×

User-driven menu generation system with dynamic generation of target files with placeholders for persistent change or temporary security change over cloud computing virtual storage from template files

  • US 8,352,444 B1
  • Filed: 07/09/2012
  • Issued: 01/08/2013
  • Est. Priority Date: 07/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for generating a target file, comprising:

  • enabling a user to select a first template file, wherein the first template file includes;

    a plurality of fields, including;

    at least first and second changeable fields configured to be changed persistently, whereinthe first changeable field is configured to receive from a user a content value used to generate a target file;

    the second changeable field is configured to receive a security-related value;

    at least a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value,wherein when the target file is intercepted during transmission to a first destination, the third changeable field of the target file contains the encrypted version of the first value to prevent exposure of the first value to an interceptor, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the first destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value;

    one or more unchangeable fields;

    parsing the first template file to generate a user interface, including;

    a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value,a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data;

    generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; and

    generating the target file based at least in part on;

    a user input received via the first changeable field, including the user content value,a user input received via the second changeable field, including the audit data and/or access control data, andon the encrypted version of the first value.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×