Security systems and methods for social networking
First Claim
1. A method of encoding electronic data published by a user node, the method comprising:
- executing, by one or more processors, a program to cause the one or more processors to perform operations comprising;
detecting, via a listener, when an executing browser is about to draw a third party webpage at the publishing user node;
in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at a form input field by;
parsing contents of the third party webpage to detect one or more form input fields;
in response to detecting input at a detected from input field in the third party webpage, assigning a policy ID associated with the detected form input field;
receiving a unique identifier assigned to the detected form input field and an encoding key for encoding the input of the detected form input field; and
in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with encoded content.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider'"'"'s website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
6 Citations
22 Claims
-
1. A method of encoding electronic data published by a user node, the method comprising:
executing, by one or more processors, a program to cause the one or more processors to perform operations comprising; detecting, via a listener, when an executing browser is about to draw a third party webpage at the publishing user node; in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at a form input field by; parsing contents of the third party webpage to detect one or more form input fields; in response to detecting input at a detected from input field in the third party webpage, assigning a policy ID associated with the detected form input field; receiving a unique identifier assigned to the detected form input field and an encoding key for encoding the input of the detected form input field; and in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with encoded content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
Specification