Data security system and method with editor
First Claim
1. A method of securing data contained in a data document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects being grouped into subsets corresponding to respective ones of a plurality of security levels without reference to said data document, said method operable on said data document in a computer system, comprising:
- identifying and displaying, in situ in said data document, said security sensitive words, characters or data objects and uniquely displaying subsets of said security sensitive words, characters or data objects for each one of said plurality of security levels;
conforming said data document to predetermined protocols for each one of said plurality of security levels by identifying and displaying in situ adjunctive words, characters or data objects;
upon command inserting one of a plurality of security level tags corresponding to said plurality of security levels into said data document at or near the identified security sensitive words, characters or data objects and adjunctive words, characters or data objects;
extracting said identified security sensitive words, characters or data objects and adjunctive words, characters or data objects from said data document; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version.
4 Assignments
0 Petitions
Accused Products
Abstract
The method, program and system secures sensitive data/objects found in a data source document with an editor. The simple editor identifies and displays, in situ, the sensitive words/objects per each security level. Level tags are inserted and adjunctive words/objects are marked/displayed per the level'"'"'s protocol. The precursor document is processed to extract sensitive and adjunctive words/objects. The stripped data is either separately stored or partial versions of the secured document are stored per protocol. A comprehensive editor secures content data and meta data contained in a data document object model (DOM). The editor maps the source document root, branch and leaf components as binary files populated with content data and meta data. Security introns, earlier identified based upon the level'"'"'s informational attributes, are excluded. Security exons are copied from the source content and meta data binary files into a security safe document (template). Filtration, extraction, dispersal and storage follow.
1714 Citations
108 Claims
-
1. A method of securing data contained in a data document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects being grouped into subsets corresponding to respective ones of a plurality of security levels without reference to said data document, said method operable on said data document in a computer system, comprising:
-
identifying and displaying, in situ in said data document, said security sensitive words, characters or data objects and uniquely displaying subsets of said security sensitive words, characters or data objects for each one of said plurality of security levels;
conforming said data document to predetermined protocols for each one of said plurality of security levels by identifying and displaying in situ adjunctive words, characters or data objects;
upon command inserting one of a plurality of security level tags corresponding to said plurality of security levels into said data document at or near the identified security sensitive words, characters or data objects and adjunctive words, characters or data objects;
extracting said identified security sensitive words, characters or data objects and adjunctive words, characters or data objects from said data document; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said method operable on said data in said document in a computer system, comprising:
-
mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
excluding security introns and associated content data and meta data based upon predetermined informational attributes relative to said document object model;
providing a security safe document formatted as a safe document object model;
copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model;
extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method of securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said method operable on said data in said document in a computer system, comprising:
-
mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
providing a security safe document formatted as a safe document object model;
copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model, said safe document object model consisting of security exons and excluding security introns, and the respective associated content data and meta data relative thereto, which exons and introns being previously identified based upon predetermined informational attributes relative to said document object model;
extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A method of securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said safe document object model consisting of security exons and excluding security introns, and the respective associated content data and meta data relative thereto, said exons and introns being identified based upon predetermined informational attributes relative to said document object model, said method operable on said data in said document in a computer system, comprising:
-
mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
providing a security safe document formatted as a safe document object model;
copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model;
extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. A computer readable medium containing programming instructions for securing data contained in a data document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects being grouped into subsets corresponding to respective ones of a plurality of security levels without reference to said data document, said method operable on said data document in a computer system, comprising:
-
identifying and displaying, in situ in said data document, said security sensitive words, characters or data objects and uniquely displaying subsets of said security sensitive words, characters or data objects for each one of said plurality of security levels;
conforming said data document to predetermined protocols for each one of said plurality of security levels by identifying and displaying in situ adjunctive words, characters or data objects;
upon command inserting one of a plurality of security level tags corresponding to said plurality of security levels into said data document at or near the identified security sensitive words, characters or data objects and adjunctive words, characters or data objects;
extracting said identified security sensitive words, characters or data objects and adjunctive words, characters or data objects from said data document; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A computer readable medium containing programming instructions for securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said method operable on said data in said document in a computer system, comprising:
-
mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
excluding security introns and associated content data and meta data based upon predetermined informational attributes relative to said document object model;
providing a security safe document formatted as a safe document object model;
copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model;
extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (56, 57, 58, 59, 60)
-
-
61. A computer readable medium containing programming instructions for securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said method operable on said data in said document in a computer system, comprising:
-
mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
providing a security safe document formatted as a safe document object model;
copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model, said safe document object model consisting of security exons and excluding security introns, and the respective associated content data and meta data relative thereto, which exons and introns being previously identified based upon predetermined informational attributes relative to said document object model;
extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (62, 63, 64, 65, 66)
-
-
67. A computer readable medium containing programming instructions for securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said safe document object model consisting of security exons and excluding security introns, and the respective associated content data and meta data relative thereto, said exons and introns being identified based upon predetermined informational attributes relative to said document object model, said method operable on said data in said document in a computer system, comprising:
-
mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
providing a security safe document formatted as a safe document object model;
copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model;
extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (68, 69, 70, 71, 72)
-
-
73. An information processing system for securing data contained in a data document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects being grouped into subsets corresponding to respective ones of a plurality of security levels without reference to said data document, said method operable on said data document in a computer system, comprising:
-
means for identifying and displaying, in situ in said data document, said security sensitive words, characters or data objects and uniquely displaying subsets of said security sensitive words, characters or data objects for each one of said plurality of security levels;
means for conforming said data document to predetermined protocols for each one of said plurality of security levels by identifying and displaying in situ adjunctive words, characters or data objects;
means for inserting, under command, one of a plurality of security level tags corresponding to said plurality of security levels into said data document at or near the identified security sensitive words, characters or data objects and adjunctive words, characters or data objects;
extractor for extracting said identified security sensitive words, characters or data objects and adjunctive words, characters or data objects from said data document; and
means for either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90)
-
-
91. An information processing system for securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said method operable on said data in said document in a computer system, comprising:
-
a mapper to map said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
means for excluding security introns and associated content data and meta data based upon predetermined informational attributes relative to said document object model;
a security safe document formatted as a safe document object model;
a copier for copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model;
extractor for extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
means for either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (92, 93, 94, 95, 96)
-
-
97. An information processing system for securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said method operable on said data in said document in a computer system, comprising:
-
a mapper for mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
a security safe document formatted as a safe document object model;
a copier for copying security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model, said safe document object model consisting of security exons and excluding security introns, and the respective associated content data and meta data relative thereto, which exons and introns being previously identified based upon predetermined informational attributes relative to said document object model;
an extractor for extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
means for storing either the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (98, 99, 100, 101, 102)
-
-
103. An information processing system for securing content data and meta data contained in a document formatted as a document object model, said document having one or more security sensitive words, characters or data objects, said security sensitive words, characters or data objects grouped into subsets corresponding to respective ones of a plurality of security levels without regard to said document, said document object model having a blueprint and root, branch and leaf components, said safe document object model consisting of security exons and excluding security introns, and the respective associated content data and meta data relative thereto, said exons and introns being identified based upon predetermined informational attributes relative to said document object model, said method operable on said data in said document in a computer system, comprising:
-
a mapper for mapping said root, branch and leaf components of said document as binary files populated with content data and meta data representing subsets of said document object model blueprint;
a security safe document formatted as a safe document object model;
a copier for copying said security exons from said content data and meta data binary files into said security safe document formatted as said safe document object model;
extractor for extracting said security sensitive words, characters or data objects from the copied content data and meta data; and
means for either storing the extracted data separately from remainder data or storing partial versions of said extracted data with said remainder data based upon security levels unique to each partial version. - View Dependent Claims (104, 105, 106, 107, 108)
-
Specification