Systems and methods for facilitating editing of a confidential document by a non-privileged person by stripping away content and meaning from the document without human intervention such that only structural and/or grammatical information of the document are conveyed to the non-privileged person

ABSTRACT

Systems and methods for facilitating editing of a confidential document by a non-privileged person by stripping away content and meaning from the document without human intervention such that only structural and/or grammatical information of the document are conveyed to the non-privileged person are disclosed. Exemplary implementations may: receive an electronic document including text conveying one or more confidential concepts; provide a content-stripped version of the electronic document to a human editor; receive an edited content-stripped version of the electronic document; and provide an edited electronic document based on the edited content-stripped version such that human-editor-provided changes were effectuated without the human editor ever being exposed to the content and meaning contained in the electronic document.

FIELD OF THE DISCLOSURE

The present disclosure relates to systems and methods for facilitatingediting of a confidential document by a non-privileged person bystripping away content and meaning from the document without humanintervention such that only structural and/or grammatical information ofthe document are conveyed to the non-privileged person.

BACKGROUND

In certain fields, such as legal, financial, and medical, there is oftenan obligation or duty to maintain confidentiality. This confidentialityrequirement can limit how third parties aid professionals working inthese areas. For example, a legal professional may be unable to seekassistance from a non-privileged third party with preparing a documentthat contains confidential client information.

SUMMARY

One aspect of the present disclosure relates to a system configured forfacilitating review of a confidential document by a non-privilegedperson by stripping away content and meaning from the document withouthuman intervention such that only structural and/or grammaticalinformation of the document are conveyed to the non-privileged person.The system may include one or more hardware processors configured bymachine-readable instructions. The processor(s) may be configured toreceive, at a processor, an electronic document including text conveyingconfidential information. The text may include a plurality of wordsincluding a first word. The processor(s) may be configured to tokenizethe text of the electric document by breaking up a stream of the textinto tokens, a given token being a word or a punctuation. Theprocessor(s) may be configured to determine whether individual words arecontent words, a given content word having a substantive meaning. Theprocessor(s) may be configured to determine whether individual words arefunction words, a given function word lacking substantive meaning andinstead denoting grammatical relationships between content words. Theprocessor(s) may be configured to, responsive to a determination thatthe first word is a function word, leave the first word intact. Theprocessor(s) may be configured to, responsive to a determination thatthe first word is a content word, substitute the first word with asymbol such that a meaning of the first word cannot be obtained from thesymbol.

Another aspect of the present disclosure relates to a method forfacilitating review of a confidential document by a non-privilegedperson by stripping away content and meaning from the document withouthuman intervention such that only structural and/or grammaticalinformation of the document are conveyed to the non-privileged person.The method may include receiving, at a processor, an electronic documentincluding text conveying confidential information. The text may includea plurality of words including a first word. The method may includetokenizing the text of the electric document by breaking up a stream ofthe text into tokens, a given token being a word or a punctuation. Themethod may include determining whether individual words are contentwords, a given content word having a substantive meaning. The method mayinclude determining whether individual words are function words, a givenfunction word lacking substantive meaning and instead denotinggrammatical relationships between content words. The method may include,responsive to a determination that the first word is a function word,leaving the first word intact. The method may include, responsive to adetermination that the first word is a content word, substituting thefirst word with a symbol such that a meaning of the first word cannot beobtained from the symbol.

Yet another aspect of the present disclosure relates to a systemconfigured for facilitating editing of a confidential document by anon-privileged person by stripping away content and meaning from thedocument without human intervention such that only structural and/orgrammatical information of the document are conveyed to thenon-privileged person. The system may include one or more hardwareprocessors configured by machine-readable instructions. The processor(s)may be configured to receive an electronic document including textconveying one or more confidential concepts. The text may include aplurality of words including a first word. The processor(s) may beconfigured to tokenize the text of the electronic document by breakingup a stream of the text into tokens, a given token being a word, aphrase, a symbol, or a punctuation. The processor(s) may be configuredto determine whether individual words are content words, a given contentword having a substantive meaning. The processor(s) may be configured todetermine whether individual words are function words, a given functionword lacking substantive meaning and instead denoting grammaticalrelationships between content words. The processor(s) may be configuredto determine whether individual words are nonce words, a given nonceword facially suggesting structure but, in fact, describing function.The processor(s) may be configured to, responsive to a determinationthat the first word is a function word, leave the first word intact. Theprocessor(s) may be configured to, responsive to a determination thatthe first word is a nonce word, leave the first word intact. Theprocessor(s) may be configured to, responsive to a determination thatthe first word is a content word, substitute the first word with asymbol such that a meaning of the first word cannot be obtained from thesymbol. The processor(s) may be configured to provide a content-strippedversion of the electronic document to a human editor. Thecontent-stripped version may include symbols substituted for contentwords such that content and meaning is stripped away from the document.The content and meaning may be stripped away without human interventionsuch that only structural and/or grammatical information of the documentare conveyed to the human editor. The processor(s) may be configured toreceive an edited content-stripped version of the electronic document.The edited version may include changes to the content-stripped versionmade by the human editor. The processor(s) may be configured to providean edited electronic document based on the edited content-strippedversion such that human-editor-provided changes were effectuated withoutthe human editor ever being exposed to the content and meaning containedin the electronic document.

Still another aspect of the present disclosure relates to a method forfacilitating editing of a confidential document by a non-privilegedperson by stripping away content and meaning from the document withouthuman intervention such that only structural and/or grammaticalinformation of the document are conveyed to the non-privileged person.The method may include receiving an electronic document including textconveying one or more confidential concepts. The text may include aplurality of words including a first word. The method may includetokenizing the text of the electronic document by breaking up a streamof the text into tokens, a given token being a word, a phrase, a symbol,or a punctuation. The method may include determining whether individualwords are content words, a given content word having a substantivemeaning. The method may include determining whether individual words arefunction words, a given function word lacking substantive meaning andinstead denoting grammatical relationships between content words. Themethod may include determining whether individual words are nonce words,a given nonce word facially suggesting structure but, in fact,describing function. The method may include, responsive to adetermination that the first word is a function word, leaving the firstword intact. The method may include, responsive to a determination thatthe first word is a nonce word, leaving the first word intact. Themethod may include, responsive to a determination that the first word isa content word, substituting the first word with a symbol such that ameaning of the first word cannot be obtained from the symbol. The methodmay include providing a content-stripped version of the electronicdocument to a human editor. The content-stripped version may includesymbols substituted for content words such that content and meaning isstripped away from the document. The content and meaning may be strippedaway without human intervention such that only structural and/orgrammatical information of the document are conveyed to the humaneditor. The method may include receiving an edited content-strippedversion of the electronic document. The edited version may includechanges to the content-stripped version made by the human editor. Themethod may include providing an edited electronic document based on theedited content-stripped version such that human-editor-provided changeswere effectuated without the human editor ever being exposed to thecontent and meaning contained in the electronic document.

Even another aspect of the present disclosure relates to a non-transientcomputer-readable storage medium having instructions embodied thereon,the instructions being executable by one or more processors to perform amethod for facilitating editing of a confidential document by anon-privileged person by stripping away content and meaning from thedocument without human intervention such that only structural and/orgrammatical information of the document are conveyed to thenon-privileged person. The method may include receiving an electronicdocument including text conveying one or more confidential concepts. Thetext may include a plurality of words including a first word. The methodmay include tokenizing the text of the electronic document by breakingup a stream of the text into tokens, a given token being a word, aphrase, a symbol, or a punctuation. The method may include determiningwhether individual words are content words, a given content word havinga substantive meaning. The method may include determining whetherindividual words are function words, a given function word lackingsubstantive meaning and instead denoting grammatical relationshipsbetween content words. The method may include determining whetherindividual words are nonce words, a given nonce word facially suggestingstructure but, in fact, describing function. The method may include,responsive to a determination that the first word is a function word,leaving the first word intact. The method may include, responsive to adetermination that the first word is a nonce word, leaving the firstword intact. The method may include, responsive to a determination thatthe first word is a content word, substituting the first word with asymbol such that a meaning of the first word cannot be obtained from thesymbol. The method may include providing a content-stripped version ofthe electronic document to a human editor. The content-stripped versionmay include symbols substituted for content words such that content andmeaning is stripped away from the document. The content and meaning maybe stripped away without human intervention such that only structuraland/or grammatical information of the document are conveyed to the humaneditor. The method may include receiving an edited content-strippedversion of the electronic document. The edited version may includechanges to the content-stripped version made by the human editor. Themethod may include providing an edited electronic document based on theedited content-stripped version such that human-editor-provided changeswere effectuated without the human editor ever being exposed to thecontent and meaning contained in the electronic document.

These and other features, and characteristics of the present technology,as well as the methods of operation and functions of the relatedelements of structure and the combination of parts and economies ofmanufacture, will become more apparent upon consideration of thefollowing description and the appended claims with reference to theaccompanying drawings, all of which form a part of this specification,wherein like reference numerals designate corresponding parts in thevarious figures. It is to be expressly understood, however, that thedrawings are for the purpose of illustration and description only andare not intended as a definition of the limits of the invention. As usedin the specification and in the claims, the singular form of “a”, “an”,and “the” include plural referents unless the context clearly dictatesotherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system configured for facilitating review of aconfidential document by a non-privileged person by stripping awaycontent and meaning from the document without human intervention suchthat only structural and/or grammatical information of the document areconveyed to the non-privileged person, in accordance with one or moreimplementations.

FIG. 2 illustrates a method for facilitating review of a confidentialdocument by a non-privileged person by stripping away content andmeaning from the document without human intervention such that onlystructural and/or grammatical information of the document are conveyedto the non-privileged person, in accordance with one or moreimplementations.

FIG. 3 illustrates a system configured for facilitating editing of aconfidential document by a non-privileged person by stripping awaycontent and meaning from the document without human intervention suchthat only structural and/or grammatical information of the document areconveyed to the non-privileged person, in accordance with one or moreimplementations.

FIG. 4 illustrates a method for facilitating editing of a confidentialdocument by a non-privileged person by stripping away content andmeaning from the document without human intervention such that onlystructural and/or grammatical information of the document are conveyedto the non-privileged person, in accordance with one or moreimplementations.

DETAILED DESCRIPTION

FIG. 1 illustrates a system 100 configured for facilitating review of aconfidential document by a non-privileged person by stripping awaycontent and meaning from the document without human intervention suchthat only structural and/or grammatical information of the document areconveyed to the non-privileged person, in accordance with one or moreimplementations. Obscured content-stripped versions of confidentialdocuments may be used to analyze document structures, word forms, and/orother aspects of the underlying confidential documents.

In some implementations, system 100 may include one or more servers 102.Server(s) 102 may be configured to communicate with one or more clientcomputing platforms 104 according to a client/server architecture and/orother architectures. Client computing platform(s) 104 may be configuredto communicate with other client computing platforms via server(s) 102and/or according to a peer-to-peer architecture and/or otherarchitectures. Users may access system 100 via client computingplatform(s) 104.

Server(s) 102 may be configured by machine-readable instructions 106.Machine-readable instructions 106 may include one or more instructionmodules. The instruction modules may include computer program modules.The instruction modules may include one or more of a document receivingmodule 108, a text tokenizing module 110, a word determination module112, a word preservation module 114, a word substitution module 116, adocument decrypting module 118, and/or other instruction modules.

Document receiving module 108 may be configured to receive, at aprocessor, an electronic document including text conveying confidentialinformation. The confidential information may be inaccessible to anynon-privileged persons. A given non-privileged person may be a personwho is not affiliated in a confidential relation underlying theconfidentiality of the information conveyed by the electronic document.By way of non-limiting example, the confidential relation may include anattorney and client, a husband and wife, a physician and patient, or amaster and servant. The electronic document may be password protected.The electronic document may be encrypted. The text may include aplurality of words including a first word.

Text tokenizing module 110 may be configured to tokenize the text of theelectric document by breaking up a stream of the text into tokens. Agiven token may be a word or a punctuation.

Word determination module 112 may be configured to determine whetherindividual words are content words. A given content word may have asubstantive meaning. Determining whether the first word may have asubstantive meaning includes determining a part of speech of the firstword. By way of non-limiting example, the content words may includenouns, verbs, adjectives, and some adverbs. The part of speech of thefirst word may be determined based on a parse of a portion of the text.Determining whether the first word may have a substantive meaningincludes determining whether the first word is not a function word andnot a nonce word.

Word determination module 112 may be configured to determine whetherindividual words are function words. A given function word may lacksubstantive meaning and instead denote grammatical relationships betweencontent words. In some implementations, by way of non-limiting example,a given function word may include pronouns, conjunctions, prepositions,auxiliary verbs, and some adverbs. Determining whether the first wordmay be a function word may include determining whether the first word isincluded in a discrete list of function words.

Word determination module 112 may be configured to determine whetherindividual words are nonce words. A given nonce word may faciallysuggest structure but, in fact, describes function. In someimplementations, by way of non-limiting example, a given nonce word mayinclude mechanism, element, device, module, component, means, processor,unit, member, apparatus, machine, system, appliance, base, body,configuration, container, enclosure, function, housing, medium,platform, receptacle, or claim. Determining whether the first word is anonce word may include determining whether the first word is included ina discrete list of nonce words. The discrete list of nonce words may berelated to a specific domain.

Word preservation module 114 may be configured to, responsive to adetermination that the first word is a function word, leave the firstword intact.

Word preservation module 114 may be configured to, responsive to adetermination that the first word is a nonce word, leave the first wordintact.

Word substitution module 116 may be configured to, responsive to adetermination that the first word is a content word, substitute thefirst word with a symbol such that a meaning of the first word cannot beobtained from the symbol. Some or all content words in the text may besubstituted with different corresponding symbols.

In some implementations, the symbol may be alphanumeric. In someimplementations, the symbol may include one or more non-alphanumericcharacters. In some implementations, by way of non-limiting example, agiven non-alphanumeric character may include a dash, an underscore, anasterisk, or an ampersand. In some implementations, the symbol mayinclude a numeric portion. In some implementations, the numeric portionof the symbol may be a random number. A first character of the symbolmay be the same as a first character of the first word. A last characterof the symbol may be the same as a last character of the first word. Asuffix of the symbol may be the same as a suffix of the first word. Thesymbol may convey a part of speech of the first word. The part of speechmay be conveyed by a Penn treebank constituent tag. The symbol mayconvey a length of the first word. The symbol may be the same length asthe first word. The symbol may be substituted for every instance of thefirst word in the text. The correlation between the symbol and the firstword may be unique to the electric document such that instances of thefirst word in other electronic documents have different correspondingsymbols. The numeric portion of the symbol may be determined based on anorder of appearance of the first word in the text.

According to some implementations, after its content is stripped, thefollowing paragraph:

-   -   The present disclosure relates to systems and methods for        facilitating review of a confidential document by a        non-privileged person by stripping away content and meaning from        the document without human intervention such that only        structural and/or grammatical information of the document are        conveyed to the non-privileged person may look something like        this:    -   the p0018 d0017 r0019s to systems and methods for f0000ing r0001        of a c0002 d0003 by a n0004 p0005 by s0006ing a0007 c0008 and        m0009 from the d0003 without h0010 i0011 such that only s0012        and/or g0013 i0014 of the d0003 are c0015ed to the n0004 p0005.

Document decrypting module 118 may be configured to decrypt the documentwithout human intervention.

In some implementations, server(s) 102, client computing platform(s)104, and/or external resources 120 may be operatively linked via one ormore electronic communication links. For example, such electroniccommunication links may be established, at least in part, via a networksuch as the Internet and/or other networks. It will be appreciated thatthis is not intended to be limiting, and that the scope of thisdisclosure includes implementations in which server(s) 102, clientcomputing platform(s) 104, and/or external resources 120 may beoperatively linked via some other communication media.

A given client computing platform 104 may include one or more processorsconfigured to execute computer program modules. The computer programmodules may be configured to enable an expert or user associated withthe given client computing platform 104 to interface with system 100and/or external resources 120, and/or provide other functionalityattributed herein to client computing platform(s) 104. By way ofnon-limiting example, the given client computing platform 104 mayinclude one or more of a desktop computer, a laptop computer, a handheldcomputer, a tablet computing platform, a NetBook, a Smartphone, a gamingconsole, and/or other computing platforms.

External resources 120 may include sources of information outside ofsystem 100, external entities participating with system 100, and/orother resources. In some implementations, some or all of thefunctionality attributed herein to external resources 120 may beprovided by resources included in system 100.

Server(s) 102 may include electronic storage 122, one or more processors124, and/or other components. Server(s) 102 may include communicationlines, or ports to enable the exchange of information with a networkand/or other computing platforms. Illustration of server(s) 102 in FIG.1 is not intended to be limiting. Server(s) 102 may include a pluralityof hardware, software, and/or firmware components operating together toprovide the functionality attributed herein to server(s) 102. Forexample, server(s) 102 may be implemented by a cloud of computingplatforms operating together as server(s) 102.

Electronic storage 122 may comprise non-transitory storage media thatelectronically stores information. The electronic storage media ofelectronic storage 122 may include one or both of system storage that isprovided integrally (i.e., substantially non-removable) with server(s)102 and/or removable storage that is removably connectable to server(s)102 via, for example, a port (e.g., a USB port, a firewire port, etc.)or a drive (e.g., a disk drive, etc.). Electronic storage 122 mayinclude one or more of optically readable storage media (e.g., opticaldisks, etc.), magnetically readable storage media (e.g., magnetic tape,magnetic hard drive, floppy drive, etc.), electrical charge-basedstorage media (e.g., EEPROM, RAM, etc.), solid-state storage media(e.g., flash drive, etc.), and/or other electronically readable storagemedia. Electronic storage 122 may include one or more virtual storageresources (e.g., cloud storage, a virtual private network, and/or othervirtual storage resources). Electronic storage 122 may store softwarealgorithms, information determined by processor(s) 124, informationreceived from server(s) 102, information received from client computingplatform(s) 104, and/or other information that enables server(s) 102 tofunction as described herein.

Processor(s) 124 may be configured to provide information processingcapabilities in server(s) 102. As such, processor(s) 124 may include oneor more of a digital processor, an analog processor, a digital circuitdesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information. Although processor(s) 124 is shown in FIG. 1 asa single entity, this is for illustrative purposes only. In someimplementations, processor(s) 124 may include a plurality of processingunits. These processing units may be physically located within the samedevice, or processor(s) 124 may represent processing functionality of aplurality of devices operating in coordination. Processor(s) 124 may beconfigured to execute modules 108, 110, 112, 114, 116, 118, and/or othermodules. Processor(s) 124 may be configured to execute modules 108, 110,112, 114, 116, 118, and/or other modules by software; hardware;firmware; some combination of software, hardware, and/or firmware;and/or other mechanisms for configuring processing capabilities onprocessor(s) 124. As used herein, the term “module” may refer to anycomponent or set of components that perform the functionality attributedto the module. This may include one or more physical processors duringexecution of processor readable instructions, the processor readableinstructions, circuitry, hardware, storage media, or any othercomponents.

It should be appreciated that although modules 108, 110, 112, 114, 116,and 118 are illustrated in FIG. 1 as being implemented within a singleprocessing unit, in implementations in which processor(s) 124 includesmultiple processing units, one or more of modules 108, 110, 112, 114,116, and/or 118 may be implemented remotely from the other modules. Thedescription of the functionality provided by the different modules 108,110, 112, 114, 116, and/or 118 described below is for illustrativepurposes, and is not intended to be limiting, as any of modules 108,110, 112, 114, 116, and/or 118 may provide more or less functionalitythan is described. For example, one or more of modules 108, 110, 112,114, 116, and/or 118 may be eliminated, and some or all of itsfunctionality may be provided by other ones of modules 108, 110, 112,114, 116, and/or 118. As another example, processor(s) 124 may beconfigured to execute one or more additional modules that may performsome or all of the functionality attributed below to one of modules 108,110, 112, 114, 116, and/or 118.

FIG. 2 illustrates a method 200 for facilitating review of aconfidential document by a non-privileged person by stripping awaycontent and meaning from the document without human intervention suchthat only structural and/or grammatical information of the document areconveyed to the non-privileged person, in accordance with one or moreimplementations. The operations of method 200 presented below areintended to be illustrative. In some implementations, method 200 may beaccomplished with one or more additional operations not described,and/or without one or more of the operations discussed. Additionally,the order in which the operations of method 200 are illustrated in FIG.2 and described below is not intended to be limiting.

In some implementations, method 200 may be implemented in one or moreprocessing devices (e.g., a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 200 in response to instructions storedelectronically on an electronic storage medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of method 200.

An operation 202 may include receiving, at a processor, an electronicdocument including text conveying confidential information. The text mayinclude a plurality of words including a first word. Operation 202 maybe performed by one or more hardware processors configured bymachine-readable instructions including a module that is the same as orsimilar to document receiving module 108, in accordance with one or moreimplementations.

An operation 204 may include tokenizing the text of the electricdocument by breaking up a stream of the text into tokens, a given tokenbeing a word or a punctuation. Operation 204 may be performed by one ormore hardware processors configured by machine-readable instructionsincluding a module that is the same as or similar to text tokenizingmodule 110, in accordance with one or more implementations.

An operation 206 may include determining whether individual words arecontent words, a given content word having a substantive meaning.Operation 206 may be performed by one or more hardware processorsconfigured by machine-readable instructions including a module that isthe same as or similar to word determination module 112, in accordancewith one or more implementations.

An operation 208 may include determining whether individual words arefunction words, a given function word lacking substantive meaning andinstead denoting grammatical relationships between content words.Operation 208 may be performed by one or more hardware processorsconfigured by machine-readable instructions including a module that isthe same as or similar to word determination module 112, in accordancewith one or more implementations.

An operation 210 may include, responsive to a determination that thefirst word is a function word, leaving the first word intact. Operation210 may be performed by one or more hardware processors configured bymachine-readable instructions including a module that is the same as orsimilar to word preservation module 114, in accordance with one or moreimplementations.

An operation 212 may include, responsive to a determination that thefirst word is a content word, substituting the first word with a symbolsuch that a meaning of the first word cannot be obtained from thesymbol. Operation 212 may be performed by one or more hardwareprocessors configured by machine-readable instructions including amodule that is the same as or similar to word substitution module 116,in accordance with one or more implementations.

FIG. 3 illustrates a system 300 configured for facilitating editing of aconfidential document by a non-privileged person by stripping awaycontent and meaning from the document without human intervention suchthat only structural and/or grammatical information of the document areconveyed to the non-privileged person, in accordance with one or moreimplementations. In some implementations, system 300 may include one ormore servers 302. Server(s) 302 may be configured to communicate withone or more client computing platforms 304 according to a client/serverarchitecture and/or other architectures. Client computing platform(s)304 may be configured to communicate with other client computingplatforms via server(s) 302 and/or according to a peer-to-peerarchitecture and/or other architectures. Users may access system 300 viaclient computing platform(s) 304.

Server(s) 302 may be configured by machine-readable instructions 306.Machine-readable instructions 306 may include one or more instructionmodules. The instruction modules may include computer program modules.The instruction modules may include one or more of a document receivingmodule 308, a text tokenizing module 310, a word determination module312, a word departure module 314, a word substitution module 316, aversion providing module 318, a version receiving module 320, a documentproviding module 322, and/or other instruction modules.

Document receiving module 308 may be configured to receive an electronicdocument including text conveying one or more confidential concepts. Theelectronic document may be password protected. All content words in thetext may be substituted with different corresponding symbols. The textmay include a plurality of words including a first word. Determiningwhether the first word may have a substantive meaning includesdetermining a part of speech of the first word.

Determining the part of speech of the first word may be based on a parseof a portion of the text. Determining whether the first word may have asubstantive meaning includes determining whether the first word is not afunction word and not a nonce word. Determining whether the first wordmay be a function word includes determining whether the first word isincluded in a discrete list of function words. Determining whether thefirst word may be a nonce word includes determining whether the firstword is included in a discrete list of nonce words.

Text tokenizing module 310 may be configured to tokenize the text of theelectronic document by breaking up a stream of the text into tokens, agiven token being a word, a phrase, a symbol, or a punctuation. Thesymbol may be alphanumeric. A first character of the symbol may be thesame as a first character of the first word. A last character of thesymbol may be the same as a last character of the first word. A suffixof the symbol may be the same as a suffix of the first word.

The symbol may convey a part of speech of the first word. The symbol mayinclude a Penn treebank constituent tag. The symbol may convey a lengthof the first word. The symbol may be the same length as the first word.The symbol may be substituted for every instance of the first word inthe text. The correlation between the symbol and the first word may beunique to the electronic document such that instances of the first wordin other electronic documents have different corresponding symbols.

The symbol may include a numeric portion. The numeric portion of thesymbol may be determined based on an order of appearance of the firstword in the text. The numeric portion of the symbol may be a randomnumber.

Word determination module 312 may be configured to determine whetherindividual words are content words, a given content word having asubstantive meaning.

Word determination module 312 may be configured to determine whetherindividual words are function words, a given function word lackingsubstantive meaning and instead denoting grammatical relationshipsbetween content words.

Word determination module 312 may be configured to determine whetherindividual words are nonce words, a given nonce word facially suggestingstructure but, in fact, describing function.

Word departure module 314 may be configured to, responsive to adetermination that the first word is a function word, leave the firstword intact.

Word departure module 314 may be configured to, responsive to adetermination that the first word is a nonce word, leave the first wordintact.

Word substitution module 316 may be configured to, responsive to adetermination that the first word is a content word, substitute thefirst word with a symbol such that a meaning of the first word cannot beobtained from the symbol.

Version providing module 318 may be configured to provide acontent-stripped version of the electronic document to a human editor.The human editor may be replaced by a computer-based artificial editor.The content-stripped version may include symbols substituted for contentwords such that content and meaning is stripped away from the document.The content and meaning may be stripped away without human interventionsuch that only structural and/or grammatical information of the documentare conveyed to the human editor.

Version receiving module 320 may be configured to receive an editedcontent-stripped version of the electronic document. The edited versionmay include changes to the content-stripped version made by the humaneditor. By way of non-limiting example, the changes may include one ormore of a deletion of text, an insertion of text, a modification oftext, a deletion of a word, an insertion of a word, a modification of aword, a deletion of a punctuation mark, an insertion of a punctuation, amodification of a punctuation, transposition of two words, insertion ordeletion of non-printable characters, modification of font or size,modification of textual features, modification of patent claimnumbering, modification of patent claim reference numbering, and/orother changes. By way of non-limiting example, the non-printablecharacters may include one or more of a line break, a page break, ahorizontal tab, a vertical tab, a soft hyphen, a null character, acarriage return, and/or other non-printable characters. By way ofnon-limiting example, the textual features may include one or more ofbold, italic, superscript, subscript, and/or other textual features.

The changes may include deletion of hidden characters in Microsoft Word.The changes may be tracked using a track-changes feature of a wordprocessing document. The word processing document may include aMicrosoft Word document.

Document providing module 322 may be configured to provide an editedelectronic document based on the edited content-stripped version suchthat human-editor-provided changes were effectuated without the humaneditor ever being exposed to the content and meaning contained in theelectronic document. Providing the edited electronic document mayinclude making changes to the electronic document based on the changesincluded in the edited content-stripped version of the electronicdocument. Providing the edited electronic document may include stringdifference skipping over the words and symbols in the unedited versionor the edited content-stripped version of the electronic document.Providing the edited electronic document may include based ontracked-changes in the edited content-stripped version of the electronicdocument. Providing the edited electronic document may includetemporarily storing, in memory, the content words and correspondingsymbols such that the symbols in the edited content-stripped version canbe replaced with the corresponding content words to provide the editedelectronic document.

In some implementations, by way of non-limiting example, a given contentword may include nouns, verbs, adjectives and some adverbs. In someimplementations, by way of non-limiting example, a given function wordmay include pronouns, conjunctions, prepositions, auxiliary verbs, andsome adverbs. In some implementations, by way of non-limiting example, agiven nonce word may include mechanism, element, device, module,component, means, processor, unit, member, apparatus, machine, system,appliance, base, body, configuration, container, enclosure, function,housing, medium, platform, receptacle, or claim.

In some implementations, server(s) 302, client computing platform(s)304, and/or external resources 324 may be operatively linked via one ormore electronic communication links. For example, such electroniccommunication links may be established, at least in part, via a networksuch as the Internet and/or other networks. It will be appreciated thatthis is not intended to be limiting, and that the scope of thisdisclosure includes implementations in which server(s) 302, clientcomputing platform(s) 304, and/or external resources 324 may beoperatively linked via some other communication media.

A given client computing platform 304 may include one or more processorsconfigured to execute computer program modules. The computer programmodules may be configured to enable an expert or user associated withthe given client computing platform 304 to interface with system 300and/or external resources 324, and/or provide other functionalityattributed herein to client computing platform(s) 304. By way ofnon-limiting example, the given client computing platform 304 mayinclude one or more of a desktop computer, a laptop computer, a handheldcomputer, a tablet computing platform, a NetBook, a Smartphone, a gamingconsole, and/or other computing platforms.

External resources 324 may include sources of information outside ofsystem 300, external entities participating with system 300, and/orother resources. In some implementations, some or all of thefunctionality attributed herein to external resources 324 may beprovided by resources included in system 300.

Server(s) 302 may include electronic storage 326, one or more processors328, and/or other components. Server(s) 302 may include communicationlines, or ports to enable the exchange of information with a networkand/or other computing platforms. Illustration of server(s) 302 in FIG.3 is not intended to be limiting. Server(s) 302 may include a pluralityof hardware, software, and/or firmware components operating together toprovide the functionality attributed herein to server(s) 302. Forexample, server(s) 302 may be implemented by a cloud of computingplatforms operating together as server(s) 302.

Electronic storage 326 may comprise non-transitory storage media thatelectronically stores information. The electronic storage media ofelectronic storage 326 may include one or both of system storage that isprovided integrally (i.e., substantially non-removable) with server(s)302 and/or removable storage that is removably connectable to server(s)302 via, for example, a port (e.g., a USB port, a firewire port, etc.)or a drive (e.g., a disk drive, etc.). Electronic storage 326 mayinclude one or more of optically readable storage media (e.g., opticaldisks, etc.), magnetically readable storage media (e.g., magnetic tape,magnetic hard drive, floppy drive, etc.), electrical charge-basedstorage media (e.g., EEPROM, RAM, etc.), solid-state storage media(e.g., flash drive, etc.), and/or other electronically readable storagemedia. Electronic storage 326 may include one or more virtual storageresources (e.g., cloud storage, a virtual private network, and/or othervirtual storage resources). Electronic storage 326 may store softwarealgorithms, information determined by processor(s) 328, informationreceived from server(s) 302, information received from client computingplatform(s) 304, and/or other information that enables server(s) 302 tofunction as described herein.

Processor(s) 328 may be configured to provide information processingcapabilities in server(s) 302. As such, processor(s) 328 may include oneor more of a digital processor, an analog processor, a digital circuitdesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information. Although processor(s) 328 is shown in FIG. 3 asa single entity, this is for illustrative purposes only. In someimplementations, processor(s) 328 may include a plurality of processingunits. These processing units may be physically located within the samedevice, or processor(s) 328 may represent processing functionality of aplurality of devices operating in coordination. Processor(s) 328 may beconfigured to execute modules 308, 310, 312, 314, 316, 318, 320, 322,and/or other modules. Processor(s) 328 may be configured to executemodules 308, 310, 312, 314, 316, 318, 320, 322, and/or other modules bysoftware; hardware; firmware; some combination of software, hardware,and/or firmware; and/or other mechanisms for configuring processingcapabilities on processor(s) 328. As used herein, the term “module” mayrefer to any component or set of components that perform thefunctionality attributed to the module. This may include one or morephysical processors during execution of processor readable instructions,the processor readable instructions, circuitry, hardware, storage media,or any other components.

It should be appreciated that although modules 308, 310, 312, 314, 316,318, 320, and 322 are illustrated in FIG. 3 as being implemented withina single processing unit, in implementations in which processor(s) 328includes multiple processing units, one or more of modules 308, 310,312, 314, 316, 318, 320, and/or 322 may be implemented remotely from theother modules. The description of the functionality provided by thedifferent modules 308, 310, 312, 314, 316, 318, 320, and/or 322described below is for illustrative purposes, and is not intended to belimiting, as any of modules 308, 310, 312, 314, 316, 318, 320, and/or322 may provide more or less functionality than is described. Forexample, one or more of modules 308, 310, 312, 314, 316, 318, 320,and/or 322 may be eliminated, and some or all of its functionality maybe provided by other ones of modules 308, 310, 312, 314, 316, 318, 320,and/or 322. As another example, processor(s) 328 may be configured toexecute one or more additional modules that may perform some or all ofthe functionality attributed below to one of modules 308, 310, 312, 314,316, 318, 320, and/or 322.

FIG. 4 illustrates a method 400 for facilitating editing of aconfidential document by a non-privileged person by stripping awaycontent and meaning from the document without human intervention suchthat only structural and/or grammatical information of the document areconveyed to the non-privileged person, in accordance with one or moreimplementations. The operations of method 400 presented below areintended to be illustrative. In some implementations, method 400 may beaccomplished with one or more additional operations not described,and/or without one or more of the operations discussed. Additionally,the order in which the operations of method 400 are illustrated in FIG.4 and described below is not intended to be limiting.

In some implementations, method 400 may be implemented in one or moreprocessing devices (e.g., a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 400 in response to instructions storedelectronically on an electronic storage medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of method 400.

An operation 402 may include receiving an electronic document includingtext conveying one or more confidential concepts. The text may include aplurality of words including a first word. Operation 402 may beperformed by one or more hardware processors configured bymachine-readable instructions including a module that is the same as orsimilar to document receiving module 308, in accordance with one or moreimplementations.

An operation 404 may include providing a content-stripped version of theelectronic document to a human editor. The content-stripped version mayinclude symbols substituted for content words such that content andmeaning is stripped away from the document. The content and meaning maybe stripped away without human intervention such that only structuraland/or grammatical information of the document are conveyed to the humaneditor. Operation 404 may be performed by one or more hardwareprocessors configured by machine-readable instructions including amodule that is the same as or similar to version providing module 318,in accordance with one or more implementations.

An operation 406 may include receiving an edited content-strippedversion of the electronic document. The edited version may includechanges to the content-stripped version made by the human editor.Operation 406 may be performed by one or more hardware processorsconfigured by machine-readable instructions including a module that isthe same as or similar to version receiving module 320, in accordancewith one or more implementations.

An operation 408 may include providing an edited electronic documentbased on the edited content-stripped version such thathuman-editor-provided changes were effectuated without the human editorever being exposed to the content and meaning contained in theelectronic document. Operation 408 may be performed by one or morehardware processors configured by machine-readable instructionsincluding a module that is the same as or similar to document providingmodule 322, in accordance with one or more implementations.

Although the present technology has been described in detail for thepurpose of illustration based on what is currently considered to be themost practical and preferred implementations, it is to be understoodthat such detail is solely for that purpose and that the technology isnot limited to the disclosed implementations, but, on the contrary, isintended to cover modifications and equivalent arrangements that arewithin the spirit and scope of the appended claims. For example, it isto be understood that the present technology contemplates that, to theextent possible, one or more features of any implementation can becombined with one or more features of any other implementation.

What is claimed is:
 1. A system configured to facilitate review of aconfidential electronic document by a non-privileged person withoutexposing the non-privileged person to any confidential content orconfidential meaning contained in the confidential electronic document,the system comprising: one or more hardware processors configured bymachine-readable instructions to: receive, at a processor, theconfidential electronic document including text, the text including aplurality of words; tokenize the text of the confidential electronicdocument by breaking up a stream of the text into tokens, a given tokenbeing a word or a punctuation; determine whether individual tokens areindividual content words, a content word having substantive meaning;determine whether the individual tokens are individual function words, agiven function word lacking the substantive meaning and instead denotinggrammatical relationships between content words; and substitute theindividual tokens comprising the individual content words with differentcorresponding symbols, wherein a first character of an individual symbolis the same as a first character of an individual content word, whereinthe substituting strips away the confidential content or theconfidential meaning contained in the confidential electronic document,wherein a given symbol is substituted for every instance of a givencontent word in the text, wherein a correlation between the given symboland the given content word is unique to the confidential electronicdocument such that other instances of the given content word in otherconfidential electronic documents have others ones of the differentcorresponding symbols.
 2. The system of claim 1, wherein thenon-privileged person is a person who is not affiliated in aconfidential relation underlying a confidentiality of the confidentialelectronic document.
 3. The system of claim 2, wherein the confidentialrelation includes an attorney and client, a husband and wife, aphysician and patient, or a master and servant.
 4. The system of claim1, wherein the confidential electronic document is password protectedand/or encrypted.
 5. The system of claim 1, wherein all of the contentwords in the text are substituted with the different correspondingsymbols.
 6. The system of claim 1, wherein responsive to thedetermination that the individual tokens are the individual functionwords, leave the individual function words intact.
 7. The system ofclaim 1, wherein a suffix of the individual symbol is the same as asuffix of the individual content word.
 8. The system of claim 1, whereinthe individual symbol includes a numeric portion, the numeric portion ofthe individual symbol being determined based on a random number or anorder of appearance of the individual content word in the text.
 9. Amethod to facilitate review of a confidential electronic document by anon-privileged person without exposing the non-privileged person to anyconfidential content or confidential meaning contained in theconfidential electronic document, the method comprising: receiving, at aprocessor, the confidential electronic document including text, the textincluding a plurality of words; tokenizing the text of the confidentialelectronic document by breaking up a stream of the text into tokens, agiven token being a word or a punctuation; determining whetherindividual tokens are individual content words, a content word havingsubstantive meaning; determining whether the individual tokens areindividual function words, a given function word lacking the substantivemeaning and instead denoting grammatical relationships between contentwords; and substituting the individual tokens comprising the individualcontent words with different corresponding symbols, wherein a firstcharacter of an individual symbol is the same as a first character of anindividual content word, wherein the substituting strips away theconfidential content or the confidential meaning contained in theconfidential electronic document, wherein a given symbol is substitutedfor every instance of a given content word in the text, wherein acorrelation between the given symbol and the given content word isunique to the confidential electronic document such that other instancesof the given content word in other confidential electronic documentshave others ones of the different corresponding symbols.
 10. The methodof claim 9, wherein the non-privileged person is a person who is notaffiliated in a confidential relation underlying a confidentiality ofthe confidential electronic document.
 11. The method of claim 10,wherein the confidential relation includes an attorney and client, ahusband and wife, a physician and patient, or a master and servant. 12.The method of claim 9, wherein the confidential electronic document ispassword protected and/or encrypted.
 13. The method of claim 9, whereinall of the content words in the text are substituted with the differentcorresponding symbols.
 14. The method of claim 9, wherein responsive tothe determination that the individual tokens are the individual functionwords, leaving the individual function words intact.
 15. The method ofclaim 9, wherein a suffix of the individual symbol is the same as asuffix of the individual content word.
 16. The method of claim 9,wherein the individual symbol includes a numeric portion, the numericportion of the individual symbol being determined based on a randomnumber or an order of appearance of the individual content word in thetext.