Systems and methods for encryption and authentication
First Claim
1. An authentication and encryption computer system, the authentication and encryption computer system comprising:
- one or more processing devices;
a network interface;
non-transitory memory that stores instructions that when executed by the one or more processing devices are configured to cause the computer system to perform operations comprising;
perform an authentication using at least an identifier associated with an instantiation of a first application hosted on a first user computer system associated with a first user;
receive a request for a first document over a network via the network interface from the first application hosted on the first user computer system, the first document comprising a form including a plurality of fields configured to receive input data and the first document comprising static text associated with the form;
provide, over the network via the network interface, the first document to the first application hosted on the first user computer system;
receive from the first application hosted on the first user computer system;
the first document including form field input data, wherein the form field input data is associated with respective form field identifiers, andcontext data, the context data comprising textual data separate from data of the first document;
generate an encryption key;
encrypt;
the form field input data and respective form field identifiers as name-field input data sets, wherein at least a portion of the static text, associated with the form included in the first document, is excluded from encryption, andthe context data;
receive an indication that a Portable Document Format of the first document is to be provided to a second user computer system, the Portable Document Format including respective depictions of the form field input data;
provide a Portable Document Format of the first document comprising a payload to the second user computer system, the payload file comprising the encrypted form name-field input data sets, the encrypted context data, and a non-encrypted identifier assigned to the first document and/or a non-encrypted identifier assigned to a transaction associated with the first document, wherein the Portable Document Format of the first document is viewable using a standard Portable Document Format viewer;
receive a request for a key to decrypt the encrypted form name-field input data sets and the encrypted context data;
provide the key to decrypt the encrypted form name-field input data sets and the encrypted context data, wherein the decrypted form name-field input data sets and the decrypted context data are viewable using the standard Portable Document Format viewer and/or are computer readable as plaintext.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for encryption and authentication are disclosed. A system receives a document request over a network from a first computer system, the document comprising a plurality of fields configured to receive input data. The document is transmitted to the first computer system. Context data and the document, including field input data, are received from the first computer system. An encryption key is generated and used to encrypt the document field input data and the context data. A payload is generated including the encrypted document field input data, the encrypted context data, and a non-encrypted identifier linked to the key. The payload and an image of the document are provided to a second computer system. The document image is viewable using a portable document format viewer. A decryption key request including the identifier linked to the key is received. The decryption key is provided to the second computer system to decrypt the encrypted field input data and the encrypted context data.
34 Citations
30 Claims
-
1. An authentication and encryption computer system, the authentication and encryption computer system comprising:
-
one or more processing devices; a network interface; non-transitory memory that stores instructions that when executed by the one or more processing devices are configured to cause the computer system to perform operations comprising; perform an authentication using at least an identifier associated with an instantiation of a first application hosted on a first user computer system associated with a first user; receive a request for a first document over a network via the network interface from the first application hosted on the first user computer system, the first document comprising a form including a plurality of fields configured to receive input data and the first document comprising static text associated with the form; provide, over the network via the network interface, the first document to the first application hosted on the first user computer system; receive from the first application hosted on the first user computer system; the first document including form field input data, wherein the form field input data is associated with respective form field identifiers, and context data, the context data comprising textual data separate from data of the first document; generate an encryption key; encrypt; the form field input data and respective form field identifiers as name-field input data sets, wherein at least a portion of the static text, associated with the form included in the first document, is excluded from encryption, and the context data; receive an indication that a Portable Document Format of the first document is to be provided to a second user computer system, the Portable Document Format including respective depictions of the form field input data; provide a Portable Document Format of the first document comprising a payload to the second user computer system, the payload file comprising the encrypted form name-field input data sets, the encrypted context data, and a non-encrypted identifier assigned to the first document and/or a non-encrypted identifier assigned to a transaction associated with the first document, wherein the Portable Document Format of the first document is viewable using a standard Portable Document Format viewer; receive a request for a key to decrypt the encrypted form name-field input data sets and the encrypted context data; provide the key to decrypt the encrypted form name-field input data sets and the encrypted context data, wherein the decrypted form name-field input data sets and the decrypted context data are viewable using the standard Portable Document Format viewer and/or are computer readable as plaintext. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
one or more processing devices; a network interface; non-transitory memory that stores instructions that when executed by the one or more processing devices are configured to cause the computer system to perform operations comprising; authenticate a first user, the first user accessing the system using first user computer system; provide a first document over a network via the network interface to a first application hosted on the first user computer system, the first document comprising a form including a plurality of fields configured to receive input data and the first document comprising static text; receive from the first application hosted on the first user computer system; the first document including form field input data, wherein the form field input data is associated with respective form field identifiers, and context data, the context data comprising textual data separate from data of the first document; generate an encryption key; encrypt; the document form field input data and respective form field identifiers as name-field input data sets, and the context data; enable a Portable Document Format of the first document to be provided to a second user computer system, the portable Document Format of the first document comprising a payload file, the payload file comprising the encrypted document form name-field input data sets, the encrypted context data, and an item of non-encrypted text associated with the key, wherein the Portable Document Format of the first document is viewable using a standard Portable Document Format viewer; receive a request for a key, the request comprising the item of non-encrypted text associated with the key included in the payload; use the item of non-encrypted text associated with the key included in the payload to provide the key to the second user computer system, the key configured to decrypt the encrypted form name-field input data sets and the encrypted context data, wherein the decrypted form field input data is viewable using the standard Portable Document Format viewer and/or is computer readable as plaintext. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer-implemented method comprising:
-
providing a first document over a network to a first user computer system, the first document comprising a form including a plurality of fields configured to receive input data and the first document comprising static text; receiving from the first user computer system; the first document including form field input data, wherein the form field input data is associated with respective form field identifiers, and context data, the context data comprising textual data separate from data of the first document; generating an encryption key; encrypting; the document form field input data and respective form field identifiers as name-field input data sets, and the context data; enabling a payload and an Portable Document Format of the first document to be provided to a second user computer system, the payload comprising the encrypted document form name-field input data sets, the encrypted context data, and an item of non-encrypted text associated with the key, wherein the Portable Document Format of the first document is viewable using a Portable Document Format viewer; receiving a request for a key, the request comprising the identifier linked to the key; providing the key to the second user computer system, the key configured to decrypt the encrypted form name-field input data sets and the encrypted context data, wherein the decrypted form field input data is viewable using the Portable Document Format viewer and/or is computer readable as plaintext. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification