Method and Apparatus for Providing Secure Document Distribution
First Claim
1. A method for secure document distribution, wherein the method is implemented is a system comprising one or more processors configured to execute one or more computer program modules, the method comprising:
- executing, on the one or more processors of the system, one or more computer program modules configured to;
allow an author to create a document,allow the author to secure the document using an access code, wherein the access code is needed to gain access to the document,encrypt the access code, andforward a message to a recipient, wherein the message includes the document and the encrypted access code; and
executing, on the one or more processors of the system configured to perform as a terminal, one or more computer program modules configured to;
allow the recipient to open the message,generate an image, the image having information embedded therein, the embedded information including the encrypted access code, andevaluate an output generated by a portable device to determine if the output includes a copy of the access code needed for access to the document;
wherein the output is generated by the portable device from a copy of the image captured by the portable device, from predetermined information stored in the portable device and from input information received from a user of the portable device, wherein;
the predetermined information is usable to decrypt the encrypted access code in the captured copy of the image, andthe input information is used to ensure that the recipient is authorized to use the portable device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for providing secure document distribution is disclosed. The system includes an application configured to: allow an author to create a document, allow the author to secure the document using an access code, wherein the access code is needed to gain access to the document, encrypt the access code, and forward a message to a recipient, wherein the message includes the document and the encrypted access code, a terminal configured to: allow the recipient to open the message, and generate an image, the image having information embedded therein, the embedded information including the encrypted access code, and a portable device configured to: allow the recipient to capture the image, store predetermined information, wherein the predetermined information is usable to decrypt the encrypted access code, capture input information from the recipient, the input information to be used to ensure that the recipient is authorized to use the portable device, extract the information embedded in the image, decrypt the encrypted access code using the predetermined information, and generate an output, the output including the access code. The terminal is further configured to receive the output generated by the portable device and evaluate the output to determine if the correct access code needed for access to the document is provided.
110 Citations
1 Claim
-
1. A method for secure document distribution, wherein the method is implemented is a system comprising one or more processors configured to execute one or more computer program modules, the method comprising:
-
executing, on the one or more processors of the system, one or more computer program modules configured to; allow an author to create a document, allow the author to secure the document using an access code, wherein the access code is needed to gain access to the document, encrypt the access code, and forward a message to a recipient, wherein the message includes the document and the encrypted access code; and executing, on the one or more processors of the system configured to perform as a terminal, one or more computer program modules configured to; allow the recipient to open the message, generate an image, the image having information embedded therein, the embedded information including the encrypted access code, and evaluate an output generated by a portable device to determine if the output includes a copy of the access code needed for access to the document; wherein the output is generated by the portable device from a copy of the image captured by the portable device, from predetermined information stored in the portable device and from input information received from a user of the portable device, wherein; the predetermined information is usable to decrypt the encrypted access code in the captured copy of the image, and the input information is used to ensure that the recipient is authorized to use the portable device.
-
Specification