User-driven menu generation system with dynamic generation of target files with placeholders for persistent change or temporary security change over cloud computing virtual storage from template files
First Claim
1. A computer implemented method for generating a target file, comprising:
- enabling a user to select a first template file, wherein the first template file includes;
a plurality of fields, including;
at least first and second changeable fields configured to be changed persistently, whereinthe first changeable field is configured to receive from a user a content value used to generate a target file;
the second changeable field is configured to receive a security-related value;
at least a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value,wherein when the target file is intercepted during transmission to a first destination, the third changeable field of the target file contains the encrypted version of the first value to prevent exposure of the first value to an interceptor, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the first destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value;
one or more unchangeable fields;
parsing the first template file to generate a user interface, including;
a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value,a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data;
generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; and
generating the target file based at least in part on;
a user input received via the first changeable field, including the user content value,a user input received via the second changeable field, including the audit data and/or access control data, andon the encrypted version of the first value.
2 Assignments
0 Petitions
Accused Products
Abstract
Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields configured to be changed persistently, and a third changeable field. The second changeable field is configured to receive a security-related value. A third changeable field includes a first value configured to be changed temporarily to receive an encrypted version of the first value. The template file is parsed to generate a user interface, including: a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data. An encrypted version of the first value corresponding to the third changeable field is generated. The first value is temporarily replaced with the encrypted value. The target file is then generated.
-
Citations
24 Claims
-
1. A computer implemented method for generating a target file, comprising:
-
enabling a user to select a first template file, wherein the first template file includes; a plurality of fields, including; at least first and second changeable fields configured to be changed persistently, wherein the first changeable field is configured to receive from a user a content value used to generate a target file; the second changeable field is configured to receive a security-related value; at least a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value, wherein when the target file is intercepted during transmission to a first destination, the third changeable field of the target file contains the encrypted version of the first value to prevent exposure of the first value to an interceptor, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the first destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value; one or more unchangeable fields; parsing the first template file to generate a user interface, including; a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data; generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; and generating the target file based at least in part on; a user input received via the first changeable field, including the user content value, a user input received via the second changeable field, including the audit data and/or access control data, and on the encrypted version of the first value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
one or more computing devices; non-transitory computer readable media having instructions stored thereon that when executed by the one or more computing devices, cause the one or more computing devices to perform operations comprising; enabling a user to select a first template file, wherein the first template file includes; a plurality of fields, including; at least first and second changeable fields configured to be changed persistently, wherein the first changeable field is configured to receive from a user a content value used to generate a target file; the second changeable field is configured to receive a security-related value; at least a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value wherein when the target file is intercepted during transmission to a first destination, the third changeable field of the target file contains the encrypted version of the first value to prevent exposure of the first value to an interceptor, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the first destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value; one or more unchangeable fields; parsing the first template file to generate a user interface, including; a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data; generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; and generating the target file based at least in part on; a user input received via the first changeable field, including the user content value, a user input received via the second changeable field, including the audit data and/or access control data, and on the encrypted version of the first value. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. Non-transitory computer readable media having instructions stored thereon that when executed by a computing system, cause the computing system to perform operations comprising:
-
enabling a user to select a first template file, wherein the first template file includes; a plurality of fields, including; at least first and second changeable fields configured to be changed persistently, wherein the first changeable field is configured to receive from a user a content value used to generate a target file; the second changeable field is configured to receive a security-related value; at least a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value, wherein when the target file is intercepted during transmission to a first destination, the third changeable field of the target file contains the encrypted version of the first value to prevent exposure of the first value to an interceptor, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the first destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value; one or more unchangeable fields; parsing the first template file to generate a user interface, including; a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data; generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; and generating the target file based at least in part on; a user input received via the first changeable field, including the user content value, a user input received via the second changeable field, including the audit data and/or access control data, and on the encrypted version of the first value.
-
Specification