Obfuscating entry of sensitive information
First Claim
1. A computer implemented method for obfuscating entry of information, the method comprising:
- communicating to a provider of an input a set of additional aspects to be applied to a part of the input, wherein the set of additional aspects is distinct from a second set of additional aspects to be applied to another input;
receiving, from the provider, an obfuscated input corresponding to the part of the input, wherein a subset of the set of additional aspects is present in the obfuscated input;
recovering the part of the input from the obfuscated input by removing, using a processor and a memory, the subset of the set of additional aspects from the obfuscated input, forming a recovered part;
generating an entry field input corresponding to the input using the recovered part; and
sending the entry field input to an application executing in a data processing system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for obfuscating entry of information are provided in the illustrative embodiments. A set of additional aspects to be applied to a part of an input is communicated to a provider of the input. The set of additional aspects is distinct from a second set of additional aspects to be applied to another input. An obfuscated input corresponding to the part of the input is received. A subset of the set of additional aspects is present in the obfuscated input. The part of the input from the obfuscated input is recovered by removing, using a processor and a memory, the subset of the set of additional aspects from the obfuscated input. An entry field input corresponding to the input is generated. The entry field input is sent to an application executing in a data processing system.
-
Citations
23 Claims
-
1. A computer implemented method for obfuscating entry of information, the method comprising:
-
communicating to a provider of an input a set of additional aspects to be applied to a part of the input, wherein the set of additional aspects is distinct from a second set of additional aspects to be applied to another input; receiving, from the provider, an obfuscated input corresponding to the part of the input, wherein a subset of the set of additional aspects is present in the obfuscated input; recovering the part of the input from the obfuscated input by removing, using a processor and a memory, the subset of the set of additional aspects from the obfuscated input, forming a recovered part; generating an entry field input corresponding to the input using the recovered part; and sending the entry field input to an application executing in a data processing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer usable program product comprising a computer usable storage device including computer usable code for obfuscating entry of information, the computer usable code comprising:
-
computer usable code for communicating to a provider of an input a set of additional aspects to be applied to a part of the input, wherein the set of additional aspects is distinct from a second set of additional aspects to be applied to another input; computer usable code for receiving, from the provider, an obfuscated input corresponding to the part of the input, wherein a subset of the set of additional aspects is present in the obfuscated input; computer usable code for recovering the part of the input from the obfuscated input by removing, using a processor and a memory, the subset of the set of additional aspects from the obfuscated input, forming a recovered part; computer usable code for generating an entry field input corresponding to the input using the recovered part; and computer usable code for sending the entry field input to an application executing in a data processing system. - View Dependent Claims (21, 22)
-
-
23. A data processing system for obfuscating entry of information, the data processing system comprising:
-
a storage device including a storage medium, wherein the storage device stores computer usable program code; and a processor, wherein the processor executes the computer usable program code, and wherein the computer usable program code comprises; computer usable code for communicating to a provider of an input a set of additional aspects to be applied to a part of the input, wherein the set of additional aspects is distinct from a second set of additional aspects to be applied to another input; computer usable code for receiving, from the provider, an obfuscated input corresponding to the part of the input, wherein a subset of the set of additional aspects is present in the obfuscated input; computer usable code for recovering the part of the input from the obfuscated input by removing, using a processor and a memory, the subset of the set of additional aspects from the obfuscated input, forming a recovered part; computer usable code for generating an entry field input corresponding to the input using the recovered part; and computer usable code for sending the entry field input to an application executing in a data processing system.
-
Specification