Security systems and methods for social networking
First Claim
1. A system for encoding electronic data published by a publishing user node, the system comprising:
- a processor; and
a memory, coupled to the processor, comprising code stored therein and executable by the processor for;
detecting, via a listener, when an executing browser is about to draw a third party webpage at the publishing user node;
in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at a form input field by;
parsing contents of the third party webpage to detect one or more form input fields;
in response to detecting input at a detected form input field in the third party webpage, assigning a policy ID associated with the detected form input field;
transmitting the policy ID to a policy node to request an encoding key for encoding the input of the detected form input field;
receiving a unique identifier assigned to the detected form input field and the encoding key for encoding the input of the detected form input field; and
in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with the encoded content.
2 Assignments
0 Petitions
Accused Products
Abstract
Data may be masked on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group has access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
-
Citations
44 Claims
-
1. A system for encoding electronic data published by a publishing user node, the system comprising:
-
a processor; and a memory, coupled to the processor, comprising code stored therein and executable by the processor for; detecting, via a listener, when an executing browser is about to draw a third party webpage at the publishing user node; in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at a form input field by; parsing contents of the third party webpage to detect one or more form input fields; in response to detecting input at a detected form input field in the third party webpage, assigning a policy ID associated with the detected form input field; transmitting the policy ID to a policy node to request an encoding key for encoding the input of the detected form input field; receiving a unique identifier assigned to the detected form input field and the encoding key for encoding the input of the detected form input field; and in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with the encoded content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product for encoding electronic data published by a user node, the computer program product being embodied on a non-transitory computer-readable medium and comprising code configured so as when executed to perform operations of:
-
using a listener to detect when an executing browser is about to draw a third party webpage at the publishing user node; in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at an form input field by; parsing contents of the third party webpage to detect one or more form input fields; in response to detecting input at a detected form input field in the third party webpage, assigning, a policy ID associated with the detected form input field; transmitting the policy ID to a policy node to request an encoding key for encoding the input of the detected form input field; receiving a unique identifier assigned to the detected form input field and the encoding key for encoding the input at the detected form input field; and in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with the encoded content. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification