Controlling data transmissions from a computer
First Claim
Patent Images
1. A method comprising;
- receiving a stream of keystroke data in a first computer for transmission from the first computer;
comparing the keystroke data to at least one predetermined pattern of arbitrary characters indicative of a personal information item to determine whether a portion of the stream of keystroke data indicates the personal information item; and
based on the determination, automatically taking action to control transmission of the portion of the stream.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes receiving a stream of data in a computer for transmission from the computer. A determination is made whether a portion of the stream of data indicates personal information. Based on the determination, action is automatically taken to control transmission of the portion of the stream. The method may be performed, for example, by a processor of the computer.
125 Citations
31 Claims
-
1. A method comprising;
-
receiving a stream of keystroke data in a first computer for transmission from the first computer;
comparing the keystroke data to at least one predetermined pattern of arbitrary characters indicative of a personal information item to determine whether a portion of the stream of keystroke data indicates the personal information item; and
based on the determination, automatically taking action to control transmission of the portion of the stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
using a keyboard of the first computer to generate the stream of keystroke data.
-
-
5. The method of claim 1, wherein the act of taking action includes:
prompting a user to indicate whether transmission of the portion is desired if the portion indicates personal information.
-
6. The method of claim 1, wherein the act of taking action includes:
removing the portion from the stream of keystroke data if the portion indicate personal information.
-
7. The method of claim 1, further comprising:
intercepting the stream of keystroke data before the stream is processed by execution of an operating system.
-
8. The method of claim 1, wherein at least one of the personal information items comprises a credit card number.
-
9. A computer system comprising:
-
an input device to generate a stream of keystroke data;
an output device; and
a processor to;
compare the keystroke data to at least one predetermined pattern of arbitrary characters indicative of a personal information item to determine whether a portion of the stream of keystroke data indicates the personal information item, and based on the determination, take action to control transmission of the portion of the stream by the output device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An article comprising a computer readable storage medium storing instructions to cause a computer to:
-
receive a stream of keystroke data in a first computer for transmission to a second computer;
compare the keystroke data to at least one predetermined pattern of arbitrary characters indicative of a personal information item to determine whether a portion of the stream of keystroke data indicates the personal information item; and
based on the determination, take action to control transmission of the portion of the stream. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method comprising:
-
monitoring a stream of keystroke data to determine whether a portion of the stream of keystroke data indicates a pattern of arbitrary characters indicative of personal information; and
selectively regulating access of the keystroke data by a browser application program based on the determination. - View Dependent Claims (21, 22, 23, 24, 25)
comparing the keystroke data to predetermined patterns of keystroke data to make the determination.
-
-
22. The method of claim 20, further comprising:
prompting a user to indicate whether transmission of the portion is desired if the portion indicates personal information.
-
23. The method of claim 20, further comprising:
removing the portion from the stream of keystroke data if the portion indicates personal information.
-
24. The method of claim 20, further comprising:
intercepting the stream of keystroke data before the stream is processed by execution of an operating system.
-
25. The method of claim 20, wherein the personal information comprises a credit card number.
-
26. An article comprising a machine readable storage medium storing instructions to cause a processor to:
-
monitor a stream of keystroke data to determine whether a portion of the stream of keystroke data indicates a pattern of arbitrary characters indicative of personal information; and
selectively regulate access of the keystroke data by a browser application program based on the determination. - View Dependent Claims (27, 28, 29, 30, 31)
compare the keystroke data to predetermined patterns of keystroke data to make the determination.
-
-
28. The article of claim 26, the medium storing instructions to cause the processor to:
prompt a user to indicate whether transmission of the portion is desired if the portion indicates personal information.
-
29. The article of claim 26, the medium storing instructions to cause the processor to:
remove the portion from the stream of keystroke data if the portion indicates personal information.
-
30. The article of claim 26, the medium storing instructions to cause the processor to:
intercept the stream of keystroke data before the stream is processed by execution of an operating system.
-
31. The article of claim 26, wherein the personal information comprises a credit card number.
Specification