Abstract: A system and a method for data masking at a mainframe application are provided. The method includes receiving a request to access a mainframe application from a user profile. A role assigned to the user-profile is fetched from a roles-repository. The role defines rights associated with the user-profile to access information from the mainframe application. Corresponding to the request, an access session is initiated based on the role. A screen is received corresponding to the access session. The screen includes a plurality of fields, where one or more fields of the plurality of fields includes sensitive data associated with the mainframe application. Contextual information associated with the plurality of fields is identified corresponding to the session. Rules indicative of the fields to be masked, are fetched corresponding to the screen based on the role. The fields are masked based on the rule and the contextual information associated with the fields.
DESC:As Attached ,CLAIMS:1. A computer-implemented method for dynamic masking data associated with a mainframe application hosted on a mainframe server, the method comprising:
receiving, at a hardware including one or more processors and one or more memory devices effecting a computing device, a request to access a mainframe application from a user profile, the user-profile associated with a user and comprising identity information of the user attempting to access the mainframe application, wherein an authentication status of the user profile is valid;
fetching, from a roles-repository, a role assigned to the user-profile, wherein the role associated with the user-profile defines one or more rights to access information from the mainframe application;
initiating, corresponding to the request, an access session with the mainframe server for accessing the mainframe application;
receiving, corresponding to the access session, a screen comprising a plurality of fields, wherein one or more field of the plurality of fields comprises sensitive data associated with the mainframe application;
identifying uniqueness in the screen corresponding to the session from the mainframe application, wherein identifying the uniqueness comprises determining contextual information associated with the plurality of fields of the screen;
fetching, from a rules repository stored in the one or more memories of the computing device, at least one rule corresponding to the screen based on the role, the at least one rule indicative of the one or more fields of the screen to be masked; and
masking the one or more fields of the screen based on the at least one rule and the contextual information associated with the one or more fields.
2. The method as claimed in claim 1, further comprising:
connecting with an external server, the external server comprising pre-stored user data having authentication status of a plurality of user-profiles to determine the authentication status of the user profile; and
generating the access session corresponding to the request upon determining the authentication status of the user profile to be valid.
3. The method as claimed in claim 1, further comprising configuring an intermediate representation information comprising the contextual information associated with context of the plurality of fields of the screen, the context comprising position and relationship between the plurality of fields.
4. The method as claimed in claim 3, wherein the intermediate representation information further comprises actual values of the one or more fields of the screen, and wherein the actual values of the one or more fields are masked at a display component of the computing device.
5. The method as claimed in claim 4, further comprising:
receiving a subsequent request to access the one or more fields, the subsequent request being a write request;
replacing the masked value with the actual values, the actual values being retrieved from the intermediate representation information;
sending the actual values to the mainframe server; and
allowing, in response to the subsequent request, an access the actual values associated with the one or more sensitive fields.
6. The method as claimed in claim 5, wherein the actual values are stored in form of key-value pairs, a key of a key-value pair comprising one of:
an identifier of a field to be masked, and
a function F(x) adapted to generate a unique key for the field based on a relative position to generate the key, the function adapted to generate the key based on the intermediate representation information.
7. The method as claimed in claim 1, further comprising logging user activity associated with the request and the subsequent request to access the mainframe application.
8. The method as claimed in claim 1, further comprising:
allocating a privacy budget to each user-profile of the plurality of user-profiles;
associating respective scores with the one or more fields of the mainframe application; and
deducting scores equal to the respective score from the privacy budget upon the access to the one or more fields.
9. The method as claimed in claim 1, wherein identifying the uniqueness in the screen comprises:
parsing data associated with the plurality of fields of the screen to form fragments of data to identify relationship between the plurality of fields; and
systematically storing the fragments of the data in a traversable structure, wherein systematically storing the fragments of the data facilitates in determining the contextual information and differentiate similar fields of the plurality of fields in the screen.
10. A computer-implemented system executed by a computing device for dynamic masking of data associated with a mainframe application hosted on a mainframe server, the system comprising:
one or more memories; and
one or more processors, the one or more memories coupled to the one or more processors, wherein the one or more processors are capable of executing programmed instructions stored in the one or more memories to:
receive a request to access a mainframe application from a user profile, the user-profile associated with a user and comprising identity information of the user attempting to access the mainframe application, wherein an authentication status of the user profile is valid;
fetch, from a roles-repository, a role assigned to the user-profile, wherein the role associated with the user-profile defines one or more rights to access information from the mainframe application;
initiate, corresponding to the request, an access session with the mainframe server for accessing the mainframe application;
receive, corresponding to the access session, a screen comprising a plurality of fields, wherein one or more field of the plurality of fields comprises sensitive data associated with the mainframe application;
identify uniqueness in the screen corresponding to the session from the mainframe application, wherein identifying the uniqueness comprises determining contextual information associated with the plurality of fields of the screen;
fetch, from a rules repository stored in the one or more memories of the computing device, at least one rule corresponding to the screen based on the role, the at least one rule indicative of the one or more fields of the screen to be masked; and
mask the one or more fields of the screen based on the at least one rule and the contextual information associated with the one or more fields.
11. The system as claimed in claim 10, said one or more processors are further configured by the instructions to:
connect with an external server, the external server comprising pre-stored user data having authentication status of a plurality of user-profiles to determine the authentication status of the user profile; and
generate the access session corresponding to the request upon determining the authentication status of the user profile to be valid.
12. The system as claimed in claim 10, wherein said one or more processors are further configured by the instructions to configure an intermediate representation information comprising the contextual information associated with context of the plurality of fields of the screen, the context comprising position and relationship between the plurality of fields.
13. The system as claimed in claim 12, wherein the intermediate representation information further comprises actual values of the one or more fields of the screen, and wherein the actual values of the one or more fields are masked at a display component of the computing device.
14. The system as claimed in claim 13, wherein said one or more processors are further configured by the instructions to:
receive a subsequent request to access the one or more fields, the subsequent request being a write request;
replace the masked value with the actual values, the actual values being retrieved from the intermediate representation information;
send the actual values to the mainframe server; and
allow, in response to the subsequent request, an access the actual values associated with the one or more sensitive fields.
15. The system as claimed in claim 14, wherein the actual values are stored in form of key-value pairs, a key of a key-value pair comprising one of:
an identifier of a field to be masked, and
a function F(x) adapted to generate a unique key for the field based on a relative position to generate the key, the function adapted to generated the key based on the intermediate representation information.
16. The system as claimed in claim 10, wherein said one or more processors are further configured by the instructions to log user activity associated with the request and the subsequent request to access the mainframe application.
17. The system as claimed in claim 10, wherein said one or more processors are further configured by the instructions to:
allocate a privacy budget to each user-profile of the plurality of user-profiles;
associate respective scores with the one or more fields of the mainframe application; and
deduct scores equal to the respective score from the privacy budget upon the access to the one or more fields.
18. The system as claimed in claim 10, wherein to identify the uniqueness in the screen, said one or more processors are further configured by the instructions to:
parse data associated with the plurality of fields of the screen to form fragments of data to identify relationship between the plurality of fields; and
systematically store the fragments of the data in a traversable structure, wherein systematically storing the fragments of the data facilitates in determining the
contextual information and differentiate similar fields of the plurality of fields in the screen.
| # | Name | Date |
|---|---|---|
| 1 | 829-MUM-2015-FORM-1-26-03-2015.pdf | 2015-03-26 |
| 2 | 829-MUM-2015-CORRESPONDENCE-26-03-2015.pdf | 2015-03-26 |
| 3 | REQUEST FOR CERTIFIED COPY [26-02-2016(online)].pdf | 2016-02-26 |
| 4 | OTHERS [09-03-2016(online)].pdf | 2016-03-09 |
| 5 | Drawing [09-03-2016(online)].pdf | 2016-03-09 |
| 6 | Description(Complete) [09-03-2016(online)].pdf | 2016-03-09 |
| 7 | Form 3 [14-10-2016(online)].pdf | 2016-10-14 |
| 8 | SPEC FOR FILING.pdf | 2018-08-11 |
| 9 | Request For Certified Copy-Online.pdf | 2018-08-11 |
| 10 | FORM 3.pdf | 2018-08-11 |
| 11 | FIGURES FOR FILING.pdf.pdf | 2018-08-11 |
| 12 | ABSTRACT1.JPG | 2018-08-11 |
| 13 | 829-MUM-2015-Power of Attorney-040615.pdf | 2018-08-11 |
| 14 | 829-MUM-2015-Correspondence-040615.pdf | 2018-08-11 |
| 15 | 829-MUM-2015-FER.pdf | 2020-02-24 |
| 16 | 829-MUM-2015-FORM 3 [30-07-2020(online)].pdf | 2020-07-30 |
| 17 | 829-MUM-2015-Information under section 8(2) [03-08-2020(online)].pdf | 2020-08-03 |
| 18 | 829-MUM-2015-OTHERS [24-08-2020(online)].pdf | 2020-08-24 |
| 19 | 829-MUM-2015-FER_SER_REPLY [24-08-2020(online)].pdf | 2020-08-24 |
| 20 | 829-MUM-2015-COMPLETE SPECIFICATION [24-08-2020(online)].pdf | 2020-08-24 |
| 21 | 829-MUM-2015-CLAIMS [24-08-2020(online)].pdf | 2020-08-24 |
| 22 | 829-MUM-2015-ABSTRACT [24-08-2020(online)].pdf | 2020-08-24 |
| 23 | 829-MUM-2015-PatentCertificate01-01-2024.pdf | 2024-01-01 |
| 24 | 829-MUM-2015-IntimationOfGrant01-01-2024.pdf | 2024-01-01 |
| 1 | search_strategy_21-02-2020.pdf |