Data security system and method adjunct to e-mail, browser or telecom program
First Claim
1. A method of securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
- extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom;
storing said extracted data in respective ones of said extract stores emailing said remainder data to an addressee;
permitting retrieval of said extracted data from said extract stores only in the presence of a respective predetermined security clearance; and
,reconstructing said email data with said extracted data and remainder data.
2 Assignments
0 Petitions
Accused Products
Abstract
Data security for e-mail or browser-input data operates on identified security sensitive words, characters or icons which are extracted leaving remainder data. Extracted data, in one system, is stored in a remote, extract store in a distributed computer system. Other methods attach an encrypted version of the extract to the email. The browser system operates with an extract store. Remainder data is sent to the addressee or designated web server. The addressee is permitted to retrieve the extracted data from said extract store only in the presence of a security clearance and hence, reconstruct the source e-mail or browser-input data with the extract data. In other systems, the addressee reconstructs the email by decryption and integration. Parsing rather than identifying critical words is an option. The browser method extracts data, facilitates the storage in an extract store, forwards the remainder data to a targeted destination. The financial data or credit card scrubber may use a pop-up window to alert the user to enable the system.
-
Citations
85 Claims
-
1. A method of securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; storing said extracted data in respective ones of said extract stores emailing said remainder data to an addressee; permitting retrieval of said extracted data from said extract stores only in the presence of a respective predetermined security clearance; and
,reconstructing said email data with said extracted data and remainder data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of securing email data having one or more security sensitive words, characters or icons, the method used in conjunction with a distributed computer-based system having a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, and an addressee email device, the method comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in respective ones of said extract stores; and
,emailing said remainder data to an addressee and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of securing email data having one or more security sensitive words, characters or icons comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain a plurality of extract data grouped into different security levels and remainder data therefrom; encrypting said extracted data for each said security level and appending said encrypted extracted data with said remainder data to form a composite email; emailing said composite email to an addressee; reconstructing said email data from said composite email with decryption of said extracted data only in the presence of a respective predetermined security clearance, required for each said security level. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A method of securing email data having one or more security sensitive words, characters or icons grouped into different security levels , the method used in conjunction with an addressee email device having a decryption routine, the method comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain a plurality of extracted data for said corresponding plurality of different security levels and remainder data therefrom; encrypting said extracted data for each said security level and appending said encrypted extracted data with said remainder data to form a composite email; and emailing said composite email to an addressee. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A method of securing email data with a parsing algorithm via a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
parsing said email data to obtain extracted data for each said respective security level and remainder data therefrom; storing said extracted data in said respective extract stores corresponding to said respective security levels emailing said remainder data to an addressee; and
, permitting reconstruction of said email data via said extracted data from respective extract stores and remainder data only in the presence of a respective predetermined security clearance. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A method of securing email data with a parsing algorithm, the method used in conjunction with a distributed computer-based system having a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance and an addressee email device, the method comprising:
-
parsing said email data to obtain extracted data for respective security levels and remainder data therefrom; facilitating the storage of said extracted data in said extract store corresponding to said respective security level; and emailing said remainder data to an addressee and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data for respective security levels and corresponding extract stores and remainder data therefrom; storing said extracted data in said respective extract store; emailing said remainder data to an addressee; permitting retrieval of said extracted data from said extract stores only in the presence of a respective predetermined security clearance; and
,reconstructing said email data with said extracted data for a respective security level and remainder data. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer-based system having a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, and an addressee email device, comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data for each respective security level and remainder data therefrom; facilitating the storage of said extracted data in said extract store corresponding to the respective security level; and
,emailing said remainder data to an addressee and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (52, 53, 54, 55, 56, 57)
-
-
58. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data for different security levels and remainder data therefrom; encrypting said extracted data for each respective security level and appending said encrypted extracted data with said remainder data to form a composite email; emailing said composite email to an addressee; reconstructing said email data from said composite email with decryption of said extracted data only in the presence of a corresponding predetermined security clearance associated with each said different security level. - View Dependent Claims (59, 60, 61, 62, 63)
-
-
64. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons, each grouped for a corresponding security level, used in conjunction with an addressee email device having a decryption routine, comprising:
-
extracting said security sensitive words, characters or icons from said email data to obtain extracted data corresponding to a respective security level and remainder data therefrom; encrypting said extracted data for each respective security level and appending said encrypted extracted data with said remainder data to form a composite email; and emailing said composite email to an addressee. - View Dependent Claims (65, 66, 67, 68)
-
-
69. A computer readable medium containing programming instructions for securing email data with a parsing algorithm via a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
parsing said email data to obtain extracted data for respective ones of said security levels and remainder data therefrom; storing said extracted data in respective extract stores corresponding to said respective security levels; emailing said remainder data to an addressee; and
,permitting reconstruction of said email data via said extracted data for each respective security level and remainder data only in the presence of a respective predetermined security clearance associated with said corresponding security level. - View Dependent Claims (70, 71, 72)
-
-
73. A computer readable medium containing programming instructions for securing email data with a parsing algorithm, used in conjunction with a distributed computer-based system having a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, and an addressee email device, comprising:
-
parsing said email data to obtain extracted data for respective security levels and remainder data therefrom; facilitating the storage of said extracted data in said respective ones of said extract stores; and emailing said remainder data to an addressee and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (74, 75, 76)
-
-
77. A method of securing data passing through a browser, said data having one or more security sensitive words, characters or icons, the method deployed in a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
extracting said security sensitive words, characters or icons from said data to obtain extracted data for respective security levels and remainder data therefrom; facilitating the storage of said extracted data in respective ones of said extract stores ; and forwarding said remainder data to a targeted destination in said distributed computer system and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (78, 79, 80, 81)
-
-
82. A computer readable medium containing programming instructions for securing data passing through a browser, said data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
extracting said security sensitive words, characters or icons from said data to obtain extracted data for respective security levels and remainder data therefrom; facilitating the storage of said extracted data in respective ones of said extract stores ; and forwarding said remainder data to a targeted destination in said distributed computer system and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (83, 84, 85)
-
Specification