Computerized system and method for modifying a message to apply security features to the message's content
First Claim
1. A method comprising:
- receiving, at a computing device associated with a messaging platform, a message addressed to a second user from a first user, said message comprising a masking identifier representing locked message content set by said first user, said locked message content being inaccessible by said second user without providing a password associated with the masking identifier;
communicating, via the computing device, said message to a mailbox of said second user that is associated with said messaging platform;
receiving, at the computing device, a request from said second user to view said locked message content, said request comprising an input from said first user related to said masking identifier;
determining, via the computing device, that said second user is able to access said locked message content, said determination comprising comparing said input to said password and determining that said input matches said password;
retrieving, via the computing device, said locked message content from a database, said retrieval comprising searching said database for said locked message content based on said masking identifier; and
communicating, via the computing device, said locked message content to said mailbox of said second user for display within said message, communication facilitating display of said locked message content in place of said masking identifier.
6 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for improving interactions with and between computers in content providing, generating and/or hosting systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the security and quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide added security features and functionality to messaging platforms. Message content within communicated or to be communicated messages can be subject to such security functionality through the identification of selected message portions having an identifier applied therewith that not only hides the selected message portions from being viewed within a message interface, but also modifies the message thereby rendering the selected message portion as unreadable and/or inaccessible by a user or computing device without the required security credentials.
32 Citations
12 Claims
-
1. A method comprising:
-
receiving, at a computing device associated with a messaging platform, a message addressed to a second user from a first user, said message comprising a masking identifier representing locked message content set by said first user, said locked message content being inaccessible by said second user without providing a password associated with the masking identifier; communicating, via the computing device, said message to a mailbox of said second user that is associated with said messaging platform; receiving, at the computing device, a request from said second user to view said locked message content, said request comprising an input from said first user related to said masking identifier; determining, via the computing device, that said second user is able to access said locked message content, said determination comprising comparing said input to said password and determining that said input matches said password; retrieving, via the computing device, said locked message content from a database, said retrieval comprising searching said database for said locked message content based on said masking identifier; and communicating, via the computing device, said locked message content to said mailbox of said second user for display within said message, communication facilitating display of said locked message content in place of said masking identifier. - View Dependent Claims (2)
-
-
3. A method comprising:
-
receiving, at a computing device, a message in a mailbox of a first user from a second user, said message comprising message content; receiving, at the computing device, a request to lock a selected portion of said message content, said request comprising received input from said first user that identifies said selected portion; receiving, via the computing device, a masking identifier to apply to said message in association with said selected portion based on said request, said receiving the masking identifier further comprising receiving a password to associate with said masking identifier that is required to unlock said selected portion; modifying, via the computing device, said message based on said masking identifier within said mailbox, said modification comprising replacing the selected portion with said masking identifier, said replacing comprising extracting said selected portion from the message such that it is no longer accessible within said message and displaying said masking identifier in a position previously held by the selected portion; and storing, via the computing device, relationship information associated with said masking identifier and said selected portion in a database, wherein said selected portion can be retrieved from said database based on said masking identifier. - View Dependent Claims (4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium tangibly encoded with computer-executable instruction, that when executed by a computing device, perform a method comprising:
-
receiving a message in a mailbox of a first user from a second user, said message comprising message content; receiving a request to lock a selected portion of said message content, said request comprising received input from said first user that identifies said selected portion; receiving a masking identifier to apply to said message in association with said selected portion based on said request, said receiving the masking identifier further comprising receiving a password to associate with said masking identifier that is required to unlock said selected portion; modifying said message based on said masking identifier within said mailbox, said modification comprising replacing the selected portion with said masking identifier, said replacing comprising extracting said selected portion from the message such that it is no longer accessible within said message and displaying said masking identifier in a position previously held by the selected portion; and storing relationship information associated with said masking identifier and said selected portion in a database, wherein said selected portion can be retrieved from said database based on said masking identifier. - View Dependent Claims (8, 9)
-
-
10. A system comprising:
-
a processor; a non-transitory computer-readable storage medium for tangibly storing thereon program logic for execution by the processor, the program logic comprising; receiving logic executed by the processor for receiving a message in a mailbox of a first user from a second user, said message comprising message content; receiving logic executed by the processor for receiving a request to lock a selected portion of said message content, said request comprising received input from said first user that identifies said selected portion; receiving logic executed by the processor for receiving a masking identifier to apply to said message in association with said selected portion based on said request, said receiving the masking identifier further comprising receiving a password to associate with said masking identifier that is required to unlock said selected portion; modification logic executed by the processor for modifying said message based on said masking identifier within said mailbox, said modification comprising replacing the selected portion with said masking identifier, said replacing comprising extracting said selected portion from the message such that it is no longer accessible within said message and displaying said masking identifier in a position previously held by the selected portion; and storage logic executed by the processor for storing relationship information associated with said masking identifier and said selected portion in a database, wherein said selected portion can be retrieved from said database based on said masking identifier. - View Dependent Claims (11, 12)
-
Specification