System and method for securing data through a PDA portal
First Claim
1. A system comprising:
- a tangible, non-transitory memory communicating with a processor for securing content from a source to a remote recipient, wherein said content includes first content and second content,said tangible, non-transitory memory having instructions stored thereon that, in response to execution by said processor, cause said processor to perform operations comprising;
retrieving, by said processor, said first content, wherein said first content is encrypted;
decrypting, by said processor, said first content;
locating, by said processor, an embedded link within said first content, wherein said embedded link includes navigation information for retrieving said second content, and wherein said embedded link does not display any address to said recipient upon receipt from said processor when viewed through a browser;
encrypting, by said processor, said first content;
retrieving, by said processor, said second content from a remote host associated with said embedded link, wherein said second content is retrieved prior to transmitting said first content to said recipient;
transmitting, by said processor, said first content to said recipient; and
transmitting, by said processor, said second content to said recipient.
5 Assignments
0 Petitions
Accused Products
Abstract
Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the purchase and/or loyalty process. During the purchase and/or loyalty process, the consumer may need to insure that any content downloaded or used in association with the PDA is secure in how it is collected, assembled, and delivered to the PDA device. This system and method secures the data from its source to when it is actually viewed or used by the authorized user. The PDA may have direct access to an Internet web site portal that offers secure personal content from a content provider, such as, for example, an on-line banking or financial institution. Using the web site portal, the content provider may offer personal or confidential data, such as financial information, to PDA users in a secure (e.g., encrypted) environment. The exemplary system and method may establish a PDA portal link to the web site for collecting specified information for a user and transmitting the information to the remote device. To receive the information, the PDA contacts the portal and establishes a connection, authenticates itself to the network, and allows the user to complete secured transactions or transmissions over the network.
362 Citations
22 Claims
-
1. A system comprising:
-
a tangible, non-transitory memory communicating with a processor for securing content from a source to a remote recipient, wherein said content includes first content and second content, said tangible, non-transitory memory having instructions stored thereon that, in response to execution by said processor, cause said processor to perform operations comprising; retrieving, by said processor, said first content, wherein said first content is encrypted; decrypting, by said processor, said first content; locating, by said processor, an embedded link within said first content, wherein said embedded link includes navigation information for retrieving said second content, and wherein said embedded link does not display any address to said recipient upon receipt from said processor when viewed through a browser; encrypting, by said processor, said first content; retrieving, by said processor, said second content from a remote host associated with said embedded link, wherein said second content is retrieved prior to transmitting said first content to said recipient; transmitting, by said processor, said first content to said recipient; and transmitting, by said processor, said second content to said recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method including:
-
retrieving said first content, by a processor for securing content from a source to a remote recipient, wherein said content includes first content and second content, wherein said first content is encrypted; decrypting, by said processor, said first content; identifying, by said processor, an embedded link in said first content, wherein said embedded link includes navigational information for retrieving said second content, and wherein said embedded link does not display any address to said recipient upon receipt from said processor when viewed through a browser; encrypting, by said processor, said first content; retrieving, by said processor, said second content from a remote host associated with said embedded link, wherein said second content is retrieved prior to transmitting said first content to said recipient; transmitting, by said processor, said first content to said recipient; and transmitting, by said processor, said second content to said recipient. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory tangible computer readable storage medium having stored thereon a plurality of computer executable instructions that perform operations, in response to execution by a computer for securing content from a source to a remote recipient, wherein said content includes first content and second content, comprising:
-
retrieving, by said computer, encrypted content which is an encrypted portion of said first content; decrypting, by said computer, said encrypted content to form decrypted content; analyzing, by said computer, said decrypted content to identify an embedded link, wherein said embedded link includes navigation information for retrieving said second content, and wherein said embedded link does not display any address to said recipient upon receipt from said computer when viewed through a browser; encrypting, by said computer, said decrypted content to form said encrypted content; retrieving, by said computer, said second content from a remote host associated with said embedded link, wherein said second content is retrieved prior to transmitting said encrypted content to said recipient; transmitting, by said computer, said encrypted content to said recipient; and transmitting, by said computer, said second content to said recipient.
-
Specification