System for protecting information over the internet
First Claim
1. A method for conducting a survey at a computer connected to the Internet comprising the steps of:
- sending a survey to the computer via the Internet which references a network address to obtain a file for said survey;
downloading said file from said network address in which said file is encrypted;
requesting a key to decrypt said encrypted file from a network address where said key is available;
receiving a key at the computer when said computer is associated with a participant selected to take said survey; and
decrypting the file in accordance with said key and playing the decrypted file as part of the survey.
3 Assignments
0 Petitions
Accused Products
Abstract
A system at a web site addressable by one or more client computers. Each client computer connects to the web site to receive a respondent identifier and a viewer. The viewer at the client computer generates a unique viewer identifier identifying the client computer, and sends that identifier to the web site for registration with the respondent identifier. The viewer connects to the web site and downloads a file with encrypted content information. The viewer requests the web site for a key to decrypt the file. Based on the respondent and viewer identifiers, and the particular survey and exposure limits, a key is sent to the client computer. The viewer decrypts the encrypted file with the key, and then shows the content information in a window. During viewing, the viewer ignores interrupts from the computer'"'"'s user interface enabling copying, and stops showing the decrypted content if another window is selected.
-
Citations
6 Claims
-
1. A method for conducting a survey at a computer connected to the Internet comprising the steps of:
-
sending a survey to the computer via the Internet which references a network address to obtain a file for said survey; downloading said file from said network address in which said file is encrypted; requesting a key to decrypt said encrypted file from a network address where said key is available; receiving a key at the computer when said computer is associated with a participant selected to take said survey; and decrypting the file in accordance with said key and playing the decrypted file as part of the survey. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification