Systems and methods for providing recipient-end security for transmitted data
First Claim
Patent Images
1. A method for providing recipient-end security for transmitted data, the method comprising:
- scanning a hard copy document to generate scanned data;
configuring the scanned data so as to require recipient-end security;
transmitting the scanned data to an intended recipient;
determining if the transmitted data may be accessed at the recipient end; and
denying access to the transmitted data if it is determined that the transmitted data may not be accessed.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for providing recipient-end security for transmitted data. In one embodiment, a system and a method pertain to scanning a hard copy document to generate scanned data, configuring the scanned data so as to require recipient-end security, transmitting the scanned data to an intended recipient, determining if the transmitted data may be accessed at the recipient end, and denying access to the transmitted data if it is determined that the transmitted data may not be accessed.
-
Citations
31 Claims
-
1. A method for providing recipient-end security for transmitted data, the method comprising:
-
scanning a hard copy document to generate scanned data;
configuring the scanned data so as to require recipient-end security;
transmitting the scanned data to an intended recipient;
determining if the transmitted data may be accessed at the recipient end; and
denying access to the transmitted data if it is determined that the transmitted data may not be accessed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for providing recipient-end security for transmitted data, the system comprising:
-
means for configuring scanned data representative of a hard copy document so as to require recipient-end security at a recipient end of a transmission path;
means for determining if the scanned data may be accessed at the recipient end by requiring at least one of recipient-specific security information and machine-specific security information; and
means for denying access to the transmitted data if it is determined that the required security information is not correct. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A system stored on a computer-readable medium, the system comprising:
-
sender-end logic adapted to execute on a data transmitting device, the sender-end logic being configured to configure data scanned by the data transmitting device so as to require recipient-end security at a recipient end of a transmission path; and
recipient-end logic adapted to execute on a data receiving device, the recipient-end logic being configured to determine if the scanned data may be accessed at the recipient end by verifying at least one of recipient-specific security information provided by a recipient of the scanned data and machine-specific security information of the data receiving device. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A sender-end security manager stored on a computer-readable medium of a data transmitting device, the manager comprising:
-
logic configured to identify a type of recipient-end security to provide for a data scanned by the data transmitting device; and
logic configured to configure the scanned data to facilitate the identified type of recipient-end security. - View Dependent Claims (26, 27, 28)
-
-
29. A recipient-end security manager stored on a computer-readable medium of a data receiving device, the manager comprising:
-
logic configured to identify a type of recipient-end security that is required to access data that has been received by the data receiving device; and
logic configured to verify recipient-end security information prior to enabling access to the data. - View Dependent Claims (30, 31)
-
Specification