摘要 |
<p>The computer software product extracts security sensitive words, data, credits card or account numbers, icons, images or audio or video data from input data (100), thereby creating extract data (104) and reminder data (104). Extract data and remainder data are separately stored (110, 108, respectively) locally on a PC memory (116, 168, 160, 162) or on another computer in a LAN (142, 146) or WAN or on the Internet (154, 157). Encryption (238) and decryption (424, 425, 426, 430) may be utilized to enhance security (including transfers of data and memory map (158) location). Reconstruction of the data (FIG.1B and FIG. 3) is permitted only in the presence of predtermined security clearance levels (226) and full and partial reconstruction is possible with multiple levels of security (226). The data security system may be used to transparently establish and manage a separation of user-based communities of interest based upon crypto-graphically separated, need to know, security levels. The security system, as an adaptive system (FIG.8) protects against electronic attacks (460) and environmental events, generates attacks warnings (462) extracts security sensitive data, stores the data and permits full or partial reconstruction (478). Parsing (556) and dispersion (560) aspects enable users to maintain security (FIG.10). Data security for e-mail (FIG.11A) and browser programs (FIG.12A) is provided. Remainder data is sent to the e-mail addressee (624) or a browser target (712) (a designated web server). The addressee or intended recipient is permitted to retrieve the extracted data from said extract store only in the presence of a security clearance (628, 714) and hence, reconstruct the source e-mail or browser-input data with the extracted data. In other systems, the addressee reconstructs the email by decryption and integration (621, 623, 629). FIG. 1A is generally illustrative.</p> |