Protecting an electronic document by embedding an executable script
First Claim
Patent Images
1. A system for safeguarding data, the system comprising:
- a computer apparatus including a first processor and a memory; and
a software module stored in the memory comprising executable instructions that when executed by the first processor cause the first processor to;
embed a script in an electronic file;
generate a token associated with a token identification number;
identify a first recipient device and a second recipient device that are each in communication with the system, the first recipient device being associated with a device identification code;
determine that the second recipient device is an authorized device based on a name, contents, or a format of the electronic file;
issue the token to the first recipient device and the second recipient device;
provide a token application to the first recipient device, wherein the token application is configured to store the token at a specific location on the first recipient device in response to determining that the device identification code is associated with the first recipient device;
send the electronic file comprising the script to the first recipient device and the second recipient device;
wherein the script comprises commands that when operated by a second processor of the first recipient device cause the second processor of the first recipient device to open the electronic file in response to determining that the token is stored at the specific location on the first recipient device and that the token is associated with the token identification number;
wherein the script comprises commands that when operated by a third processor of the second recipient device cause the third processor of the second recipient device to open the electronic file in response to determining that the second recipient device is an authorized device and that the token issued to the second recipient device is not detected on the second recipient device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention relate to methods and apparatuses for safeguarding information by, for example, controlling access to electronic files. Some embodiments of the present invention provide a method that includes embedding a script in an electronic file, where the script comprises commands that when operated on by a processor allow a recipient device to access the electronic file if either a token associated with the recipient device is detected or the recipient device is determined to be an authorized device.
-
Citations
27 Claims
-
1. A system for safeguarding data, the system comprising:
-
a computer apparatus including a first processor and a memory; and a software module stored in the memory comprising executable instructions that when executed by the first processor cause the first processor to; embed a script in an electronic file; generate a token associated with a token identification number; identify a first recipient device and a second recipient device that are each in communication with the system, the first recipient device being associated with a device identification code; determine that the second recipient device is an authorized device based on a name, contents, or a format of the electronic file; issue the token to the first recipient device and the second recipient device; provide a token application to the first recipient device, wherein the token application is configured to store the token at a specific location on the first recipient device in response to determining that the device identification code is associated with the first recipient device; send the electronic file comprising the script to the first recipient device and the second recipient device; wherein the script comprises commands that when operated by a second processor of the first recipient device cause the second processor of the first recipient device to open the electronic file in response to determining that the token is stored at the specific location on the first recipient device and that the token is associated with the token identification number; wherein the script comprises commands that when operated by a third processor of the second recipient device cause the third processor of the second recipient device to open the electronic file in response to determining that the second recipient device is an authorized device and that the token issued to the second recipient device is not detected on the second recipient device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for safeguarding data, the method comprising:
-
embedding, using a first processor, a script in an electronic file; generating, using the first processor, a token associated with a token identification number; identifying, using the first processor, a first recipient device and a second recipient device, the first recipient device being associated with a device identification code; determining, using the first processor, that the second recipient device is an authorized device based on a name, contents, or a format of the electronic file; issuing, using the first processor, the token to the first recipient device and the second recipient device; providing, using the first processor, a token application to the first recipient device, wherein the token application is configured to store the token at a specific location on the first recipient device in response to determining that the device identification code is associated with the first recipient device; sending, using the first processor, the electronic file comprising the script to the first recipient device and the second recipient device; wherein the script comprises commands that when operated by a second processor of the first recipient device cause the second processor of the first recipient device to open the electronic file in response to determining that the token is stored at the specific location on the first recipient device and that the token is associated with the token identification number; wherein the script comprises commands that when operated by a third processor of the second recipient device cause the third processor of the second recipient device to open the electronic file in response to determining that the second recipient device is an authorized device and that the token issued to the second recipient device is not detected on the second recipient device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product for safeguarding data, the computer program product comprising a non-transitory computer-readable medium, wherein the non-transitory computer-readable medium comprises computer-executable program code stored therein, wherein the computer-executable program code portions comprise:
-
a first program code portion configured to; embed a script in an electronic file; generate a token associated with a token identification number; identify a first recipient device and a second recipient device, the first recipient device being associated with a device identification code; determine that the second recipient device is an authorized device based on a name, contents, or a format of the electronic file; issue the token to the first recipient device and the second recipient device; provide a token application to the first recipient device, wherein the token application is configured to store the token at a specific location on the first recipient device in response to determining that the device identification code is associated with the first recipient device; send the electronic file comprising the script to the first recipient device and the second recipient device; wherein the script comprises commands that when operated by a first processor of the first recipient device cause the first processor of the first recipient device to open the electronic file in response to determining that the token is stored at the specific location on the first recipient device and that the token is associated with the token identification number; wherein the script comprises commands that when operated by a second processor of the second recipient device cause the second processor of the second recipient device to open the electronic file in response to determining that the second recipient device is an authorized device and that the token issued to the second recipient device is not detected on the second recipient device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification