Portion-level digital rights management in digital content
First Claim
1. In a digital medium environment, a method implemented by at least one computing device to implement portion-level digital rights management (DRM) to control access to portions of digital content, the method comprising:
- receiving, by the at least one computing device, a selection of a first portion of the digital content, the digital content including a second portion;
assigning, by the at least one computing device, a policy to the first portion of the digital content by at least adding a markup element with an identifier to the first portion;
encrypting, by the at least one computing device, the first portion based on the policy without encrypting the second portion;
receiving, by the at least one computing device, a call to open the digital content from a user that does not have a user identity associated with the policy; and
controlling, by the at least one computing device, access to the digital content, the controlling including configuring the digital content to,display the second portion,replace the first portion of the digital content with a visual indication that access is denied to the first portion,display in real time, upon a selection of the second portion, visual indications of one or more permissions specific to the second portion, andupdate, in real time, the visual indications of the one or more permissions specific to the second portion.
2 Assignments
0 Petitions
Accused Products
Abstract
Portion-level digital rights management (DRM) in digital content is described. In one or more embodiments, a selection of a portion of the digital content is received at a computing device. Then, a policy is assigned to the selected portion by adding a markup element with an identifier to the selected portion. Based on the assigned policy, the selected portion is encrypted without encrypting another portion of the digital content. Subsequently, access to the selected portion is controlled based on the policy independently of the other portion. In this way, different portions of a single document can be protected with different policies. Different users may then have access to different portions of the digital content based on their user ID being associated with a particular policy, which improves security and management of distributable digital content.
78 Citations
20 Claims
-
1. In a digital medium environment, a method implemented by at least one computing device to implement portion-level digital rights management (DRM) to control access to portions of digital content, the method comprising:
-
receiving, by the at least one computing device, a selection of a first portion of the digital content, the digital content including a second portion; assigning, by the at least one computing device, a policy to the first portion of the digital content by at least adding a markup element with an identifier to the first portion; encrypting, by the at least one computing device, the first portion based on the policy without encrypting the second portion; receiving, by the at least one computing device, a call to open the digital content from a user that does not have a user identity associated with the policy; and controlling, by the at least one computing device, access to the digital content, the controlling including configuring the digital content to, display the second portion, replace the first portion of the digital content with a visual indication that access is denied to the first portion, display in real time, upon a selection of the second portion, visual indications of one or more permissions specific to the second portion, and update, in real time, the visual indications of the one or more permissions specific to the second portion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In a digital medium environment, a method implemented by at least one computing device to implement portion-level digital rights management (DRM) to control access to portions of digital content, the method comprising:
-
receiving, by the at least one computing device, the digital content having a first portion encrypted based on a policy and a second portion that is not encrypted, the policy assigned to the first portion by adding a markup element with an identifier to the first portion; receiving, by the at least one computing device, an open call initiated by a user to open the digital content; determining, by the at least one computing device, that the user does not have a user identity associated with the policy; and controlling access, by the at least one computing device, to the digital content, the controlling including; displaying the second portion, replacing the first portion of the digital content with a visual indication that access is denied to the first portion, displaying in real time, upon a selection of the second portion, visual indications of one or more permissions specific to the second portion, and updating, in real time, the visual indications of the one or more permissions specific to the second portion. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. In a digital medium environment, a system implemented to control portion-level digital rights management (DRM) in digital content, the system comprising:
-
a processor; and non-transitory computer-readable storage media having thereon multiple instructions that, responsive to execution by the processor, cause the processor to perform operations including; receiving the digital content having a first portion encrypted based on a policy and a second portion that is not encrypted, the policy assigned to the first portion of the digital content by adding a markup element with an identifier to the first portion of the digital content; receiving an open call initiated by a user to open the digital content; determining that the user does not have a user identity associated with the policy; and controlling access to the digital content by; displaying the second portion, replacing the first portion of the digital content with a visual indication that access is denied to the first portion, displaying in real time, upon a selection of the second portion, visual indications of one or more permissions specific to the second portion, and updating, in real time, the visual indications of the one or more permissions specific to the second portion. - View Dependent Claims (18, 19, 20)
-
Specification