Data security system and method adjunct to a browser, telecom or encryption program
DCFirst Claim
1. In a computer network which processes digital data, a method of securing digital input data having security sensitive digital content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, comprising:
- extracting said security sensitive digital content from said input data to obtain a plurality of extract data grouped into different security levels;
encrypting said extracted data for each said security level and one of digitally appending, adding or inserting said encrypted extracted data with remainder input data to form a composite;
responsive to a data request, digitally reconstructing fully or partially said input data from said composite with decryption of said extracted data only in the presence of a respective predetermined security clearance, required for each said security level.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
Data security for processing data or securing browser-input data operates on security sensitive content which is extracted, then either encrypted or stored in remote extract stores, and processed separate from remainder data. Extracted data, in one system, is remotely stored. Other methods attach, append, add or insert an encrypted version of the extract content to the document. The browser system operates with an extract store. Remainder data is sent to the addressee or designated client by the web server. The addressee is permitted to retrieve the extracted data from said extract store only with a security clearance and hence, reconstruct the source input data with the extract data. In other systems, the addressee reconstructs the input by decryption and integration. The browser method extracts data, facilitates the storage, forwards the remainder data to a target. Financial data or credit card scrubber may use pop-up windows for enablement.
69 Citations
44 Claims
-
1. In a computer network which processes digital data, a method of securing digital input data having security sensitive digital content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, comprising:
-
extracting said security sensitive digital content from said input data to obtain a plurality of extract data grouped into different security levels; encrypting said extracted data for each said security level and one of digitally appending, adding or inserting said encrypted extracted data with remainder input data to form a composite; responsive to a data request, digitally reconstructing fully or partially said input data from said composite with decryption of said extracted data only in the presence of a respective predetermined security clearance, required for each said security level. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of securing input data having security sensitive content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, the method of securing data deployed in a client-server computer system with at least one server computer operatively coupled to at least one client computer over a communications network, said client computer having a decryption routine, the method comprising:
-
extracting said security sensitive content from said input data to obtain a plurality of extract data grouped into different security levels; encrypting said extracted data for each said security level and one of appending, adding or inserting said encrypted extracted data with remainder input data to form a composite; and transmitting said composite to said at least one client computer. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium containing programming instructions for a method of securing input data having security sensitive content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, comprising:
-
extracting said security sensitive content from said input data to obtain a plurality of extract data grouped into different security levels; encrypting said extracted data for each said security level and one of appending, adding or inserting said encrypted extracted data with remainder input data to form a composite; responsive to a data request, reconstructing fully or partially said input data from said composite with decryption of said extracted data only in the presence of a respective predetermined security clearance, required for each said security level. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer readable medium containing programming instructions for a method of securing input data having security sensitive content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, the method of securing data deployed in a client-server computer system with at least one server computer operatively coupled to at least one client computer over a communications network, said client computer having a decryption routine, the programming instructions comprising:
-
extracting said security sensitive content from said input data to obtain a plurality of extract data grouped into different security levels; encrypting said extracted data for each said security level and one of appending, adding or inserting said encrypted extracted data with remainder input data to form a composite; and transmitting said composite to said at least one client computer. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A method of securing input data passing through a browser, said input data having security sensitive content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, the method deployed in a distributed computer system with a plurality of extract stores, each having a security level and a clearance therefor, comprising:
-
extracting said security sensitive content from said input data to obtain extracted data for respective security levels; facilitating the storage of said extracted data in respective ones of said extract stores; and forwarding any remainder input data to a target destination in said distributed computer system and requiring predetermined security clearances to access said extract stores. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A non-transitory computer readable medium containing programming instructions for securing input data passing through a browser, said input data having security sensitive content, represented by one or more security sensitive words, characters, images, data elements or data objects therein, the programming instructions operably deployed in a distributed computer system with a plurality of extract stores, each having a security level and a clearance therefor, comprising:
-
extracting said security sensitive content from said input data to obtain extracted data for respective security levels; facilitating the storage of said extracted data in respective ones of said extract stores; and forwarding any remainder input data to a target destination in said distributed computer system and requiring predetermined security clearances to access said extract stores. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A non-transitory computer readable medium containing programming instructions for securing data passing through a browser, said data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer system with a plurality of remote memories respectively designated as corresponding extract stores, each having a respective security level and clearance, comprising:
-
extracting said security sensitive words, characters or icons from said data to obtain extracted data for respective security levels and remainder data therefrom; facilitating the storage of said extracted data in respective ones of said extract stores; and forwarding said remainder data to a targeted destination in said distributed computer system and requiring a respective predetermined security clearance for access to corresponding extract stores. - View Dependent Claims (42, 43, 44)
-
Specification