Claims
- 1. A method of securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a remote memory designated as an extract store comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; storing said extracted data in said extract store; emailing said remainder data to an addressee; permitting retrieval of said extracted data from said extract store only in the presence of a predetermined security clearance; and, reconstructing said email data with said extracted data and remainder data.
- 2. A method as claimed in claim 1 including filtering said email data prior to extracting.
- 3. A method as claimed in claim 2 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 4. A method as claimed in claim 3 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 5. A method as claimed in claim 2 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter prior to storing said extracted data or emailing said remainder data.
- 6. A method as claimed in claim 3 including encrypting one or both of said extracted data and said remainder data.
- 7. A method as claimed in claim 6 including providing multiple levels of encryption and corresponding multiple levels of security clearance.
- 8. A method as claimed in claim 7 wherein said remainder data is encrypted with said multiple levels of encryption.
- 9. A method as claimed in claim 8 wherein the step of reconstruction includes decrypting one or both of said extracted data and remainder data with respect to one of more of said multiple levels of encryption based upon one or more of said multiple levels of security clearance.
- 10. A method as claimed in claim 1 including establishing a plurality of security levels each with a respective security clearance, said security sensitive words, characters or icons being correlated with said plurality of security levels with subsets of said security sensitive words, characters or icons and the step of reconstruction including the step of permitting a plurality of partial reconstructions of said email data in the presence of respective ones of said plurality of security clearance levels.
- 11. A method as claimed in claim 1 wherein the extracting operates on credit card data, financial data or account.
- 12. A method of securing email data having one or more security sensitive words, characters or icons, the method used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, the method comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in said extract store; and, emailing said remainder data to an addressee.
- 13. A method as claimed in claim 12 including filtering said email data prior to extracting.
- 14. A method as claimed in claim 13 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 15. A method as claimed in claim 14 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 16. A method as claimed in claim 13 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter prior to storing said extracted data or emailing said remainder data.
- 17. A method as claimed in claim 16 including encrypting one or both of said extracted data and said remainder data.
- 18. A method as claimed in claim 17 wherein said remainder data is encrypted with said multiple levels of encryption.
- 19. A method as claimed in claim 12 wherein the extracting operates on credit card data, financial data or account.
- 20. A method of securing email data having one or more security sensitive words, characters or icons comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email; emailing said composite email to an addressee; reconstructing said email data from said composite email with decryption of said extracted data only in the presence of a predetermined security clearance.
- 21. A method as claimed in claim 20 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 22. A method as claimed in claim 21 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 23. A method as claimed in claim 20 including providing multiple levels of encryption and corresponding multiple levels of security clearance.
- 24. A method as claimed in claim 23 wherein said remainder data is encrypted with said multiple levels of encryption.
- 25. A method as claimed in claim 24 wherein the step of reconstruction includes decrypting one or both of said extracted data and remainder data with respect to one of more of said multiple levels of encryption based upon one or more of said multiple levels of security clearance.
- 26. A method of securing email data having one or more security sensitive words, characters or icons, the method used in conjunction with an addressee email device having a decryption routine, the method comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email; and emailing said composite email to an addressee.
- 27. A method as claimed in claim 26 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 28. A method as claimed in claim 27 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 29. A method as claimed in claim 26 including providing multiple levels of encryption and corresponding multiple levels of security clearance.
- 30. A method as claimed in claim 29 wherein said remainder data is encrypted with said multiple levels of encryption.
- 31. A method of securing email data with a parsing algorithm via a distributed computer system with a remote memory designated as an extract store comprising:
parsing said email data to obtain extracted data and remainder data therefrom; storing said extracted data in said extract store; emailing said remainder data to an addressee; and, permitting reconstruction of said email data via said extracted data and remainder data only in the presence of a predetermined security clearance.
- 32. A method as claimed in claim 31 wherein the step of parsing parses the email data granularly.
- 33. A method as claimed in claim 31 wherein the step of parsing uses said parsing algorithm which is based on one or more of a bit count, a word, a word count, a page count, a line count, a paragraph count, an identifiable document characteristic, an identifiable word characteristic, an identifiable icon characteristic, an identifiable data object characteristic, capital letters, italics, and underline.
- 34. A method as claimed in claim 31 wherein said email data is financial data and the step of parsing uses said parsing algorithm based upon one of characters in said email data and character count in said data.
- 35. A method as claimed in claim 31 wherein the parsing of email data operates on credit card data, financial data or account data.
- 36. A method of securing email data with a parsing algorithm, the method used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, the method comprising:
parsing said email data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in said extract store; and emailing said remainder data to an addressee.
- 37. A method as claimed in claim 36 wherein the step of parsing parses the email data granularly.
- 38. A method as claimed in claim 36 wherein the step of parsing uses said parsing algorithm which is based on one or more of a bit count, a word, a word count, a page count, a line count, a paragraph count, an identifiable document characteristic, an identifiable word characteristic, an identifiable icon characteristic, an identifiable data object characteristic, capital letters, italics, and underline.
- 39. A method as claimed in claim 36 wherein said email data is financial data and the step of parsing uses said parsing algorithm based upon one of characters in said email data and character count in said data.
- 40. A method as claimed in claim 36 wherein the parsing operates on email data which is credit card data, financial data or account data.
- 41. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons via a distributed computer system with a remote memory designated as an extract store comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; storing said extracted data in said extract store; emailing said remainder data to an addressee; permitting retrieval of said extracted data from said extract store only in the presence of a predetermined security clearance; and, reconstructing said email data with said extracted data and remainder data.
- 42. A medium with programming instructions as claimed in claim 41 including filtering said email data prior to extracting.
- 43. A medium with programming instructions as claimed in claim 42 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 44. A medium with programming instructions as claimed in claim 43 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 45. A medium with programming instructions as claimed in claim 42 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter prior to storing said extracted data or emailing said remainder data.
- 46. A medium with programming instructions as claimed in claim 45 including encrypting one or both of said extracted data and said remainder data.
- 47. A medium with programming instructions as claimed in claim 46 including providing multiple levels of encryption and corresponding multiple levels of security clearance.
- 48. A medium with programming instructions as claimed in claim 47 wherein said remainder data is encrypted with said multiple levels of encryption.
- 49. A medium with programming instructions as claimed in claim 48 wherein the step of reconstruction includes decrypting one or both of said extracted data and remainder data with respect to one of more of said multiple levels of encryption based upon one or more of said multiple levels of security clearance.
- 50. A medium with programming instructions as claimed in claim 41 including establishing a plurality of security levels each with a respective security clearance, said security sensitive words, characters or icons being correlated with said plurality of security levels with subsets of said security sensitive words, characters or icons and the step of reconstruction including the step of permitting a plurality of partial reconstructions of said email data in the presence of respective ones of said plurality of security clearance levels.
- 51. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in said extract store; and, emailing said remainder data to an addressee.
- 52. A medium with programming instructions as claimed in claim 51 including filtering said email data prior to extracting.
- 53. A medium with programming instructions as claimed in claim 52 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 54. A medium with programming instructions as claimed in claim 53 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 55. A medium with programming instructions as claimed in claim 52 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter prior to storing said extracted data or emailing said remainder data.
- 56. A medium with programming instructions as claimed in claim 55 including encrypting one or both of said extracted data and said remainder data.
- 57. A medium with programming instructions as claimed in claim 56 wherein said remainder data is encrypted with said multiple levels of encryption.
- 58. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email; emailing said composite email to an addressee; reconstructing said email data from said composite email with decryption of said extracted data only in the presence of a predetermined security clearance.
- 59. A medium with programming instructions as claimed in claim 58 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 60. A medium with programming instructions as claimed in claim 59 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 61. A medium with programming instructions as claimed in claim 58 including providing multiple levels of encryption and corresponding multiple levels of security clearance.
- 62. A medium with programming instructions as claimed in claim 61 wherein said remainder data is encrypted with said multiple levels of encryption.
- 63. A medium with programming instructions as claimed in claim 62 wherein the step of reconstruction includes decrypting one or both of said extracted data and remainder data with respect to one of more of said multiple levels of encryption based upon one or more of said multiple levels of security clearance.
- 64. A computer readable medium containing programming instructions for securing email data having one or more security sensitive words, characters or icons, used in conjunction with an addressee email device having a decryption routine, comprising:
extracting said security sensitive words, characters or icons from said email data to obtain extracted data and remainder data therefrom; encrypting said extracted data and either appending or including said encrypted extracted data with said remainder data to form a composite email; and emailing said composite email to an addressee.
- 65. A medium with programming instructions as claimed in claim 64 including displaying said security sensitive words, characters or icons in a distinguishing manner prior to extracting.
- 66. A medium with programming instructions as claimed in claim 65 including permitting one of user selection and user confirmation of said security sensitive words, characters or icons prior to extracting.
- 67. A medium with programming instructions as claimed in claim 64 including providing multiple levels of encryption and corresponding multiple levels of security clearance.
- 68. A medium with programming instructions as claimed in claim 67 wherein said remainder data is encrypted with said multiple levels of encryption.
- 69. A computer readable medium containing programming instructions for securing email data with a parsing algorithm via a distributed computer system with a remote memory designated as an extract store comprising:
parsing said email data to obtain extracted data and remainder data therefrom; storing said extracted data in said extract store; emailing said remainder data to an addressee; and, permitting reconstruction of said email data via said extracted data and remainder data only in the presence of a predetermined security clearance.
- 70. A medium with programming instructions as claimed in claim 69 wherein the step of parsing parses the email data granularly.
- 71. A medium with programming instructions as claimed in claim 69 wherein the step of parsing uses said parsing algorithm which is based on one or more of a bit count, a word, a word count, a page count, a line count, a paragraph count, an identifiable document characteristic, an identifiable word characteristic, an identifiable icon characteristic, an identifiable data object characteristic, capital letters, italics, and underline.
- 72. A medium with programming instructions as claimed in claim 69 wherein said email data is financial data and the step of parsing uses said parsing algorithm based upon one of characters in said email data and character count in said data.
- 73. A computer readable medium containing programming instructions for securing email data with a parsing algorithm, used in conjunction with a distributed computer-based system having a remote memory designated as an extract store and an addressee email device, comprising:
parsing said email data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in said extract store; and emailing said remainder data to an addressee.
- 74. A medium with programming instructions as claimed in claim 73 wherein the step of parsing parses the email data granularly.
- 75. A medium with programming instructions as claimed in claim 73 wherein the step of parsing uses said parsing algorithm which is based on one or more of a bit count, a word, a word count, a page count, a line count, a paragraph count, an identifiable document characteristic, an identifiable word characteristic, an identifiable icon characteristic, an identifiable data object characteristic, capital letters, italics, and underline.
- 76. A medium with programming instructions as claimed in claim 73 wherein said email data is financial data and the step of parsing uses said parsing algorithm based upon one of characters in said email data and character count in said data.
- 77. A method of securing data passing through a browser, said data having one or more security sensitive words, characters or icons, the method deployed in a distributed computer system with a remote memory designated as an extract store comprising:
extracting said security sensitive words, characters or icons from said data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in said extract store; and forwarding said remainder data to a targeted destination in said distributed computer system.
- 78. A method as claimed in claim 77 including filtering said data while extracting.
- 79. A method as claimed in claim 78 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter after storing said extracted data.
- 80. A method as claimed in claim 79 including encrypting one or both of said extracted data and said remainder data.
- 81. A method as claimed in claim 77 wherein the extracting step operates on credit data, financial data or account data.
- 82. A computer readable medium containing programming instructions for securing data passing through a browser, said data having one or more security sensitive words, characters or icons, used in conjunction with a distributed computer system with a remote memory designated as an extract store comprising:
extracting said security sensitive words, characters or icons from said data to obtain extracted data and remainder data therefrom; facilitating the storage of said extracted data in said extract store; and forwarding said remainder data to a targeted destination in said distributed computer system.
- 83. A medium with programming instructions as claimed in claim 82 including filtering said data while extracting.
- 84. A medium with programming instructions as claimed in claim 83 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter after storing said extracted data.
- 85. A medium with programming instructions as claimed in claim 84 including encrypting one or both of said extracted data and said remainder data.
Parent Case Info
[0001] This is a continuation-in-part of patent application Ser. Nos. 10/008,209 and 10/008,218, both filed on Dec. 6, 2001, which are a continuations-in-part of patent application Ser. No. 09/916,397 filed Jul. 27, 2001 which is a regular patent application is based upon provisional patent application No. 60/260,398, filed Jun. 5, 2001; application No. 60/287,813, filed on May, 2, 2001; application No. 60/267,944, filed Feb. 12, 2001; application No. 60/247,242, filed Nov. 13, 2000 and application No. 60/247,232, filed Nov. 13, 2000.
Provisional Applications (5)
|
Number |
Date |
Country |
|
60260398 |
Jan 2001 |
US |
|
60287813 |
May 2001 |
US |
|
60267944 |
Feb 2001 |
US |
|
60247242 |
Nov 2000 |
US |
|
60247232 |
Nov 2000 |
US |
Continuation in Parts (3)
|
Number |
Date |
Country |
Parent |
10008209 |
Dec 2001 |
US |
Child |
10155525 |
May 2002 |
US |
Parent |
10008218 |
Dec 2001 |
US |
Child |
10155525 |
May 2002 |
US |
Parent |
09916397 |
Jul 2001 |
US |
Child |
10008218 |
Dec 2001 |
US |