Method for selective encryption within documents
First Claim
1. A method for selective encryption within a document, said method comprising:
- detecting a first section of a document, said first section having been selected and marked for encryption;
detecting a second section of the document, said second section having been selected and marked for encryption;
a processor of a data processing system encrypting the first section with one encryption key;
said processor encrypting the second section with two different encryption keys,wherein the first section is not embedded in any other section of the document that has been encrypted and/or marked for encryption and no other section of the document that has been encrypted and/or marked for encryption is embedded in the first section, andwherein the second section is not embedded in any other section of the document that has been encrypted and/or marked for encryption and no other section of the document that has been encrypted and/or marked for encryption is embedded in the second section,said processor receiving an access request to access the encrypted first section of the document;
responsive to said receiving the access request, said processor determining that a received decryption key for the encrypted first section of the document is proper for the encrypted first section, by attempting to decrypt the encrypted first section with the received decryption key by determining that a defined character string is in the encrypted first section;
responsive to said determining that the received decryption key is proper for the encrypted first section of the document, said processor retrieving and decrypting the encrypted first section of the document for which the access request was made to generate a first decrypted section of the document corresponding to the encrypted first section; and
said processor displaying the first decrypted section of the document.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
55 Citations
17 Claims
-
1. A method for selective encryption within a document, said method comprising:
-
detecting a first section of a document, said first section having been selected and marked for encryption; detecting a second section of the document, said second section having been selected and marked for encryption; a processor of a data processing system encrypting the first section with one encryption key; said processor encrypting the second section with two different encryption keys, wherein the first section is not embedded in any other section of the document that has been encrypted and/or marked for encryption and no other section of the document that has been encrypted and/or marked for encryption is embedded in the first section, and wherein the second section is not embedded in any other section of the document that has been encrypted and/or marked for encryption and no other section of the document that has been encrypted and/or marked for encryption is embedded in the second section, said processor receiving an access request to access the encrypted first section of the document; responsive to said receiving the access request, said processor determining that a received decryption key for the encrypted first section of the document is proper for the encrypted first section, by attempting to decrypt the encrypted first section with the received decryption key by determining that a defined character string is in the encrypted first section; responsive to said determining that the received decryption key is proper for the encrypted first section of the document, said processor retrieving and decrypting the encrypted first section of the document for which the access request was made to generate a first decrypted section of the document corresponding to the encrypted first section; and said processor displaying the first decrypted section of the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product, comprising a computer readable storage device containing instructions that, upon being executed by a processor of a data processing system, implement a method for selective encryption within a document, said method comprising:
-
detecting a first section of a document, said first section having been selected and marked for encryption; detecting a second section of the document, said second section having been selected and marked for encryption; encrypting the first section with one encryption key; encrypting the second section with two different encryption keys, wherein the first section is not embedded in any other section of the document that has been encrypted and/or marked for encryption and no other section of the document that has been encrypted and/or marked for encryption is embedded in the first section, and wherein the second section is not embedded in any other section of the document that has been encrypted and/or marked for encryption and no other section of the document that has been encrypted and/or marked for encryption is embedded in the second section, receiving an access request to access the encrypted first section of the document; responsive to said receiving the access request, determining that a received decryption key for the encrypted first section of the document is proper for the encrypted first section, by attempting to decrypt the encrypted first section with the received decryption key by determining that a defined character string is in the encrypted first section; responsive to said determining that the received decryption key is proper for the encrypted first section of the document, retrieving and decrypting the encrypted first section of the document for which the access request was made to generate a first decrypted section of the document corresponding to the encrypted first section; and displaying the first decrypted section of the document. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product, comprising a computer readable storage device containing instructions that, upon being executed by a processor of a data processing system, implement a method for selective encryption within a document, said method comprising:
-
detecting a document encryption request; activating a document encryption routine; accessing a proposed document for encryption and tagging one or more sections of the proposed document as designated for encryption; encrypting the tagged sections with multiple encryption keys; extracting the plain text version of each encrypted sections from the document; marking locations in the document where the extracted sections were located; storing a copy of each encrypted section of the document for each key used in the encryption process, extracted sections from the document in an appendix attached to the document; receiving a request to access an encrypted section of the document; determining whether a received decryption key for the encrypted section of the document for which the access request was made is proper for that encrypted section, by selecting one of the encrypted copies of the document, selecting a key and attempting to decrypt the selected encrypted copies with the selected key by determining if a defined character string is in the selected copy of the encrypted section; when the determination is that the received decryption key is proper, retrieving and decrypting the section of the document for which the access request was made; and
displaying the decrypted section of the document.
-
Specification