Defining access rights to content
First Claim
Patent Images
1. A computer-implemented method comprising:
- encrypting, at a computing device, a portion of text associated with a message intended for a group of recipients, wherein the portion of text includes less than an entirety of the message;
restricting access to the portion of text for a first subset of the group of recipients of the message; and
allowing access to the portion of text to a second subset of the group of recipients of the message, whereinthe message includes a textual secondary message indicating that the portion of text has been encrypted.
1 Assignment
0 Petitions
Accused Products
Abstract
A portion of text associated with a message intended for a group of recipients is encrypted at a computing device. The portion of text may include less than an entirety of the message. Access to the portion of text may be restricted for a first subset of the group of recipients and allowed for a second subset of the group of recipients.
12 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
encrypting, at a computing device, a portion of text associated with a message intended for a group of recipients, wherein the portion of text includes less than an entirety of the message; restricting access to the portion of text for a first subset of the group of recipients of the message; and allowing access to the portion of text to a second subset of the group of recipients of the message, wherein the message includes a textual secondary message indicating that the portion of text has been encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product, comprising:
-
a computer readable hardware storage device having computer readable program code embodied therewith, the computer readable program code comprising; computer-readable program code configured to encrypt a portion of text associated with a message intended for a group of recipients, the portion of text including less than an entirety of the message; computer-readable program code configured to restrict access to the portion of text for a first subset of the group of recipients of the message; and computer-readable program code configured to allow access to the portion of text to a second subset of the group of recipients of the message, wherein the message includes a textual secondary message indicating that the portion of text has been encrypted. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing system comprising:
-
at least one processor; at least one memory architecture coupled with the at least one processor; a first software module executed on the at least one processor and the at least one memory architecture, wherein the first software module is configured to encrypt a portion of text associated with a message intended for a group of recipients, the portion of text including less than an entirety of the message; a second software module executed on the at least one processor and the at least one memory architecture, wherein the second software module is configured to restrict access to the portion of text for a first subset of the group of recipients of the message; and a third software module executed on the at least one processor and the at least one memory architecture, wherein the third software module is configured to allow access to the portion of text to a second subset of the group of recipients of the message, wherein the message includes a textual secondary message indicating that the portion of text has been encrypted. - View Dependent Claims (18, 19, 20)
-
Specification