Jinsi anonym.legal Inavyofanya Kazi

Ugunduzi wa PII wa kisayansi, unaotegemea regex unaotoa matokeo ya 100% yanayoweza kurudiwa. Ingizo sawa, matokeo sawa—kila wakati. Hakuna AI, hakuna kukisia, tu ulinganifu wa wazi wa mifumo.

How Does PII Detection Work?

PII detection identifies personal data in text using pattern matching and machine learning. anonym.legal uses a hybrid approach:

  1. 1
    Pattern Matching: Regex patterns detect structured data (SSNs, credit cards, IBANs) with checksum validation.
  2. 2
    Named Entity Recognition: NER models identify names, locations, and organizations in 48 languages.
  3. 3
    Context Scoring: Each detection is scored based on surrounding context to minimize false positives.

This hybrid approach detects 285+ entity types while maintaining deterministic, reproducible results — essential for compliance and legal discovery.

Kwa Nini Regex, Si AI?

Mbinu Yetu

  • Matokeo ya 100% yanayoweza kurudiwa
  • Kamili inayoangaliwa kwa ajili ya kufuata sheria
  • Haitaji data ya mafunzo
  • Uamuzi wa wazi
  • Utendaji wa haraka, unaoweza kutabiriwa
  • Hakuna mabadiliko ya mfano kwa muda

Mbinu za AI/ML

  • Matokeo yanatofautiana kati ya kukimbia
  • Uamuzi wa sanduku jeusi
  • Inahitaji data ya mafunzo
  • Ngumu kuangalia
  • Gharama kubwa za kompyuta
  • Mabadiliko ya mfano kwa muda

Mchakato wa Hatua 10

Kutoka ingizo hadi matokeo, hapa kuna kile kinachotokea kwa hati yako

1

Ingizo la Teksti

Tuma hati yako kupitia kiolesura cha wavuti, API, au Office Add-in

2

Ugunduzi wa Lugha

Mfumo unatambua lugha ya hati kwa ajili ya usindikaji bora

3

Tokenization

Teksti inavunjwa kuwa tokeni kwa ajili ya ulinganifu wa mifumo

4

Ulinganifu wa Mifumo

Mifumo ya regex inatafuta aina 285+ za vitu

5

Analizi ya Muktadha

Teksti inayozunguka inaboresha usahihi wa ugunduzi

6

Alama ya Kujiamini

Kila ugunduzi unapata alama ya kujiamini

7

Uainishaji wa Vitu

Vitu vilivyogunduliwa vinapangwa kwa aina

8

Kagua Matokeo

Tazama ugunduzi wote pamoja na nafasi na alama

9

Tumia Uondoaji

Chagua njia yako: Badilisha, Ficha, Hash, Ficha, au Ficha

10

Hati ya Matokeo

Pakua hati yako iliyofichwa

Inapatikana kwenye mipango ya Pro na Biashara pekee

MCP Server: Uunganisho wa AI wa Kwanza wa Faragha

Jinsi data yako inavyopita kupitia MCP Server ili kuweka zana za AI salama

1

Omba Zana ya AI

Zana yako ya AI (Cursor, Claude) inatuma ombi lenye PII

2

MCP Server Inakamatwa

Server inachambua na kugundua vitu vyote vya PII

3

Uondoaji

PII inabadilishwa na tokeni au kufichwa

Safe data only
4

Usindikaji wa AI

AI inapata na kusindika tu data iliyofichwa

5

Jibu Linarudi

Jibu la AI linarudi kupitia MCP Server

6
Optional

Kurejesha Tokeni

Hiari: Thamani za asili zinaweza kurejeshwa kwa mtumiaji

Mfano wa Uhalisia

Kabla (ikiwa na PII)
Fanya malipo kwa John Doe, barua pepe john@example.com, kadi 4532-1111-2222-3333

Kile AI inaona

Baada (iliyofichwa)
Fanya malipo kwa PII_PERSON_001, barua pepe PII_EMAIL_001, kadi PII_CREDIT_CARD_001

Kile unachopata

AI haioni PII yako halisi
Inaweza kurekebishwa kwa njia ya tokenization
Gharama sawa za tokeni kama programu ya wavuti
Inafanya kazi na zana nyingi za AI
Usalama wa kiwango cha biashara

Frequently Asked Questions

Why use regex instead of AI for PII detection?

Regex-based detection is deterministic and reproducible. The same input always produces the same output. AI/ML models can be unpredictable and may miss or falsely flag data. For compliance, reproducibility matters.

How accurate is the detection?

Our hybrid approach combines regex patterns with Named Entity Recognition (NER) for high accuracy. All patterns include checksum validation where applicable (credit cards, IBANs, SSNs). False positives are minimized through context-aware scoring.

What happens to my data during processing?

Text is sent to our EU-hosted servers (Hetzner, Germany) over TLS 1.3 for analysis. We don't store your data after processing. With Zero-Knowledge auth, we can't even identify which user made the request.

Can I add custom entity types?

Yes! You can create custom recognizers with your own regex patterns and context words. Custom entities support the same operators (replace, mask, hash, encrypt, redact) as built-in types.

How does reversible encryption work?

The Encrypt operator uses AES-256-GCM encryption with your key. Only you can decrypt. This allows re-identification for audits or legal discovery while keeping data protected in transit and storage.

Ione Katika Vitendo

Jaribu ugunduzi wetu wa PII na uondoaji bure kwa tokeni 200 kwa mzunguko.