×

System and method of applying adaptive privacy controls to lossy file types

  • US 9,990,513 B2
  • Filed: 12/31/2015
  • Issued: 06/05/2018
  • Est. Priority Date: 12/29/2014
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable medium comprising computer executable instructions stored thereon that when executed cause one or more processing units to:

  • receive an indication of a first protected portion of a file of a lossy file type, wherein the first protected portion comprises a sub-portion of the file;

    generate first and second versions of the first protected portion of the file, wherein at least a part of the first version and the second version are identical, and wherein at least a part of the first version and the second version differ from each other;

    receive a first access permission setting for the first version of the first protected portion of the file;

    receive a second access permission setting for the second version of the first protected portion of the file;

    receive an indication of a first recipient for the first version of the first protected portion;

    receive an indication of a second recipient for the second version of the first protected portion;

    generate an edited copy of the file that is obfuscated at a code level by generating modified pixel values corresponding to a location of the first protected portion to create an edited lossy file, wherein the obfuscation further comprises masking an original content of the file at the location of the first protected portion;

    encrypt the first version of the first protected portion based, at least in part, on the first access permission settings and the first recipient;

    encrypt the second version of the first protected portion based, at least in part, on the second access permission settings and the second recipient;

    add the encrypted first and second versions of the first protected portion, associated with their respective access permission settings, back into the edited lossy file as hidden data within a data structure of the edited lossy file, wherein at least a part of the first version also masks the original content of the file at at least part of the location of the first protected portion; and

    transmit the edited lossy file to the first and the second recipients.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×