Skip to main content

IBM Masking Technology Hides Data

IBM has developed server-side software that can actually selectively mask--in real time--certain portions of sensitive data without modifying the source file. Called Masking Gateway for Enterprises (MAGEN), the software borrows its name from the Hebrew word for "shield" or "protection" and runs alongside other server and client applications. IBM designed the software for end-users who need to share sensitive material externally or internally, but not necessarily every aspect.

According to CNET News, MAGEN uses optical character recognition to identify information on the screen--treating the information on-screen as if it were a screenshot--that has been previously identified as confidential. The software thus places a mask over the information that needs to remain unseen much like those blur spots masking logos and naked body parts on TV. The software does not process, change, or copy any of the data.

"MAGEN provides a common solution for all applications, regardless of their operating system and communication protocols," said Tamar Domany, project leader at IBM's Haifa lab, in a statement. "The solution is completely generic and can be used with any data, any application, and for different levels of authorization."

IBM said that existing software usually makes copies of the information with the confidential portions already masked. Rather than creating more data by way of copying, MAGEN can mask sensitive data on the fly, making it a more secure option. Additionally, MAGEN can easily adapt to changing parameters including new users, new privacy regulations and more.

"Using optical character recognition technology and predefined configurations enables us to provide masking without changing the client applications," Domany said.

Currently MAGEN is at the proof-of-concept stage, however IBM has filed for patents on two aspects of the technology: its unique way to manipulate images and its function as a word scrambling system.

  • nekatreven
    So...I guess they build it into the display device? Or it is placed over the display device like a glare filter?

    Sounds promising if it can keep up. i.e. I wonder if just scrolling really fast and hitting print screen a bunch would get you what you wanted...
    Reply
  • yao
    nekatreven I wonder if just scrolling really fast and hitting print screen a bunch would get you what you wanted...I thought the same. I don't think it really works. there are easily many ways to bypass that.
    Reply
  • mrubermonkey
    This is getting sent to China ASAP after IBM get done with it. In fact, they probably have it on pre-order.
    Reply
  • dravis12
    nekatrevenSo...I guess they build it into the display device? Or it is placed over the display device like a glare filter?
    Its software, not a physical filter. It must process the image before it is sent to the monitor, thus I doubt print screen would be any help.
    Reply
  • B-Unit
    Its server side, the sensitive info gets blocked long before it makes it to the local machine.
    Reply
  • eyemaster
    Of course, when it comes out, people will be trying, capturing and posting screen shots of what the software missed and then posting them on Failblog or something... ;)
    Reply
  • ethanolson
    Did they build in a meta-tag set that can allow a user who is privy to the information to mask lines manually, thus ensuring this document has security guarenteed and not inferred? Maybe have some AI coded so such a function can help the system self-improve.

    This software might allow companies to compromise while streamlining their networks and just have everything in the public domain. Sounds like a great temptation for hackers.
    Reply