| CPC G06F 9/541 (2013.01) [G06F 8/71 (2013.01); G06F 9/54 (2013.01); G06F 9/547 (2013.01); G06F 11/3608 (2013.01); G06F 11/3628 (2013.01); G06F 11/3636 (2013.01); G06F 16/2237 (2019.01); G06F 16/2264 (2019.01); G06F 16/2423 (2019.01); G06F 16/24568 (2019.01); G06F 16/248 (2019.01); G06F 16/254 (2019.01); G06F 16/258 (2019.01); G06F 16/283 (2019.01); G06F 16/285 (2019.01); G06F 16/288 (2019.01); G06F 16/335 (2019.01); G06F 16/90332 (2019.01); G06F 16/90335 (2019.01); G06F 16/9038 (2019.01); G06F 16/906 (2019.01); G06F 16/93 (2019.01); G06F 17/15 (2013.01); G06F 17/16 (2013.01); G06F 17/18 (2013.01); G06F 18/2115 (2023.01); G06F 18/213 (2023.01); G06F 18/214 (2023.01); G06F 18/2148 (2023.01); G06F 18/217 (2023.01); G06F 18/2193 (2023.01); G06F 18/22 (2023.01); G06F 18/23 (2023.01); G06F 18/24 (2023.01); G06F 18/2411 (2023.01); G06F 18/2415 (2023.01); G06F 18/285 (2023.01); G06F 18/40 (2023.01); G06F 21/552 (2013.01); G06F 21/60 (2013.01); G06F 21/6245 (2013.01); G06F 21/6254 (2013.01); G06F 30/20 (2020.01); G06F 40/117 (2020.01); G06F 40/166 (2020.01); G06F 40/20 (2020.01); G06N 3/04 (2013.01); G06N 3/044 (2023.01); G06N 3/045 (2023.01); G06N 3/06 (2013.01); G06N 3/08 (2013.01); G06N 3/088 (2013.01); G06N 3/094 (2023.01); G06N 5/00 (2013.01); G06N 5/02 (2013.01); G06N 5/04 (2013.01); G06N 7/00 (2013.01); G06N 7/01 (2023.01); G06N 20/00 (2019.01); G06Q 10/04 (2013.01); G06T 7/194 (2017.01); G06T 7/246 (2017.01); G06T 7/248 (2017.01); G06T 7/254 (2017.01); G06T 11/001 (2013.01); G06V 10/768 (2022.01); G06V 10/993 (2022.01); G06V 30/194 (2022.01); G06V 30/1985 (2022.01); H04L 63/1416 (2013.01); H04L 63/1491 (2013.01); H04L 67/306 (2013.01); H04L 67/34 (2013.01); H04N 21/23412 (2013.01); H04N 21/8153 (2013.01); G06T 2207/10016 (2013.01); G06T 2207/20081 (2013.01); G06T 2207/20084 (2013.01)] | 20 Claims |

|
1. A system for censoring text-based data comprising:
at least one processor;
at least one non-transitory memory storing application programming interface instructions that, when executed by the at least one processor cause the system to perform operations comprising:
receiving text-based data;
retrieving a target pattern type based on at least one security characteristic associated with a receiving party for the text-based data, wherein the target pattern type indicates data that is to be censored for parties associated with the at least one security characteristic;
retrieving, from a database, a token corresponding to a target data pattern corresponding to the target pattern type;
retrieving, from the database and using the token, context-based alternative user information for the target data pattern based on the at least one security characteristic, the context-based alternative user information corresponding to lower sensitivity information than the target data pattern, and the context-based alternative user information having a level of sensitivity in accordance with the at least one security characteristic;
censoring the text-based data by replacing target characters of the target data pattern with the context-based alternative user information; and
transmitting the censored text-based data to the receiving party.
|