Zurich, ...

Phishing Attacks in May Jumped More Than 200 Percent

Jun 30, 2005

The phishing season is officially open. Phishing – using fraudulent emails to try to dupe recipients into revealing personal or financial information -- reached its highest level in May, according to IBM. The month Global ...

IBM Research Unleashes Powerful Speech Software

Aug 18, 2008

(PhysOrg.com) -- IBM today announced the availability of state-of-the-art speech recognition software to clients and partners exploring the development of real-world consumer and business solutions.

Recommended for you

Google worker shows early-draft glimpse of Chrome OS

Jul 20, 2014

The Chrome OS is in for a future look. Athena, a Chromium OS project, will bring forth the new Chrome OS user experience. Google's François Beaufort on Friday, referring to the screenshot he posted, said," ...

Google eyes Chrome on Windows laptop battery drain

Jul 19, 2014

Google Chrome on Microsoft Windows has been said to have a problem for some time but this week comes news that Google will give it the attention others think the problem quite deserves. Namely, Google is to ...

Mental-health monitoring goes mobile

Jul 16, 2014

Behavioral health analytics startup Ginger.io sees smartphones as "automated diaries" containing valuable insight into the mental well-being of people with mental illnesses.

User comments : 0