×

Selective data encryption using style sheet processing for decryption by a client proxy

  • US 6,978,367 B1
  • Filed: 10/21/1999
  • Issued: 12/20/2005
  • Est. Priority Date: 10/21/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product embodied on computer readable media readable by a computing system in a computing environment, for enforcing security policy using style sheet processing, comprising:

  • computer-readable program code that is configured to obtain an input document;

    computer-readable program code that is configured to obtain a Document Type Definition (DTD) that defines elements of said input document, wherein;

    (1) an attribute of at least one element defined in said DTD references one of a plurality of stored policy enforcement objects;

    (2) more than one of said references may reference a single stored policy enforcement object; and

    (3) each of said stored policy enforcement objects specifies a visibility policy for said referencing element or elements, said visibility policy identifying an encryption requirement for all elements having that visibility policy and a community whose members are authorized to view those elements;

    computer-readable program code that is configured to apply one or more style sheets to said input document, thereby adding markup notation to each element of said input document for which said element definition in said DTD references one of said stored policy enforcement objects specifying a visibility policy with a non-null encryption requirement, resulting in creation of an interim transient document that indicates elements of said input document which are to be encrypted; and

    computer-readable program code that is configured to create an output document in which each element of said interim transient document for which markup notation has been added is encrypted in a manner that enables a client proxy associated with a group that is a community member authorized to view that element to use key distribution material associated with the output document when decrypting the encrypted element.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×