HomeIndustriesA8ANON (ANONYMIZER AS A SERVICE)

A8ANON (ANONYMIZER AS A SERVICE)

Protecting enterprise IP and customer PII

A major focus of Gen AI adoption is to protect corporate IP and customer PII. Modern Gen AI techniques such as RAG build prompts with sensitive data. These prompts are sent to 3rd-party Large Language Models, risking exposure. A8Anon (Anonymizer as a Service) from Autonom8 shields your data from such risk.

A8Anon (Anonymizer as a Service)

A8Anon provides a rich palette of data protection techniques with fine-grained control. It has two core functions (1) Identify sensitive data (aka entities) (2) Apply the appropriate treatment to each type of entity. For example, you can configure that person names be pseudonymized and email addresses be redacted. You can also encrypt entites for subsequent decryption (2-way) or not (hashing). In automated mode, A8Anon will make these decisions for you.

Icon

Redaction

Icon

Pseudonymization

Icon

Encryption/Hashing

Icon

Generalization

Icon

Swapping

Icon

Perturbation

Icon

Secure User Functions

Case study: Legal contracts
Contract generation & review

Gen AI is a powerful technology for legal professionals. We’ve built a platform to generate, summarize, and redline legal documents. This uses a fine-tuned model trained on thousands of documents. These documents were anonymized to both improve tuning quality (for generalization) and preserve private data. A8Anon is deployed in the customers’ cloud. When used for summarization and redlining, A8Anon encrypts PII in all source documents and decrypts them within the legal firm’s private network. This provides the flexibility to use capable 3rd-party models instead of relying on limited in-house or open source LLMs.

Deployment options for A8Anon

  • A8Anon API
  • Service hosted in the Autonom8 Google cloud (best price)
  • Service hosted in your managed cloud (best data custody)
  • Hosted on-prem (contact us for details)

What is Anonymization?

In our context, anonymization is the process by which textual data is cleansed of information (aka PII) which can identify a person, corporation, or transaction. The process first requires identification of PII in text, after which a variety of cleansing treatments can be applied to achieve the desired result. These techniques are briefly described below. A8Anon supports all these capabilities.

Redaction

Redaction is the process of masking PII in text. PII can be removed or obsured. For readability it is sometimes useful to perform partial masking e.g. leaving the last 4 digits of a phone number intact. A8Anon supports a variety of redaction styles including full and partial removal and obscuration with patterns such as LAST4 and ASTERISKS.

Pseudonymization

Pseudonymization replaces PII with false but plausible text. This maintains continuity of textual narrative but disguises identities. It is applicable to names, phone numbers, email and more. In retail situations consumers can be disassociated from their purchases or location. Pseudonymized prompts can be sent to LLMs without risk of identity disclosure. A8Anon enables a private key map for reverse lookup. Responses from LLMs can be mapped back to names which are meaningful to the consumer.

Encryption/Hashing

Encryption is the process of applying a cipher to change text to something which is implausible. Encryption is generally more applicable for numerical data e.g. quantity, price. By definition, encrypted data can be decrypted with a 2-way key. Encryption with a 1-way key is called hashing. Hashed text cannot be recovered. A8Anon supports encryption and hashing for all types of PII.

Generalization (aka Bucketing)

Generalization is an approach for grouping (mostly numerical) data into broader categories to hinder identifiability and thereby enhance privacy. These broader ranges are called buckets. Text such as “He is 43 years old” becomes “He is 40-45 years old”. Replacing a street address with a zip code is another example of generalization.

Additional techniques

  • Perturbation: Adding noise to data to disguise numerical values such as salary or dates
  • Swapping: Useful for values selected from a list. E.g. If customers are classified as ‘blue’, ‘silver’, and ‘gold’, we can shuffle these values
  • Secure user actions: Let users run their own code when certain data classes are detected

Our Clients

a8-clients-indusind
a8-clients-britishcouncil
a8-clients-kinara
a8-clients-hdb
a8-clients-zoo
a8-clients-next
a8-clients-camsrep
a8-clients-mahaveer
a8-clients-allsec
a8-clients-auric
a8-clients-myntra
a8-customers-13
a8-customers-14
a8-customers-15
a8-customers-16
a8-customers-17
a8-customers-18
a8-customers-19
a8-customers-20
a8-customers-21
a8-customers-22
a8-customers-23

CUSTOMER STORIES

See what our customers have to say