Secure graphical objects in web documents
First Claim
1. An apparatus comprising a computing device having instructions that in response to being executed by the computing device, enable the computing device to cause performance of operations comprising:
- providing a document in response to a request from a client for the document, wherein the document includes a first region comprising protected content of the document and a second region comprising unprotected content of the document and the first region of the document, wherein at least a portion of the protected content is visibly presented as part of the document, and wherein the first region and the second region are parts of same document; and
associating a software component with the second region, the software component being sent by the computing device and being executable at the client to contact the computing device for permission to access the protected content, wherein the second region is located over the first region to protect the first region and to keep unauthorized access away from the first region, and wherein an attempt to access the first region causes the second region to be accessed and causes execution of the software component.
8 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and system for presenting information in a web document using a program applet to restrict further copying or redistribution. The web document includes a first region in which a graphical element or other information is displayed, and a second region covering the first region in which a program applet is invoked by a server for the web document. The program applet is dynamically created upon access, and assigned a serial number. The program applet contacts the server for permission to display the graphical element or other information; thus, the server can control, by granting or denying permission, when and if the program applet displays the graphical or other information. The program applet can be subjected by the server to one or more of a variety of restrictions, such as: a limit on the number of times the information is displayed, a time limit, a requirement for a password or other security authentication, a requirement that the program applet is executing at a selected device or from a selected web document, or other requirements the server may deem fit to impose.
151 Citations
28 Claims
-
1. An apparatus comprising a computing device having instructions that in response to being executed by the computing device, enable the computing device to cause performance of operations comprising:
-
providing a document in response to a request from a client for the document, wherein the document includes a first region comprising protected content of the document and a second region comprising unprotected content of the document and the first region of the document, wherein at least a portion of the protected content is visibly presented as part of the document, and wherein the first region and the second region are parts of same document; and associating a software component with the second region, the software component being sent by the computing device and being executable at the client to contact the computing device for permission to access the protected content, wherein the second region is located over the first region to protect the first region and to keep unauthorized access away from the first region, and wherein an attempt to access the first region causes the second region to be accessed and causes execution of the software component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method implemented by a computer, comprising:
-
providing a document in response to a request to the computer from a client for the document, the document including a first region comprising protected content of the document and a second region comprising unprotected content of the document and the first region of the document, wherein at least a portion of the protected content is visibly presented as part of the document, and wherein the first region and the second region are parts of same document; associating a software component with the second region, wherein the associating is performed by the computer; using the computer to transmit the document and the software component to the client over a network; and receiving, at the computer, a request from the software component to access the protected content, the request formed in response to an attempt to access the protected content of the first region of the document through execution of the software component at the client, wherein the second region is located over the first region to protect the first region and to keep unauthorized access away from the first region, and wherein an attempt to access the first region causes the second region to be accessed and causes execution of the software component. - View Dependent Claims (22, 23)
-
-
24. A method implemented by a computer, comprising:
-
issuing a request to a server for a document, the document having a first region comprising protected content of the document and a second region comprising unprotected content of the document and the first region of the document, wherein at least a portion of the protected content is visibly presented as part of the document, and wherein the first region and the second region are parts of same document; and contacting the server for permission to access the protected content in response to an input indicating an attempt to access the protected content of the first region, the contacting performed responsive to execution, by the computer, of a software component that is associated with the second region and is received from the server, wherein the second region is located over the first region to protect the first region and to keep unauthorized access away from the first region, and wherein an attempt to access the first region causes the second region to be accessed and causes execution of the software component. - View Dependent Claims (25)
-
-
26. A method implemented by a computer, comprising:
-
contacting a server that sourced a document in response to an input indicating an attempt to access protected content of the document, wherein the document includes a first region comprising the protected content of the document and a second region comprising unprotected content of the document and the first region of the document, wherein at least a portion of the protected content is visibly presented as part of the document, and wherein the first region and the second region are parts of same document, wherein the contacting is initiated in response to execution, by the computer, of a software component that is associated with the second region and that was provided to the computer responsive to a request for the document; and displaying the protected content in response to receiving permission from the server, wherein the second region is located over the first region to protect the first region and to keep unauthorized access away from the first region, and wherein an attempt to access the first region causes the second region to be accessed and causes execution of the software component. - View Dependent Claims (27, 28)
-
Specification