Security systems and methods for encoding and decoding digital content
First Claim
1. A first user node to control digital content, the first user node comprising:
- a processor, anda memory, coupled to the processor, storing code that is executable by the processor to cause the processor to;
receive a request to publish digital text content received at an input field in an electronic document, where the publishing request is associated with the first user node;
in response to the publishing request, determine whether to encrypt the input field text content in the electronic document;
receive instructions to replace, in the electronic document, the input field text content with an encrypted version of the input field text content based on an encryption policy defined by a controlling entity and prior to uploading the input field text content to web service, wherein the controlling entity includes a policy node that is separate from the first user node;
access the policy node;
obtain the encryption policy and an encryption key from the policy node;
encrypt the input field text content with the encryption key to generate encrypted input field text content;
tag the encrypted input field text content with a tag that includes an address of the policy node and an identifier of the encryption policy to allow the web service to extract the address of the policy node and the identifier of the encryption policy and obtain a decryption key to decrypt the encrypted input field text content; and
upload the encrypted input field text content and the tag to the web service.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider'"'"'s website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.
52 Citations
40 Claims
-
1. A first user node to control digital content, the first user node comprising:
-
a processor, and a memory, coupled to the processor, storing code that is executable by the processor to cause the processor to; receive a request to publish digital text content received at an input field in an electronic document, where the publishing request is associated with the first user node; in response to the publishing request, determine whether to encrypt the input field text content in the electronic document; receive instructions to replace, in the electronic document, the input field text content with an encrypted version of the input field text content based on an encryption policy defined by a controlling entity and prior to uploading the input field text content to web service, wherein the controlling entity includes a policy node that is separate from the first user node; access the policy node; obtain the encryption policy and an encryption key from the policy node; encrypt the input field text content with the encryption key to generate encrypted input field text content; tag the encrypted input field text content with a tag that includes an address of the policy node and an identifier of the encryption policy to allow the web service to extract the address of the policy node and the identifier of the encryption policy and obtain a decryption key to decrypt the encrypted input field text content; and upload the encrypted input field text content and the tag to the web service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory, computer readable program product comprising processor executable code stored therein and configured to cause a first node to
receive a request to publish digital text content received at an input field in an electronic document, where the publishing request is associated with the first user node; -
in response to the publishing request, determine whether to encrypt the input field text content in the electronic document; receive instructions to replace, in the electronic document, the input field text content with an encrypted version of the input field text content based on an encryption policy defined by a controlling entity and prior to uploading the input field text content to web service, wherein the controlling entity includes a policy node that is separate from the first user node; access the policy node; obtain the encryption policy and an encryption key from the policy node; encrypt the input field text content with the encryption key to generate encrypted input field text content; tag the encrypted input field text content with a tag that includes an address of the policy node and an identifier of the encryption policy to allow the web service to extract the address of the policy node and the identifier of the encryption policy and obtain a decryption key to decrypt the encrypted input field text content; and upload the encrypted input field text content and the tag to the web service. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification