Movatterモバイル変換


[0]ホーム

URL:


US20180063124A1 - Method and apparatus for securing the privacy of a computer network - Google Patents

Method and apparatus for securing the privacy of a computer network
Download PDF

Info

Publication number
US20180063124A1
US20180063124A1US15/482,330US201715482330AUS2018063124A1US 20180063124 A1US20180063124 A1US 20180063124A1US 201715482330 AUS201715482330 AUS 201715482330AUS 2018063124 A1US2018063124 A1US 2018063124A1
Authority
US
United States
Prior art keywords
data
privacy
electronic
notification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/482,330
Inventor
William H. Shawn
Frederick J. Murphy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US15/482,330priorityCriticalpatent/US20180063124A1/en
Publication of US20180063124A1publicationCriticalpatent/US20180063124A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and apparatus for secure access to a computer network and for safeguarding the confidentiality and privacy of data stored and distributed by the network is disclosed. The method and apparatus addresses both limiting access to the computer network to those who are authorized to have access as well as the privacy of the information stored in the network.

Description

Claims (12)

We claim:
1. A method of secure privacy notification, said method comprising the steps:
determining the regulatory compliance requirements for privacy notification of data subjects;
transforming said requirements into electronic and non-electronic database query screens and forms;
querying a remote and/or resident database for information fields contained within said query screens and forms;
human or automated completion of said data screens;
encryption/decryption of said data screens;
human and/or automated conversion of data screens into privacy notification human readable formats;
electronic and/or non-electronic data subject feedback response methods and means; and
conversion of said data subjects feedback responses into database deletion, modification or correction of the data subject's information in accordance with said regulatory requirements.
2. The method ofclaim 1 wherein said electronic privacy notification and feedback response is accomplished via a secure web portal.
3. The method ofclaim 1 wherein said electronic privacy notification and feedback response is accomplished via a secure e-mail system.
4. The method ofclaim 1 wherein said electronic privacy notification and feedback response is accomplished using digital certificates comprising:
a public or private, commercial or government registration authority;
a public or private, commercial or government certificate authority;
a digital signature encryption algorithm′
a unique non-reputable uer electronic identity;
issuance of x.509 compliant certificates specifically encoded via extension to alert data processor of the data subjects privacy preferences; and
issuance of x.509 standard certificates specifically encoded via extension to alert data processors of legal and regulatory compliance requirements relevant to the data subjects privacy preferences.
5. The method ofclaim 4 wherein said digital signature algorithm is SHA-1 with DSA.
6. The method ofclaim 4 wherein said digital signature algorithm is an elliptic curve.
7. The method ofclaim 6 wherein said elliptic curve is a Koblitz binary curve.
8. The method ofclaim 4 wherein said digital signature algorithm is a block cipher such as Rijndael.
9. The method ofclaim 4 wherein the data subjects privacy preference is to “opt out” and where encoding the digital certificate to be easily read by visual inspection by distinct color coding.
10. The method ofclaim 4 wherein the data subjects privacy preference is to “opt in” and where encoding the digital certificate to be easily read by visual inspection by distinct color coding.
11. The method ofclaim 4 including third party archiving of certificate for non-repudiation, compliance audit and send and receive functions.
12. The method inclaim 4 including the binding of a users identity and access authorizations to a physical device, such as a USB key, and challenging the key at a remote email server in order to gain access to the users authorized email box and messages.
US15/482,3302004-01-302017-04-07Method and apparatus for securing the privacy of a computer networkAbandonedUS20180063124A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/482,330US20180063124A1 (en)2004-01-302017-04-07Method and apparatus for securing the privacy of a computer network

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US10/767,815US9621539B2 (en)2004-01-302004-01-30Method and apparatus for securing the privacy of a computer network
US15/482,330US20180063124A1 (en)2004-01-302017-04-07Method and apparatus for securing the privacy of a computer network

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/767,815ContinuationUS9621539B2 (en)2004-01-302004-01-30Method and apparatus for securing the privacy of a computer network

Publications (1)

Publication NumberPublication Date
US20180063124A1true US20180063124A1 (en)2018-03-01

Family

ID=43498295

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/767,815Expired - Fee RelatedUS9621539B2 (en)2004-01-302004-01-30Method and apparatus for securing the privacy of a computer network
US15/482,330AbandonedUS20180063124A1 (en)2004-01-302017-04-07Method and apparatus for securing the privacy of a computer network

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/767,815Expired - Fee RelatedUS9621539B2 (en)2004-01-302004-01-30Method and apparatus for securing the privacy of a computer network

Country Status (1)

CountryLink
US (2)US9621539B2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9069436B1 (en)*2005-04-012015-06-30Intralinks, Inc.System and method for information delivery based on at least one self-declared user attribute
US9553860B2 (en)2012-04-272017-01-24Intralinks, Inc.Email effectivity facility in a networked secure collaborative exchange environment
GB2530685A (en)2014-04-232016-03-30Intralinks IncSystems and methods of secure data exchange
US9507960B2 (en)*2015-02-252016-11-29Citigroup Technology, Inc.Systems and methods for automated data privacy compliance
US10033702B2 (en)2015-08-052018-07-24Intralinks, Inc.Systems and methods of secure data exchange
US12160426B2 (en)*2022-12-042024-12-03Asad HasanHuman system operator identity associated audit trail of containerized network application with prevention of privilege escalation, online black-box testing, and related systems and methods

Citations (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6173057B1 (en)*1996-11-152001-01-09Advanced Pc Technologies (Apct)Method of making secure and controlling access to information from a computer platform having a microcomputer
US20010020241A1 (en)*2000-03-022001-09-06Sony CorporationCommunication network system, gateway, data communication method and program providing medium
US20010053987A1 (en)*2000-06-152001-12-20Siemens AktiengesellschaftTele-health information system
US6351817B1 (en)*1999-10-272002-02-26Terence T. FlyntzMulti-level secure computer with token-based access control
US20020150241A1 (en)*2000-10-252002-10-17Edward ScheidtElectronically signing a document
US6480850B1 (en)*1998-10-022002-11-12Ncr CorporationSystem and method for managing data privacy in a database management system including a dependently connected privacy data mart
US20030004734A1 (en)*2001-06-192003-01-02International Business Machines CorporationUsing an object model to improve handling of personally identifiable information
US20030035548A1 (en)*2001-08-172003-02-20Netscape Communications CorporationClient controlled data recovery management
US20030065727A1 (en)*2001-09-282003-04-03Capital One Financial CorporationSystems and methods for providing secured electronic messaging
US20030088520A1 (en)*2001-11-072003-05-08International Business Machines CorporationSystem, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network
US20030115468A1 (en)*2001-12-192003-06-19Aull Kenneth W.Assignment of user certificates/private keys in token enabled public key infrastructure system
US20030187993A1 (en)*2000-06-232003-10-02Stephan RibotAccess control in client-server systems
US20040098285A1 (en)*2002-09-172004-05-20Jodi BreslinSystem and method for managing data privacy
US20040101142A1 (en)*2001-07-052004-05-27Nasypny Vladimir VladimirovichMethod and system for an integrated protection system of data distributed processing in computer networks and system for carrying out said method
US20040139025A1 (en)*2001-05-082004-07-15Coleman Thomas E.Privacy protection system and method
US20050131839A1 (en)*2003-12-162005-06-16Pitney Bowes IncorporatedMethod and system for facilitating transactions
US7069427B2 (en)*2001-06-192006-06-27International Business Machines CorporationUsing a rules model to improve handling of personally identifiable information
US7218735B2 (en)*2000-04-182007-05-15GemplusCryptography method on elliptic curves
US7493497B1 (en)*2000-02-032009-02-17Integrated Information SolutionsDigital identity device

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8626521B2 (en)*1997-11-212014-01-07Robert Bosch Healthcare Systems, Inc.Public health surveillance system
US7386516B2 (en)*1999-09-102008-06-10Metavante CorporationSystem and method for providing secure services over public and private networks using a removable portable computer-readable storage
US7167842B1 (en)*2000-06-272007-01-23Ncr Corp.Architecture and method for operational privacy in business services
US20020016923A1 (en)*2000-07-032002-02-07Knaus William A.Broadband computer-based networked systems for control and management of medical records
CA2439692A1 (en)*2001-03-012002-09-12Storeage Networking TechnologiesStorage area network (san) security
US7228438B2 (en)*2001-04-302007-06-05Matsushita Electric Industrial Co., Ltd.Computer network security system employing portable storage device
US6968334B2 (en)*2001-05-152005-11-22Nokia CorporationMethod and business process to maintain privacy in distributed recommendation systems
US20030131011A1 (en)*2002-01-042003-07-10Argent Regulatory Services, L.L.C.Online regulatory compliance system and method for facilitating compliance
US8046819B2 (en)*2003-05-202011-10-25United States Postal ServiceMethods and systems for determining security requirements for an information resource
US20050102194A1 (en)*2003-11-122005-05-12International Business Machines CorporationMethod, system, and computer program product for filtering participants in electronic transactions using privacy policies
US7496191B1 (en)*2003-12-172009-02-24Sprint Communications Company L.P.Integrated privacy rules engine and application
US7596812B2 (en)2005-06-142009-09-29Motorola, Inc.System and method for protected data transfer

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6173057B1 (en)*1996-11-152001-01-09Advanced Pc Technologies (Apct)Method of making secure and controlling access to information from a computer platform having a microcomputer
US6480850B1 (en)*1998-10-022002-11-12Ncr CorporationSystem and method for managing data privacy in a database management system including a dependently connected privacy data mart
US6351817B1 (en)*1999-10-272002-02-26Terence T. FlyntzMulti-level secure computer with token-based access control
US7493497B1 (en)*2000-02-032009-02-17Integrated Information SolutionsDigital identity device
US20010020241A1 (en)*2000-03-022001-09-06Sony CorporationCommunication network system, gateway, data communication method and program providing medium
US7218735B2 (en)*2000-04-182007-05-15GemplusCryptography method on elliptic curves
US20010053987A1 (en)*2000-06-152001-12-20Siemens AktiengesellschaftTele-health information system
US20030187993A1 (en)*2000-06-232003-10-02Stephan RibotAccess control in client-server systems
US20020150241A1 (en)*2000-10-252002-10-17Edward ScheidtElectronically signing a document
US20040139025A1 (en)*2001-05-082004-07-15Coleman Thomas E.Privacy protection system and method
US20030004734A1 (en)*2001-06-192003-01-02International Business Machines CorporationUsing an object model to improve handling of personally identifiable information
US7069427B2 (en)*2001-06-192006-06-27International Business Machines CorporationUsing a rules model to improve handling of personally identifiable information
US20040101142A1 (en)*2001-07-052004-05-27Nasypny Vladimir VladimirovichMethod and system for an integrated protection system of data distributed processing in computer networks and system for carrying out said method
US20030035548A1 (en)*2001-08-172003-02-20Netscape Communications CorporationClient controlled data recovery management
US20030065727A1 (en)*2001-09-282003-04-03Capital One Financial CorporationSystems and methods for providing secured electronic messaging
US20030088520A1 (en)*2001-11-072003-05-08International Business Machines CorporationSystem, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network
US20030115468A1 (en)*2001-12-192003-06-19Aull Kenneth W.Assignment of user certificates/private keys in token enabled public key infrastructure system
US20040098285A1 (en)*2002-09-172004-05-20Jodi BreslinSystem and method for managing data privacy
US20050131839A1 (en)*2003-12-162005-06-16Pitney Bowes IncorporatedMethod and system for facilitating transactions

Also Published As

Publication numberPublication date
US9621539B2 (en)2017-04-11
US20110022836A1 (en)2011-01-27

Similar Documents

PublicationPublication DateTitle
US20180063124A1 (en)Method and apparatus for securing the privacy of a computer network
US6081610A (en)System and method for verifying signatures on documents
CN101336437B (en) Communication system for providing delivery of email messages
US10904014B2 (en)Encryption synchronization method
US8560457B2 (en)Enhanced network server authentication using a physical out-of-band channel
US11843590B2 (en)Methods and systems for secure digital credentials
JP5016749B2 (en) System and method for electronic transmission, storage and retrieval of authenticated documents
US20090217027A1 (en)Safe e-mail for everybody
CA2305249A1 (en)Virtual safe
WO2020143312A1 (en)Data saving and querying method, apparatus, computer system and readable storage medium
US20130340096A1 (en)Methods and systems for protection of identity
US20100095357A1 (en)Identity theft protection and notification system
US20030132285A1 (en)Identification of an individual using a multiple purpose card
US20080100874A1 (en)Notary document processing and storage system and methods
KR19990044692A (en) Document authentication system and method
US10778625B2 (en)Electronic business postal system
US7788485B2 (en)Method and system for secure transfer of electronic information
US20090025092A1 (en)Secure online data storage and retrieval system and method
CN101558422A (en)Extensible email
WO2000046952A1 (en)Method for sending secure email via standard browser
NZ553284A (en)Identity theft protection and notification system
LeitstelleOSCI-Transport 1.2
DevikarSecurity issues in electronic data interchange (EDI) systems
Huston et al.Electronic Signatures Essay Research Paper Technical WritingEnglish
HK1017540B (en)Document authentication system and method

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp