SYSTEM AND METHOD FOR SECURING USER INFORMATION ON SOCIAL NETWORKS
First Claim
1. A computer-implemented method for securing personal information of a user, the method comprising:
- a. Receiving personal information from a user in an unencrypted textual form by a client computer;
b. Transmitting the received personal information via a secure virtual private network (VPN) connection to a dedicated VPN server/proxy;
c. Receiving the personal information at the dedicated VPN server/proxy;
d. Encrypting at least a portion of the received personal information at the dedicated VPN server/proxy using an encryption key; and
e. Transmitting the encrypted personal information from the dedicated VPN server/proxy to the social networking service.
11 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for securing personal information of a user on social networks. The method involves: receiving personal information from a user in an unencrypted textual form by a client computer; transmitting the received personal information via a secure virtual private network (VPN) connection to a dedicated VPN server/proxy; receiving the personal information at the dedicated VPN server/proxy; encrypting the received personal information at the dedicated VPN server/proxy using an encryption key; and transmitting the encrypted personal information from the dedicated VPN server/proxy to the social network. Other users of the social network also use the dedicated VPN server/proxy in order to decrypt (access) the personal information of the user, which has been encrypted as specified above.
29 Citations
20 Claims
-
1. A computer-implemented method for securing personal information of a user, the method comprising:
-
a. Receiving personal information from a user in an unencrypted textual form by a client computer; b. Transmitting the received personal information via a secure virtual private network (VPN) connection to a dedicated VPN server/proxy; c. Receiving the personal information at the dedicated VPN server/proxy; d. Encrypting at least a portion of the received personal information at the dedicated VPN server/proxy using an encryption key; and e. Transmitting the encrypted personal information from the dedicated VPN server/proxy to the social networking service. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium embodying a set of computer-readable instructions, which, when executed by one or more processors, cause the one or more processors perform a method for securing personal information of a user, the method comprising:
-
a. Receiving personal information from a user in an unencrypted textual form by a client computer; b. Transmitting the received personal information via a secure virtual private network (VPN) connection to a dedicated VPN server/proxy; c. Receiving the personal information at the dedicated VPN server/proxy; d. Encrypting at least a portion of the received personal information at the dedicated VPN server/proxy using an encryption key; and e. Transmitting the encrypted personal information from the dedicated VPN server/proxy to the social networking service. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computerized system for securing personal information of a user, the computerized system comprising:
-
a. A client computer for receiving personal information from a user in an unencrypted textual form; and b. A dedicated VPN server/proxy for receiving personal information via a secure virtual private network (VPN) connection from the client computer;
wherein the dedicated VPN server/proxy encrypts at least a portion of the received personal information at the using an encryption key and transmits the encrypted personal information to the social networking service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification