Method and system for obscuring and securing financial data in an online banking application
First Claim
Patent Images
1. A method for obscuring critical information communicated over a network, the method comprising:
- receiving a set of data;
producing a file which represents a character in the data with at least one image, thereby avoiding representing the data in plain text and reducing the risk of scraping; and
communicating the file to a client, thereby allowing the client to present the data using the embedded images.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that obscures critical information communicated over a network. During operation, the system receives a set of data and produces a file which represents a character in the data with at least one image, thereby avoiding representing the data in plain text and reducing the risk of scraping. The system then communicates the file to a client, thereby allowing the client to present the data using the embedded images.
24 Citations
22 Claims
-
1. A method for obscuring critical information communicated over a network, the method comprising:
-
receiving a set of data; producing a file which represents a character in the data with at least one image, thereby avoiding representing the data in plain text and reducing the risk of scraping; and communicating the file to a client, thereby allowing the client to present the data using the embedded images. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for securing critical information communicated over a network, the method comprising:
-
receiving one or more steganographically encoded cover images; extracting concealed data from the cover images based on a set of pre-determined rules; and presenting the data to a user. - View Dependent Claims (10, 11)
-
-
12. A computer system for obscuring critical information communicated over a network, the computer system comprising:
-
a processor; a memory; a receiving mechanism configured to receive a set of data; a data obscuring mechanism configured to produce a file which represents a character in the data with at least one image, thereby avoiding representing the data in plain text and reducing the risk of scraping; and a communication mechanism configured to communicate the file to a client, thereby allowing the client to present the data using the embedded images. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer system for securing critical information communicated over a network, the computer system comprising:
-
a processor; a memory; a receiving mechanism configured to receive one or more steganographically encoded cover images; a decryption mechanism configured to extract concealed data from the cover images based on a set of pre-determined rules; and a presentation mechanism configured to present the data to a user. - View Dependent Claims (21, 22)
-
Specification