Data security system and method adjunct to e-mail, browser or telecom program
First Claim
1. A method of securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a remote memory designated as an extract store comprising:
- extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
storing said extracted data in said extract store;
emailing said remainder data to an addressee;
permitting retrieval of said extracted data from said extract store only in the presence of a predetermined security clearance; and
, reconstructing said email data with said extracted data and remainder data.
2 Assignments
0 Petitions
Accused Products
Abstract
Data security for e-mail or browser-input data operates on identified security sensitive words, characters or icons which are extracted leaving remainder data. Extracted data, in one system, is stored in a remote, extract store in a distributed computer system. Other methods attach an encrypted version of the extract to the email. The browser system operates with an extract store. Remainder data is sent to the addressee or designated web server. The addressee is permitted to retrieve the extracted data from said extract store only in the presence of a security clearance and hence, reconstruct the source e-mail or browser-input data with the extract data. In other systems, the addressee reconstructs the email by decryption and integration. Parsing rather than identifying critical words is an option. The browser method extracts data, facilitates the storage in an extract store, forwards the remainder data to a targeted destination. The financial data or credit card scrubber may use a pop-up window to alert the user to enable the system.
-
Citations
85 Claims
-
1. A method of securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a remote memory designated as an extract store comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
storing said extracted data in said extract store;
emailing said remainder data to an addressee;
permitting retrieval of said extracted data from said extract store only in the presence of a predetermined security clearance; and
,reconstructing said email data with said extracted data and remainder data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of securing email data having one or more security sensitive words, characters or icons, the method used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, the method comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
facilitating the storage of said extracted data in said extract store; and
,emailing said remainder data to an addressee. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of securing email data having one or more security sensitive words, characters or icons comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email;
emailing said composite email to an addressee;
reconstructing said email data from said composite email with decryption of said extracted data only in the presence of a predetermined security clearance. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A method of securing email data having one or more security sensitive words, characters or icons, the method used in conjunction with an addressee email device having a decryption routine, the method comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email; and
emailing said composite email to an addressee. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A method of securing email data with a parsing algorithm via a distributed computer system with a remote memory designated as an extract store comprising:
-
parsing said email data to obtain extracted data and remainder data therefrom;
storing said extracted data in said extract store;
emailing said remainder data to an addressee; and
,permitting reconstruction of said email data via said extracted data and remainder data only in the presence of a predetermined security clearance. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A method of securing email data with a parsing algorithm, the method used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, the method comprising:
-
parsing said email data to obtain extracted data and remainder data therefrom;
facilitating the storage of said extracted data in said extract store; and
emailing said remainder data to an addressee. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a remote memory designated as an extract store comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
storing said extracted data in said extract store;
emailing said remainder data to an addressee;
permitting retrieval of said extracted data from said extract store only in the presence of a predetermined security clearance; and
,reconstructing said email data with said extracted data and remainder data. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
facilitating the storage of said extracted data in said extract store; and
,emailing said remainder data to an addressee. - View Dependent Claims (52, 53, 54, 55, 56, 57)
-
-
58. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email;
emailing said composite email to an addressee;
reconstructing said email data from said composite email with decryption of said extracted data only in the presence of a predetermined security clearance. - View Dependent Claims (59, 60, 61, 62, 63)
-
-
64. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons, used in conjunction with an addressee email device having a decryption routine, comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email; and
emailing said composite email to an addressee. - View Dependent Claims (65, 66, 67, 68)
-
-
69. A computer readable medium containing programming instructions for securing email data with a parsing algorithm via a distributed computer system with a remote memory designated as an extract store comprising:
-
parsing said email data to obtain extracted data and remainder data therefrom;
storing said extracted data in said extract store;
emailing said remainder data to an addressee; and
,permitting reconstruction of said email data via said extracted data and remainder data only in the presence of a predetermined security clearance. - View Dependent Claims (70, 71, 72)
-
-
73. A computer readable medium containing programming instructions for securing email data with a parsing algorithm, used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, comprising:
-
parsing said email data to obtain extracted data and remainder data therefrom;
facilitating the storage of said extracted data in said extract store; and
emailing said remainder data to an addressee. - View Dependent Claims (74, 75, 76)
-
-
77. A method of securing data passing through a browser, said data having one or more security sensitive words, characters or icons, the method deployed in a distributed computer system with a remote memory designated as an extract store comprising:
-
extracting said security sensitive words, characters or icons from said data to obtain extracted data and remainder data therefrom;
facilitating the storage of said extracted data in said extract store; and
forwarding said remainder data to a targeted destination in said distributed computer system. - View Dependent Claims (78, 79, 80, 81)
-
-
82. A computer readable medium containing programming instructions for securing data passing through a browser, said data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer system with a remote memory designated as an extract store comprising:
-
extracting said security sensitive words, characters or icons from said data to obtain extracted data and remainder data therefrom;
facilitating the storage of said extracted data in said extract store; and
forwarding said remainder data to a targeted destination in said distributed computer system. - View Dependent Claims (83, 84, 85)
-
Specification