SYSTEM AND METHOD FOR SECURING DATA THROUGH A PDA PORTAL
First Claim
1. A system for securing content from a source to a recipient, wherein said content includes first content and second content, and wherein said system is configured to:
- isolate said embedded link within a decrypted version of said first content;
encrypt said first content; and
, receive said second content based on said embedded link.
5 Assignments
0 Petitions
Accused Products
Abstract
Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the purchase and/or loyalty process. During the purchase and/or loyalty process, the consumer may need to insure that any content downloaded or used in association with the PDA is secure in how it is collected, assembled, and delivered to the PDA device. This system and method secures the data from its source to when it is actually viewed or used by the authorized user. The PDA may have direct access to an Internet web site portal that offers secure personal content from a content provider, such as, for example, an on-line banking or financial institution. Using the web site portal, the content provider may offer personal or confidential data, such as financial information, to PDA users in a secure (e.g., encrypted) environment. The exemplary system and method may establish a PDA portal link to the web site for collecting specified information for a user and transmitting the information to the remote device. To receive the information, the PDA contacts the portal and establishes a connection, authenticates itself to the network, and allows the user to complete secured transactions or transmissions over the network.
-
Citations
23 Claims
-
1. A system for securing content from a source to a recipient, wherein said content includes first content and second content, and wherein said system is configured to:
-
isolate said embedded link within a decrypted version of said first content;
encrypt said first content; and
,receive said second content based on said embedded link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for securing content from a source to a recipient, wherein said content includes first content and second content, said method including:
-
identifying an embedded link in decrypted content;
isolating said embedded link;
encrypting said first content; and
,receiving said second content based on said embedded link. - View Dependent Claims (15, 16, 17, 18, 19, 21, 22)
-
-
20. A computer readable storage medium containing a set of instructions for a general purpose computer for securing content from a source to a recipient, wherein said content includes first content and second content, said instructions including:
-
receiving encrypted content which is an encrypted portion of said first content;
decrypting said encrypted content to form decrypted content;
interrogating said decrypted content to identify an embedded link;
isolating said embedded link;
re-encrypting said first content; and
,receiving said second content based on said embedded link.
-
-
23. A system for securing content from a source to a recipient, wherein said content includes first content and second content, and wherein said system is configured to:
-
receive encrypted content which is an encrypted portion of said first content;
decrypt said encrypted content to form decrypted content;
interrogate said decrypted content to identify an embedded link;
isolate said embedded link;
re-encrypt said first content; and
receive said second content based on said embedded link.
-
Specification