Instant messaging private tags
First Claim
Patent Images
1. A method comprising:
- transmitting a first data stream, the transmitting comprising;
parsing unstructured text content within a first message to identify, from the text content, a first set of sensitive data;
encrypting the first set of sensitive data using an encryption type identified by a first name and value pair;
transmitting the first message in the first data stream with a first set of private tags surrounding the first set of sensitive data, the first set of private tags identifying the first name and value pair;
receiving a second data stream, the receiving comprising;
parsing the second data stream to identify a second set of private tags surrounding a second set of sensitive data in a second message; and
decrypting the second set of sensitive data using a decryption type identified by a second name and value pair identified by the second set of private tags.
11 Assignments
0 Petitions
Accused Products
Abstract
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.
-
Citations
20 Claims
-
1. A method comprising:
-
transmitting a first data stream, the transmitting comprising; parsing unstructured text content within a first message to identify, from the text content, a first set of sensitive data; encrypting the first set of sensitive data using an encryption type identified by a first name and value pair; transmitting the first message in the first data stream with a first set of private tags surrounding the first set of sensitive data, the first set of private tags identifying the first name and value pair; receiving a second data stream, the receiving comprising; parsing the second data stream to identify a second set of private tags surrounding a second set of sensitive data in a second message; and decrypting the second set of sensitive data using a decryption type identified by a second name and value pair identified by the second set of private tags. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a processor; and a memory to store computer program instructions, the computer program instructions when executed on the processor cause the processor to perform operations comprising; transmitting a first data stream, the transmitting comprising; parsing unstructured text content within a first message to identify, from the text content, a first set of sensitive data; encrypting the first set of sensitive data using an encryption type identified by a first name and value pair; transmitting the first message in the first data stream with a first set of private tags surrounding the first set of sensitive data, the first set of private tags identifying the first name and value pair; receiving a second data stream, the receiving comprising; parsing the second data stream to identify a second set of private tags surrounding a second set of sensitive data in a second message; and decrypting the second set of sensitive data using a decryption type identified by a second name and value pair identified by the second set of private tags. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing computer program instructions, which, when executed on a processor, cause the processor to perform operations comprising:
-
transmitting a first data stream, the transmitting comprising; parsing unstructured text content within a first message to identify, from the text content, a first set of sensitive data; encrypting the first set of sensitive data using an encryption type identified by a first name and value pair; transmitting the first message in the first data stream with a first set of private tags surrounding the first set of sensitive data, the first set of private tags identifying the first name and value pair; receiving a second data stream, the receiving comprising; parsing the second data stream to identify a second set of private tags surrounding a second set of sensitive data in a second message; and decrypting the second set of sensitive data using a decryption type identified by a second name and value pair identified by the second set of private tags. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification