20240020418. Security Systems and Methods for Social Networking simplified abstract (ESW Holdings, Inc.)

From WikiPatents
Jump to navigation Jump to search

Security Systems and Methods for Social Networking

Organization Name

ESW Holdings, Inc.

Inventor(s)

Steven Sprague of Richmond MA (US)

Michael Sprague of New York NY (US)

Security Systems and Methods for Social Networking - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240020418 titled 'Security Systems and Methods for Social Networking

Simplified Explanation

Systems and methods are provided for masking data on public networks, such as social networking sites. At a publishing node, the system monitors data input fields in a webpage processed by an internet browser. The system intercepts data, such as text, images, and video input, at the data input fields before it is posted online on a public service provider's website. The publishing node controls access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure it is inaccessible to users unless they are granted access to the decoding key under the policy. Data security and control are provided to the publishing user node. Data that has already been posted may be destroyed by deleting the decryption key or a token.

  • The system monitors data input fields in webpages processed by an internet browser.
  • Data input at these fields is intercepted before being posted online on a public service provider's website.
  • Access to the posted data is controlled by a policy defined by the publishing node.
  • The posted data is transformed or tokenized to ensure it is inaccessible to unauthorized users.
  • Data security and control are provided to the publishing user node.
  • Data that has already been posted can be destroyed by deleting the decryption key or a token.

Potential applications of this technology:

  • Enhancing privacy and data security on social networking sites.
  • Protecting sensitive information from unauthorized access.
  • Controlling access to data posted on public networks.

Problems solved by this technology:

  • Preventing unauthorized access to sensitive data.
  • Providing data control and security on public networks.
  • Ensuring privacy of users' information on social networking sites.

Benefits of this technology:

  • Increased privacy and security for users on public networks.
  • Greater control over who can access and view posted data.
  • Protection of sensitive information from unauthorized users.


Original Abstract Submitted

systems and methods may be provided for masking data on public networks, such as social networking sites. at a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. the system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. the publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. the posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. in this way, data security and data control may be provided to a publishing user node. data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.