Claims
- 1. A method of securing data having one or more security sensitive words, characters or icons in a computer system with memories designated as a remainder store and an extract store comprising:
extracting said security sensitive words, characters or icons from said data to obtain extracted data and remainder data therefrom; storing said extracted data and said remainder data in said extract store and said remainder store, respectively; and, permitting reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance.
- 2. A method as claimed in claim 1 including filtering said data while extracting.
- 3. A method as claimed in claim 2 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter after storing said extracted data.
- 4. A method as claimed in claim 3 including encrypting one or both of said extracted data and said remainder data.
- 5. A method as claimed in claim 4 wherein the step of permitting reconstruction includes decrypting one or both of said extracted data and remainder data.
- 6. A method as claimed in claim 1 including establishing a plurality of security levels each with a respective security clearance, said security sensitive words, characters or icons being correlated with said plurality of security levels with subsets of said security sensitive words, characters or icons and the step of permitting reconstruction including the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 7. A method of securing data with a parsing algorithm via a computer system having memories designated as a remainder store and an extract store comprising:
parsing said data to obtain extracted data and remainder data therefrom; storing said extracted data and said remainder data in said extract store and said remainder store, respectively; and, permitting reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance.
- 8. A method as claimed in claim 7 wherein the step of parsing parses the data granularly.
- 9. A method as claimed in claim 7 wherein the step of parsing uses said parsing algorithm which is based on one or more of a bit count, a word, a word count, a page count, a line count, a paragraph count, an identifiable document characteristic, an identifiable word characteristic, an identifiable icon characteristic, an identifiable data object characteristic, capital letters, italics, and underline.
- 10. A method as claimed in claim 7 wherein said data is financial data and the step of parsing uses said parsing algorithm based upon one of characters in said data and character count in said data.
- 11. A method as claimed in claim 7 including establishing a plurality of security levels each with a respective security clearance, increasingly greater reconstruction if said data being correlated with increasingly higher levels of said plurality of security levels, and the step of permitting reconstruction including the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 12. A method as claimed in claim 7 including a further data security step of one from the group of storing said data without encryption, storing said data with encryption and destroying said data; said further data security step being independent of said parsing, storing and permitting reconstruction.
- 13. A method as claimed in claim 1 including displaying an advertisement prior to one or the other or both of said steps of extracting and permitting reconstruction.
- 14. A method as claimed in claim 13 including providing a hyperlink to a vendor's web site with said advertisement.
- 15. A method as claimed in claim 1 including assessing a charge for extracting, storing or permitting reconstruction.
- 16. A computer readable medium containing programming instructions for securing data having one or more security sensitive words, characters or icons in a computer system with memories designated as a remainder store and an extract store comprising:
extracting said security sensitive words, characters or icons from said data to obtain extracted data and remainder data therefrom; storing said extracted data and said remainder data in said extract store and said remainder store, respectively; and, permitting reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance.
- 17. A medium with programming instructions as claimed in claim 16 including filtering said data while extracting.
- 18. A medium with programming instructions as claimed in claim 16 including defining the filter with a group of security sensitive words, characters or icons and the method includes one of storing said filter or destroying said filter after storing said extracted data.
- 19. A medium with programming instructions as claimed in claim 18 including encrypting one or both of said extracted data and said remainder data.
- 20. A medium with programming instructions as claimed in claim 19 wherein the step of permitting reconstruction includes decrypting one or both of said extracted data and remainder data.
- 21. A medium with programming instructions as claimed in claim 16 including establishing a plurality of security levels each with a respective security clearance, said security sensitive words, characters or icons being correlated with said plurality of security levels with subsets of said security sensitive words, characters or icons and the step of permitting reconstruction including the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 22. A computer readable medium containing programming instructions for securing data with a parsing algorithm via a computer system having memories designated as a remainder store and an extract store comprising:
parsing said data to obtain extracted data and remainder data therefrom; storing said extracted data and said remainder data in said extract store and said remainder store, respectively; and, permitting reconstruction of said data via said extracted data and remainder data only in the presence of a predetermined security clearance.
- 23. A medium with programming instructions as claimed in claim 22 wherein the step of parsing parses the data granularly.
- 24. A medium with programming instructions as claimed in claim 22 wherein the step of parsing uses said parsing algorithm which is based on one or more of a bit count, a word, a word count, a page count, a line count, a paragraph count, an identifiable document characteristic, an identifiable word characteristic, an identifiable icon characteristic, an identifiable data object characteristic, capital letters, italics, and underline.
- 25. A medium with programming instructions as claimed in claim 22 wherein said data is financial data and the step of parsing uses said parsing algorithm based upon one of characters in said data and character count in said data.
- 26. A medium with programming instructions as claimed in claim 22 including establishing a plurality of security levels each with a respective security clearance, increasingly greater reconstruction if said data being correlated with increasingly higher levels of said plurality of security levels, and the step of permitting reconstruction including the step of permitting a plurality of partial reconstructions of said data in the presence of respective ones of said plurality of security clearance levels.
- 27. A medium as claimed in claim 22 including a further data security step of one from the group of storing said data without encryption, storing said data with encryption and destroying said data; said further data security step being independent of said parsing, storing and permitting reconstruction.
Parent Case Info
[0001] This is a continuation-in-part of patent application Ser. Nos. 10/008,209 and 10/008,218, both filed on Dec. 6, 2001, which are continuations-in-part of patent application Ser. No. 09/916,397 filed Jul. 27, 2001 which is a regular patent application is based upon provisional patent application No. 60/260,398, filed Jun. 5, 2001; application Ser. No. 60/287,813, filed on May 2, 2001; application No. 60/267,944, filed Feb. 12, 2001; application Ser. No. 60/247,242, filed Nov. 13, 2000 and application Ser. No. 60/247,232, filed Nov. 13, 2000.
[0002] The present invention relates to a data security system and method and, more specifically, parsing (typically through a filter), extracting and dispersion of the parsed or segregated data with the controlled reconstruction of data utilizing security protocols to provide a system, method and programming instructions stored on computer readable medium for securing data. Scrubbing credit card data or financial data from text, a data object or data stream is also discussed herein.
Provisional Applications (5)
|
Number |
Date |
Country |
|
60260398 |
Jan 2001 |
US |
|
60287813 |
May 2001 |
US |
|
60267944 |
Feb 2001 |
US |
|
60247242 |
Nov 2000 |
US |
|
60247232 |
Nov 2000 |
US |
Continuation in Parts (3)
|
Number |
Date |
Country |
Parent |
10008209 |
Dec 2001 |
US |
Child |
10155192 |
May 2002 |
US |
Parent |
10008218 |
Dec 2001 |
US |
Child |
10155192 |
May 2002 |
US |
Parent |
09916397 |
Jul 2001 |
US |
Child |
10008218 |
Dec 2001 |
US |