Private data protection method for a network kiosk

Electrical computers and digital processing systems: multicomput – Remote data accessing – Using interconnected networks

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S001100

Reexamination Certificate

active

06981030

ABSTRACT:
A method of protecting private data for a network kiosk which masks entered private data with a symbol. The method includes the steps of determining fields in the web page which contain the private data by the kiosk, and masking the private data by the kiosk.

REFERENCES:
patent: 5745909 (1998-04-01), Perlman et al.
patent: 5761071 (1998-06-01), Bernstein et al.
patent: 5945989 (1999-08-01), Freishtat et al.
patent: 5963925 (1999-10-01), Kolling et al.
patent: 5974455 (1999-10-01), Monier
patent: 6016476 (2000-01-01), Maes et al.
patent: 6032196 (2000-02-01), Monier
patent: 6128624 (2000-10-01), Papierniak et al.
patent: 6151609 (2000-11-01), Truong
patent: 6295057 (2001-09-01), Rosin et al.
patent: 6311214 (2001-10-01), Rhoads
patent: 6317795 (2001-11-01), Malkin et al.
patent: 6412008 (2002-06-01), Fields et al.
patent: 6445306 (2002-09-01), Trovato et al.
patent: 6460069 (2002-10-01), Berlin et al.
patent: 6564323 (2003-05-01), Takahashi et al.
patent: 6571271 (2003-05-01), Savitzky et al.
patent: 6605120 (2003-08-01), Fields et al.
patent: 6662199 (2003-12-01), Flight et al.
patent: 6701350 (2004-03-01), Mitchell
patent: 6757869 (2004-06-01), Li et al.
patent: 6842767 (2005-01-01), Partovi et al.
Using SEARCHScript ; www.princeton.edu/search97/doc/srchscr/02—scr.htm.
PubTeX output Feb. 24, 1999:1456 ; woodstock.wesleyan.edu/sasdoc/saspdf.v7/graph/c05.pdf.
Customized metadata for Internet information; Dunkel, B.; Soparkar, N.; Weinstein, P.; Knowledge-Based Intelligent Electronic Systems, 1997. KES '97. Proceedings., 1997 First International Conference on , vol.: 2, May 21-23, 1997.
Agents and the Internet: infrastructure for mass customization; Baker, A.D.; Van Dyke Parunak, H.; Erol, K.; Internet Computing, IEEE , vol.: 3 , Issue: 5 , Sep.-Oct. 1999.
Bayesian Reliability Modeling For Masked System Lifetime Data—Kuo, Yang (1998) ;merlot.stat.uconn.edu/pub/papers/tr98/tr9810.ps.
Adaptable Traffic Masking Techniques for Traffic Flow . . . —Timmerman ; usc.edu/pub/csinfo/tech-reports/papers/96-641.ps.Z.
Protocols for Issuing Public-Key Certificates over the Internet—James Gray ; www.cs.ust.hk/˜gray/papers/CI-A4.ps.gz.
WWW Electronic Commerce and Java Trojan Horses—Tygar, Whitten (1996): www.cs.cmu.edu/˜tygar/papers/decaf/main.ps.
Conputing Refinable Integrals—Documentation of the Program—Kunoth (1995) www.isc.tamu.edu/iscpubs/9502/ps.
Free Riding on Gnutella—Adar, Huberman (2000) www.parc.xerox.com/istl/groups/iea/papers/gnutella/Gnutella.pdf.
The TAMU Security Package: AnOngoing Response to INternet . . . —David Safford (1993) ftp.cso.uiuc.edu/pub/security/coast/unix/sra/TAMU/tamu-security-overview.ps.gz.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Private data protection method for a network kiosk does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Private data protection method for a network kiosk, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Private data protection method for a network kiosk will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3498337

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.