Systems and methods for protecting private information
First Claim
Patent Images
1. A method for protecting private information provided in an exchange between a client and a server, comprising:
- receiving private information from the client;
determining whether the private information is of a type to which a bond may be assigned, the bond providing an indemnity to the client for use of the private information that is unauthorized by the client;
assigning a bond to the private information determined to be of the type to which a bond may be assigned; and
providing the private information to the server under bond.
5 Assignments
0 Petitions
Accused Products
Abstract
A system protects private information provided in an exchange between a client and a server. The system receives the private information from the client and determines whether it is of a type to which a bond may be assigned. The bond provides an indemnity to the client for misuse of the private information. The system then assigns a bond to the private information, if it is determined to be of the type to which a bond may be assigned, and provides the private information to the server under bond.
81 Citations
50 Claims
-
1. A method for protecting private information provided in an exchange between a client and a server, comprising:
-
receiving private information from the client;
determining whether the private information is of a type to which a bond may be assigned, the bond providing an indemnity to the client for use of the private information that is unauthorized by the client;
assigning a bond to the private information determined to be of the type to which a bond may be assigned; and
providing the private information to the server under bond. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
encrypting the private information; and
sending the encrypted private information to the client.
-
-
3. The method of claim 2, wherein the sending includes:
storing the encrypted private information as a cookie at the client.
-
4. The method of claim 1, wherein the determining includes:
-
determining that a type of the private information corresponds to at least one category of information, and identifying an amount of the indemnity to associate with the private information based on the determined category.
-
-
5. The method of claim 4, wherein the assigning includes:
associating the identified amount of indemnity with the private information based on the determined category.
-
6. The method of claim 1, wherein the receiving includes:
-
receiving a request from the server for private information of the client to complete the exchange, and obtaining the private information from the client.
-
-
7. The method of claim 6, wherein the obtaining includes:
-
generating an intended response to the request received from the server, providing the intended response to the client, and receiving authorization from the client to provide the intended response to the server.
-
-
8. The method of claim 6, wherein the obtaining includes:
-
generating an intended response to the request received from the server, providing the intended response to the client, and receiving modifications to the intended response from the client.
-
-
9. The method of claim 6, wherein the obtaining includes:
-
generating an intended response to the request received from the server, providing the intended response to the client, and receiving additions to the intended response from the client.
-
-
10. The method of claim 9, wherein the obtaining further includes:
-
assessing the bondability of the additions, and informing the client of a result of the assessment.
-
-
11. The method of claim 1, wherein the providing includes:
-
encrypting the private information, and sending the encrypted information to the server.
-
-
12. The method of claim 1, wherein the receiving includes:
-
transmitting an executable object to the client, activating the object at the client, and receiving the private information at the object.
-
-
13. The method of claim 1, wherein the receiving includes:
-
activating an executable object at the client, and receiving the private information at the object.
-
-
14. The method of claim 13, wherein the receiving further includes:
sending the private information to an external object to determine the bondability of the private information.
-
15. The method of claim 13, wherein the determining includes:
assessing, by the object, the bondability of the private information.
-
16. A system for protecting private information provided in an exchange between a client and a server, comprising:
-
means for receiving private information from the client;
means for determining whether the private information is of a type to which a bond may be assigned, the bond providing an indemnity to the client for use of the private information that is unauthorized by the client;
means for assigning a bond to the private information determined to be of the type to which a bond may be assigned; and
means for providing the private information to the server under bond.
-
-
17. A system for protecting private information provided in an exchange between a client and a server, comprising:
-
a memory that stores data; and
a processor, connected to the memory, that receives private information from the client, determines whether the private information is of a type to which a bond may be assigned, the bond providing an indemnity to the client for use of the private information that is unauthorized by the client, assigns a bond to the private information determined to be of the type to which a bond may be assigned, and provides the private information to the server under bond. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. In a network connecting a plurality of client entities to a plurality of server entities, a bonding agent, connected to the client entities and server entities, comprising:
-
a memory that stores instructions for determining whether private information received from one of the client entities is of a type to which a bond may be assigned, the bond providing an indemnity to a user of the one client entity for use of the private information that is unauthorized by the user, assigning a bond to the private information determined to be of the type to which a bond may be assigned, and providing the private information to one of the server entities under bond as part of an information exchange; and
a processor that executes the instructions in the memory. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. An executable object stored in a computer, the computer communicating with a client entity and a plurality of server entities, the executable object comprising:
-
instructions for obtaining private information from a user associated with the client entity for use in an information exchange with one of the server entities;
instructions for sending the private information to an external object to obtain a bondability assessment regarding the private information, the bondability assessment indicating whether an indemnity will be paid to the user if the private information is used in a manner unauthorized by the user;
instructions for obtaining the bondability assessment from the external object;
and instructions for providing the private information to the one server entity under bond. - View Dependent Claims (41, 42, 43, 44, 45)
instructions for encrypting the private information; and
instructions for storing the encrypted private information as an object on the client entity.
-
-
42. The executable object of claim 40, further comprising:
-
instructions for generating an intended response to a request received from the one server entity for private information of the user;
instructions for providing the intended response to the client entity; and
instructions for providing the intended response to the one server entity when authorized by the client entity.
-
-
43. The executable object of claim 40, further comprising:
-
instructions for generating an intended response to a request received from the one server entity for private information of the user;
instructions for providing the intended response to the client entity; and
instructions for assigning a bond to modifications to the intended response received from the client entity.
-
-
44. The executable object of claim 40, further comprising:
-
instructions for generating an intended response to a request received from the one server entity for private information of the user;
instructions for providing the intended response to the client entity;
instructions for obtaining a bondability assessment for additions to the private information from the external object; and
instructions for informing the client entity of a result of the assessment.
-
-
45. The executable object of claim 40, further comprising:
-
instructions for encrypting the private information; and
instructions for sending the encrypted information to the one server entity.
-
-
46. A computer-readable medium storing instructions for causing a processor to perform a method, the method comprising:
-
determining whether private information received from a client object is of a type to which a bond may be assigned, the bond providing an indemnity to a user associated with the client object for use of the private information that is unauthorized by the user;
assigning a bond to the private information determined to be of the type to which a bond may be assigned; and
providing the private information to a server object under bond as part of an information exchange.
-
-
47. A computer-readable medium storing instructions for causing a processor to perform a method, the method comprising:
-
obtaining private information from a client object for use in an exchange with a server object;
sending the private information to a bonding object to obtain a bondability assessment regarding the private information, the bondability assessment indicating whether an indemnity will be paid to a user associated with the client object if the private information is used in a manner unauthorized by the user; and
providing the private information to the server object under bond.
-
-
48. An executable object stored in a computer, the computer communicating with a client entity and at least one server entity, the executable object comprising:
-
instructions for obtaining private information from a user associated with the client entity for use in an information exchange with the server entity;
instructions for assessing a bondability of the private information, the bondability assessment indicating whether an indemnity will be paid to the user if the private information is used in a manner unauthorized by the user;
and instructions for providing the private information to the server entity under bond.
-
-
49. A system for providing private information of a client to a server during an information exchange, comprising:
-
a memory that stores data; and
a processor, connected to the memory, that receives a request for private information of the client from the server, generates an intended response to the request, the intended response including the requested private information under bond, the bond providing an indemnity to the client for use of the private information in a manner unauthorized by the client, provides the intended response to the client, receives authorization from the client to send the intended response to the server, and sends the intended response to the server in response to the received authorization.
-
-
50. A method for providing privacy in a transaction, comprising:
-
providing at least one of information, services, and products for browsing and purchase by consumers during a transaction;
requesting private information from the consumers prior to completing the transaction;
receiving the requested information under bond, the bond providing an indemnity to the consumers for use of the requested information in a manner unauthorized by the consumers; and
completing the transaction.
-
Specification