Method and system for obscuring and securing financial data in an online banking application
First Claim
Patent Images
1. A method for obscuring critical information communicated over a network, the method comprising:
- receiving a set of data;
analyzing the set of data to determine a string of one or more characters which represents a subset of the set of data;
generating multiple images, wherein the multiple images convey the subset of the set of data to a user when viewed by the user, and wherein at least one character in the string of one or more characters is split across two or more images in the multiple images;
substituting the multiple images for the subset in the set of data;
producing a file which includes the set of data with the multiple images, thereby avoiding representing the subset of the set of data in plain text and reducing the risk of scraping; and
communicating the file to a client, thereby allowing the client to present the set of data that includes the multiple images to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that obscures critical information communicated over a network. During operation, the system receives a set of data and produces a file which represents a character in the data with at least one image, thereby avoiding representing the data in plain text and reducing the risk of scraping. The system then communicates the file to a client, thereby allowing the client to present the data using the embedded images.
57 Citations
18 Claims
-
1. A method for obscuring critical information communicated over a network, the method comprising:
-
receiving a set of data; analyzing the set of data to determine a string of one or more characters which represents a subset of the set of data; generating multiple images, wherein the multiple images convey the subset of the set of data to a user when viewed by the user, and wherein at least one character in the string of one or more characters is split across two or more images in the multiple images; substituting the multiple images for the subset in the set of data; producing a file which includes the set of data with the multiple images, thereby avoiding representing the subset of the set of data in plain text and reducing the risk of scraping; and communicating the file to a client, thereby allowing the client to present the set of data that includes the multiple images to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for obscuring critical information communicated over a network, the computer system comprising:
-
a processor; a memory; a receiving mechanism configured to receive a set of data; an analysis mechanism configured to analyze the set of data to determine a string of one or more characters which represents a subset of the set of data; an image generation mechanism configured to generate multiple images, wherein the multiple images convey the subset of the set of data to a user when viewed by the user, and wherein at least one character in the string of one or more characters is split across two or more images in the multiple images; a substitution mechanism configured to substitute the multiple images for the subset in the set of data; a data obscuring mechanism configured to produce a file which includes the set of data with the multiple images, thereby avoiding representing the subset of the set of data in plain text and reducing the risk of scraping; and a communication mechanism configured to communicate the file to a client, thereby allowing the client to present the set of data that includes the multiple images to the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for obscuring critical information communicated over a network, the method comprising:
-
receiving a set of data; analyzing the set of data to determine a string of one or more characters which represents a subset of the set of data; generating multiple images, wherein the multiple images convey the subset of the set of data to a user when viewed by the user, wherein said generating involves dynamically generating the multiple images for each session, thereby preventing an unauthorized scraper from acquiring a mapping between the multiple images and a character through optical character recognition (OCR); substituting the multiple images for the subset in the set of data; producing a file which includes the set of data with the multiple images, thereby avoiding representing the subset of the set of data in plain text and reducing the risk of scraping; and communicating the file to a client, thereby allowing the client to present the set of data that includes the multiple images to the user.
-
-
18. A computer system for obscuring critical information communicated over a network, the computer system comprising:
-
a processor; and a memory storing instructions that, when executed by the processor, cause the computer system to perform a method, the method comprising; receiving a set of data; analyzing the set of data to determine a string of one or more characters which represents a subset of the set of data; generating multiple images, wherein the multiple images convey the subset of the set of data to a user when viewed by the user, wherein said generating involves dynamically generating the multiple images for each session, thereby preventing an unauthorized scraper from acquiring a mapping between the multiple images and a character through optical character recognition (OCR); substituting the multiple images for the subset in the set of data; producing a file which includes the set of data with the multiple images, thereby avoiding representing the subset of the set of data in plain text and reducing the risk of scraping; and communicating the file to a client, thereby allowing the client to present the set of data that includes the multiple images to the user.
-
Specification