System and method of applying multiple adaptive privacy control layers to single-layered media file types
First Claim
1. A non-transitory computer readable medium comprising computer executable instructions stored thereon that when executed cause one or more processing units to:
- receive an indication of a first protected portion and a second protected portion of a file of a single-layered, lossy file type having first dimensions, wherein the file further comprises anchor points;
receive first and second respective access permission settings for each of the first and second protected portions;
receive an indication of a first recipient for the first protected portion;
receive an indication of a second recipient for the second protected portion;
generate a first layer representation corresponding to the first protected portion and a second layer representation corresponding to the second protected portion;
generate an edited copy of the file based on the indication of the first and the second protected portions to create an edited single-layered, lossy file;
add the first and second layer representations back into the file structure of the edited single-layered, lossy file;
crop the edited single-layered, lossy file to have dimensions different from the first dimensions; and
transmit the cropped and edited single-layered, lossy file to the first and the second recipients,wherein the anchor points are configured to align the first and second layer representations at the correct positions within the cropped and edited single-layered, lossy file when an authorized recipient views the cropped and edited single-layered, lossy file in an authorized viewing application.
1 Assignment
0 Petitions
Accused Products
Abstract
Users desire a communications system that allows the users to apply customized privacy settings (and, optionally, encryption keys) differently to particular portions of a document—even if the document is of a ‘lossy’ file type, e.g., a JPEG image. The custom access permission settings may be implemented by obfuscating portions of the original file and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original lossy file in the form of “layers” (e.g., the bit-equivalent of PNG layers). The individual encrypted layers may then be decrypted according to each recipient'"'"'s permissions and layered on top of the original lossy file ‘in memory’ before being displayed to the recipient. The use of multiple encrypted layers allows for the visual revelation of the content of the original lossy file without modifying the actual underlying image content of the original lossy file.
50 Citations
23 Claims
-
1. A non-transitory computer readable medium comprising computer executable instructions stored thereon that when executed cause one or more processing units to:
-
receive an indication of a first protected portion and a second protected portion of a file of a single-layered, lossy file type having first dimensions, wherein the file further comprises anchor points; receive first and second respective access permission settings for each of the first and second protected portions; receive an indication of a first recipient for the first protected portion; receive an indication of a second recipient for the second protected portion; generate a first layer representation corresponding to the first protected portion and a second layer representation corresponding to the second protected portion; generate an edited copy of the file based on the indication of the first and the second protected portions to create an edited single-layered, lossy file; add the first and second layer representations back into the file structure of the edited single-layered, lossy file; crop the edited single-layered, lossy file to have dimensions different from the first dimensions; and transmit the cropped and edited single-layered, lossy file to the first and the second recipients, wherein the anchor points are configured to align the first and second layer representations at the correct positions within the cropped and edited single-layered, lossy file when an authorized recipient views the cropped and edited single-layered, lossy file in an authorized viewing application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a memory; and one or more processing units, communicatively coupled to the memory, wherein the memory stores instructions to configure the one or more processing units to; receive an indication of a first protected portion of a file of a single-layered, lossy file type having first dimensions, wherein the file further comprises anchor points; receive a first access permission setting for the first protected portion; receive an indication of a first recipient for the first protected portion; generate a first layer representation corresponding to the first protected portion; generate an edited copy of the file based on the indication of the first protected portion to create an edited single-layered, lossy file; add the first layer representation back into the file structure of the edited single-layered, lossy file; crop the edited single-layered, lossy file to have dimensions different from the first dimensions; and transmit the cropped and edited single-layered, lossy file to the first recipient, wherein the anchor points are configured to align the first layer representation at the correct positions within the cropped and edited single-layered, lossy file when an authorized recipient views the cropped and edited single-layered, lossy file in an authorized viewing application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method, comprising:
-
receiving an indication of a first protected portion of a file of a single-layered, lossy file type having first dimensions, wherein the file further comprises anchor points; receiving a first access permission setting for the first protected portion; receiving an indication of a first recipient for the first protected portion; encrypting the first protected portion based, at least in part, on the first access permission setting and the first recipient; generating a first encrypted layer representation corresponding to the encrypted first protected portion; generating an edited copy of the file based on the indication of the first protected portion to create an edited single-layered, lossy file; adding the first encrypted layer representation, associated with its access permission settings, back into the file structure of the edited single-layered, lossy file; cropping the edited single-layered, lossy file to have dimensions different from the first dimensions; and transmitting the cropped and edited single-layered, lossy file to the first recipient, wherein the anchor points are configured to align the first layer representation at the correct positions within the cropped and edited single-layered, lossy file when the first layer representation is layered on top of the cropped and edited single-layered, lossy file. - View Dependent Claims (22, 23)
-
Specification