Apparatus, method, and computer program for providing document security
First Claim
Patent Images
1. A computer program embodied on a non-transitory computer-readable medium, the computer program configured to cause a processor to:
- convert one or more sections of a document into at least one secured word;
remove the at least one secured word from the document;
perform a periodic check to determine whether communication with a secure storage layer is established to provide user interface security and if the periodic check shows established communication, the secured word is at least one of encrypted, compressed and transmitted and received, decompressed and decrypted;
replace the at least one secured word with at least one replacement word in the document, wherein the at least one replacement word is camouflaged to resemble at least one unsecured general word, wherein if the periodic check does not show established communication and communication fails to be established the document displays unsecured content and alternative content to camouflage an intent of an author associated with the document and wherein the document appears as an unsecured document, the secured content having been removed from the document;
receive a request to access to the document from a user;
determine if the user is authorized;
display at least one unsecured word and the at least one replacement word in the document when a user is unauthorized; and
display at least one unsecured word and the at least one secured word in the document when a user is authorized.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method, and a computer program are provided to secure one or more sections of a document. For example, one or more sections of the document may be converted into secured content. The secured content may then be removed from the document, and replaced with replacement content in the document. This may prevent a viewer with no privileges from viewing secured content.
-
Citations
11 Claims
-
1. A computer program embodied on a non-transitory computer-readable medium, the computer program configured to cause a processor to:
-
convert one or more sections of a document into at least one secured word; remove the at least one secured word from the document; perform a periodic check to determine whether communication with a secure storage layer is established to provide user interface security and if the periodic check shows established communication, the secured word is at least one of encrypted, compressed and transmitted and received, decompressed and decrypted; replace the at least one secured word with at least one replacement word in the document, wherein the at least one replacement word is camouflaged to resemble at least one unsecured general word, wherein if the periodic check does not show established communication and communication fails to be established the document displays unsecured content and alternative content to camouflage an intent of an author associated with the document and wherein the document appears as an unsecured document, the secured content having been removed from the document; receive a request to access to the document from a user; determine if the user is authorized; display at least one unsecured word and the at least one replacement word in the document when a user is unauthorized; and display at least one unsecured word and the at least one secured word in the document when a user is authorized. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method, comprising:
-
converting, by a processor, one or more sections of a document into at least one secured word; removing, by the processor, the at least one secured word from the document; performing a periodic check to determine whether communication with a secure storage layer is established to provide user interface security and if the periodic check shows established communication, the secured word is at least one of encrypted, compressed and transmitted and received, decompressed and decrypted; replacing, by the processor, the at least one secured word with at least one replacement word in the document, wherein the at least one replacement word is camouflaged to resemble at least one unsecured general word, wherein if the periodic check does not show established communication and communication fails to be established the document displays unsecured content and alternative content to camouflage an intent of an author associated with the document, wherein the document appears as an unsecured document, the secured content having been removed from the document; receiving a request to access to the document from a user; determining if the user is authorized; displaying at least one unsecured word and the at least one replacement word in the document when a user is unauthorized; and displaying at least one unsecured word and the at least one secured word in the document when a user is authorized. - View Dependent Claims (7, 8, 9)
-
-
10. An apparatus, comprising:
-
physical memory comprising computer program instructions; and a processor coupled to the physical memory, wherein the computer program instructions, when executed, are configured to cause the processor to; convert one or more sections of a document into at least one secured word; remove the at least one secured word from the document; perform a periodic check to determine whether communication with a secure storage layer is established to provide user interface security and if the periodic check shows established communication, the secured word is at least one of encrypted, compressed and transmitted and received, decompressed and decrypted; replace the at least one secured word with at least one replacement word in the document, wherein the at least one replacement word is camouflaged to resemble at least one unsecured general word, wherein if the periodic check does not show established communication and communication fails to be established the document displays unsecured content and alternative content to camouflage an intent of an author associated with the document, wherein the document appears as an unsecured document, the secured content having been removed from the document; receive a request to access to the document from a user; determine if the user is authorized; display at least one unsecured word and the at least one replacement word in the document when a user is unauthorized; and display at least one unsecured word and the at least one secured word in the document when a user is authorized. - View Dependent Claims (11)
-
Specification