System and method for embedding user authentication information in encrypted data
First Claim
1. A system for secure document transmission comprising:
- a processor;
a memory storing computer readable instructions which when executed by the processor cause the processor to perform the steps of;
receiving, with an initial encrypted electronic document transmission to a document processing device, an encrypted key into a data storage associated with the document processing device, which key has first and second key portions, the second key portion being associated with source data corresponding to a source of at least the initial electronic document directed for transmission to the document processing device;
decrypting the encrypted key;
extracting the first key portion from the decrypted key;
storing the extracted first key portion in a data storage of the document processing device associatively with the source data corresponding thereto;
receiving at least a second encrypted electronic document into the document processing device, wherein the electronic document includes an encrypted header including the second key portion without the first key portion;
receiving login data at the document processing device;
extracting the second key portion from the second electronic document by decrypting, via the computer, the header of the second encrypted electronic document at the document processing device using a private key;
identifying a user via an association of the second key portion decrypted from the header with the first key portion data in the data storage corresponding thereto and received login data;
decrypting a received electronic document inclusive of identification thereof using a reconstructed symmetric key formed by combining the second key portion from the decrypted header and the first key portion retrieved from the data storage corresponding to an output of the identifying means;
commencing a document processing operation on a decrypted electronic document from the decrypting means; and
generating an output document from the document processing device based on the document processing operation and the decrypted electronic document.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is directed to a system and method for secure document transmission. The method begins by receiving first and second key portions into a data storage associated with a document processing device. The first key portion suitably includes data representing a user of the document processing device and the second key portion suitably includes data representing a source of at least one electronic document directed for transmission to the document processing device. Next, at least one encrypted electronic document is received into the document processing device, wherein the document includes the second key portion. The received electronic document is then decrypted using the second key portion and the first key portion, which was retrieved from the data storage. Following decryption, a document processing operation is commenced on the decrypted electronic document.
13 Citations
12 Claims
-
1. A system for secure document transmission comprising:
-
a processor; a memory storing computer readable instructions which when executed by the processor cause the processor to perform the steps of; receiving, with an initial encrypted electronic document transmission to a document processing device, an encrypted key into a data storage associated with the document processing device, which key has first and second key portions, the second key portion being associated with source data corresponding to a source of at least the initial electronic document directed for transmission to the document processing device; decrypting the encrypted key; extracting the first key portion from the decrypted key; storing the extracted first key portion in a data storage of the document processing device associatively with the source data corresponding thereto; receiving at least a second encrypted electronic document into the document processing device, wherein the electronic document includes an encrypted header including the second key portion without the first key portion; receiving login data at the document processing device; extracting the second key portion from the second electronic document by decrypting, via the computer, the header of the second encrypted electronic document at the document processing device using a private key; identifying a user via an association of the second key portion decrypted from the header with the first key portion data in the data storage corresponding thereto and received login data; decrypting a received electronic document inclusive of identification thereof using a reconstructed symmetric key formed by combining the second key portion from the decrypted header and the first key portion retrieved from the data storage corresponding to an output of the identifying means; commencing a document processing operation on a decrypted electronic document from the decrypting means; and generating an output document from the document processing device based on the document processing operation and the decrypted electronic document. - View Dependent Claims (2, 3, 4)
-
-
5. A method for secure document transmission to a document processing device comprising the steps of:
-
receiving, with an initial encrypted electronic document transmission to a document processing device, an encrypted key into a data storage associated with the document processing device, which key has first and second key portions, the second key portion being associated with source data corresponding to a source of at least the initial electronic document directed for transmission to the document processing device; decrypting the encrypted key in a computer having a processor operating in conjunction with associated memory; extracting, via the computer, the first key portion from the decrypted key; storing the extracted first key portion in a data storage of the document processing device associatively with the source data corresponding thereto; receiving at least a second encrypted electronic document into the document processing device, wherein the electronic document includes an encrypted header including the second key portion without the first key portion; receiving login data at the document processing device; extracting the second key portion from the second electronic document by decrypting, via the computer, the header of the second encrypted electronic document at the document processing device using a private key; identifying, at the document processing device, a user via an association of the second key portion decrypted from the header with the first key portion data in the data storage corresponding thereto and received login data; decrypting, via the computer, a received electronic document inclusive of identification thereof using a reconstructed symmetric key formed by combining the second key portion from the decrypted header and the first key portion retrieved from the data storage corresponding to an output of the identifying; commencing a document processing operation on the decrypted electronic document at the document processing device; and generating an output document from the document processing device based on the document processing operation and the decrypted electronic document. - View Dependent Claims (6, 7, 8)
-
-
9. A computer-readable medium encoded with a computer program which when executed causes a computer to perform the steps of:
-
receiving, with an initial encrypted electronic document transmission to a document processing device, an encrypted key into a data storage associated with the document processing device, which key has first and second portions, the second key portion being associated with source data corresponding to a source of at least the initial electronic document directed for transmission to the document processing device; decrypting the encrypted key; extracting the first key portion from the decrypted key; storing the extracted first key portion in a data storage of the document processing device associatively with the source data corresponding thereto; receiving at least a second encrypted electronic document into the document processing device, wherein the electronic document includes an encrypted header including the second key portion without the first key portion; receiving login data; extracting the second key portion from the second electronic document by decrypting, via the computer, the header of the second encrypted electronic document at the document processing device using a private key; identifying a user via an association of the second key portion decrypted from the header with the first key portion data in the data storage corresponding thereto and received login data; decrypting, via the computer, a received electronic document inclusive of identification thereof using a reconstructed symmetric key formed by combining the second key portion from the decrypted header and the first key portion retrieved from the data storage corresponding to an output of the identifying; commencing a document processing operation on the decrypted electronic document; and generating an output document from the document processing device based on the document processing operation and the decrypted electronic document. - View Dependent Claims (10, 11, 12)
-
Specification