×

Method and apparatus for preventing the interception of data being transmitted to a web site by a monitoring program

  • US 7,394,900 B1
  • Filed: 10/27/2003
  • Issued: 07/01/2008
  • Est. Priority Date: 06/24/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for preventing a program on a computer from using data transmitted by the computer to a website, comprising:

  • identifying a first set of codes, each code in the first set of codes associated with a human-readable label for presentation to a user of the computer, the first set of codes including a first code associated with a first human-readable label;

    generating a first set of encrypted codes corresponding to the first set of codes, the first set of encrypted codes including a first encrypted code corresponding to the first code, wherein generating the first set of encrypted codes comprises performing an encryption process utilizing a first encryption key identification code;

    sending, to the computer, the first set of encrypted codes, the human-readable label associated with each code in the first set of codes, and the first encryption key identification code, wherein the first encryption key identification code is sent concurrently with sending the first set of encrypted codes;

    receiving, from the computer, at least one encrypted code from the first set of encrypted codes and the first encryption key identification code, wherein the at least one encrypted code represents a selection by the user, the received at least one encrypted code includes the first encrypted code, and the first encryption key identification code is received concurrently with receiving the at least one encrypted code from the first set of encrypted codes;

    identifying a second set of codes, each code in the second set of codes associated with a human-readable label for presentation to the user of the computer, the second set of codes including the first code;

    generating a second set of encrypted codes corresponding to the second set of codes, the second set of encrypted codes including a second encrypted code corresponding to the first code, the second encrypted code different from the first encrypted code, wherein generating the second set of encrypted codes comprises performing the encryption process utilizing a second encryption key identification code different from the first encryption key identification code; and

    sending, to the computer concurrently with sending the second set of encrypted codes, the second encryption key identification code.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×