User-driven menu generation system with dynamic generation of target files with placeholders for persistent change or temporary security change over cloud computing virtual storage from template files
First Claim
1. A computer implemented method for generating a target file, comprising:
- enabling a user to select, via a user interface, a first template file, wherein the first template file is configurable to include;
a plurality of fields, including;
first and second changeable fields configured to be changed persistently, whereinthe first changeable field is configured to receive from a user a content value used to generate a target file;
the second changeable field is configured to receive a security-related value;
a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value;
parsing the first template file to determine when the first, second, or third changeable fields are present;
at least partly in response to determining that the first, second, and third changeable fields are present in the first template file;
generating a user interface, including;
a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value,a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data or access control data;
generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value;
transmitting the first template file over a network to a specified destination including the encrypted version of the first value corresponding to the third changeable field to prevent exposure of the first value to an interceptor, not associated with the specified destination, of the first template, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the specified destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value; and
generating the target file based at least in part on;
a user input received via the first changeable field, including the user content value,a user input received via the second changeable field, including the audit data or access control data, andon the encrypted version of the first value.
2 Assignments
0 Petitions
Accused Products
Abstract
Dynamic generation of target files is described. A user can select a template file. The template file includes: at least first and second changeable fields configured to be changed persistently, and a third changeable field. The second changeable field is configured to receive a security-related value. A third changeable field includes a first value configured to be changed temporarily to receive an encrypted version of the first value. The template file is parsed to generate a user interface, including: a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data and/or access control data. An encrypted version of the first value corresponding to the third changeable field is generated. The first value is temporarily replaced with the encrypted value. The target file is then generated.
-
Citations
27 Claims
-
1. A computer implemented method for generating a target file, comprising:
- enabling a user to select, via a user interface, a first template file, wherein the first template file is configurable to include;
a plurality of fields, including; first and second changeable fields configured to be changed persistently, wherein the first changeable field is configured to receive from a user a content value used to generate a target file; the second changeable field is configured to receive a security-related value; a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value; parsing the first template file to determine when the first, second, or third changeable fields are present; at least partly in response to determining that the first, second, and third changeable fields are present in the first template file; generating a user interface, including; a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data or access control data; generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; transmitting the first template file over a network to a specified destination including the encrypted version of the first value corresponding to the third changeable field to prevent exposure of the first value to an interceptor, not associated with the specified destination, of the first template, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the specified destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value; and generating the target file based at least in part on; a user input received via the first changeable field, including the user content value, a user input received via the second changeable field, including the audit data or access control data, and on the encrypted version of the first value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
- enabling a user to select, via a user interface, a first template file, wherein the first template file is configurable to include;
-
20. A user interface generation system, comprising:
-
at least one processing device; non-transitory memory storing instructions that when executed by the at least one processing device are configured to cause the user interface generation system to perform operations comprising; enabling a user to select, via a user interface, a first template file, wherein the first template file is configurable to include; a plurality of fields, including; first and second changeable fields configured to be changed persistently, wherein the first changeable field is configured to receive from a user a content value used to generate a target file; the second changeable field is configured to receive a security-related value; a third changeable field including a first value configured to be changed temporarily to receive an encrypted version of the first value; parsing the first template file to determine when the first, second, or third changeable fields are present; at least partly in response to determining that the first, second, and third changeable fields are present in the first template file; generating a user interface, including; a first prompting label, corresponding to the first changeable field, requesting the user to enter the user content value, a second prompting label, corresponding to the second changeable field, requesting that the user enter audit data or access control data; generating an encrypted version of the first value corresponding to the third changeable field, and temporarily replacing the first value with the encrypted value; transmitting the first template file over a network to a specified destination including the encrypted version of the first value corresponding to the third changeable field to prevent exposure of the first value to an interceptor, not associated with the specified destination, of the first template, wherein the encrypted version of the first value is stored with the target file during transmission, and after the target file being received at the specified destination, the encrypted version of the first value will be dynamically decrypted and the third changeable field will include the first value; and generating the target file based at least in part on; a user input received via the first changeable field, including the user content value, a user input received via the second changeable field, including the audit data or access control data, and on the encrypted version of the first value.
-
-
21. A computer implemented method for encryption comprising:
-
storing in computer readable memory an array, wherein for a first character set of a first number of characters, the characters in the first character set are represented by the array, the array including indexes from 1 to the first number, storing in computer readable memory a first data structure that provides a one to one mapping of indexes of the array, whose corresponding array element represents a given character in the first character set, to another index of the array whose corresponding array element represents a character that represents an encrypted version of the given character, wherein a first portion of the first data structure contains a first sequence of distinct positive integers in the range of 1 to the first number representing the indexes of the array, and a second portion of the first data structure, representing the portion of indexes mapped, by a one to one mapping, from the indexes contained in the first portion, contains a second sequence of distinct positive integer in the range from 1 to the first number ordered differently than the first sequence of distinct positive integers, receiving, by a computer system, a first character string, the first character string including at least a portion of characters included in the first character set; encrypting, by the computer system, the first character string by; identifying, by the computer system, respective index values corresponding to characters in the first character string in the first array; mapping, by the computer system, the identified index values corresponding to characters in the first character string in the first array to an encrypted version of the first character string utilizing the first data structure; outputting, by the computer system, the encrypted version of the first character string. - View Dependent Claims (22, 23)
-
-
24. An encryption system, comprising:
-
at least one processing device; non-transitory memory storing instructions that when executed by the at least one processing device are configured to cause the encryption system to perform operations comprising; storing in computer readable memory an array, wherein for a first character set of a first number of characters, the characters in the first character set are represented by the array, the array including indexes from 1 to the first number, storing in computer readable memory a first data structure that provides a one to one mapping of indexes of the array, whose corresponding array element represents a given character in the first character set, to another index of the array whose corresponding array element represents a character that represents an encrypted version of the given character, wherein a first portion of the first data structure contains a first sequence of distinct positive integers in the range of 1 to the first number representing the indexes of the array, and a second portion of the first data structure, representing the portion of indexes mapped, by a one to one mapping, from the indexes contained in the first portion, contains a second sequence of distinct positive integer in the range from 1 to the first number ordered differently than the first sequence of distinct positive integers, receiving a first character string, the first character string including at least a portion of characters included in the first character set; encrypting the first character string by; identifying respective index values corresponding to characters in the first character string in the first array; mapping, by the computer system, the identified index values corresponding to characters in the first character string in the first array to an encrypted version of the first character string utilizing the first data structure; outputting, by the computer system, the encrypted version of the first character string.
-
-
25. A cloud template based text file management system comprising:
-
a first cloud client, including at least a processing device, hosting a file management system configured to manage at least the creation, using a template file, editing, encryption, decryption, and backup of a first text file; a first cloud server hosting a virtual file management system, configured to; receive the first text file from the first cloud client, manage at least creation and allocation of a partition of a first storage resource for the first cloud client, perform back up of the received first text file to the first storage resource, determine when the first text file is encrypted, at least partly in response to the determination that the first text file is encrypted and a request received from an authorized user, decrypt the received first text file, retrieve the first text file from the first storage resource in response to a request from the first cloud client, and provide secure communications with the first cloud client using at least; encryption, an audit trail, and access control, the access control indicating who may access the first text file. - View Dependent Claims (26, 27)
-
Specification