WO1997009817A2 - Document processing - Google Patents

Document processing Download PDF

Info

Publication number
WO1997009817A2
WO1997009817A2 PCT/IL1996/000088 IL9600088W WO9709817A2 WO 1997009817 A2 WO1997009817 A2 WO 1997009817A2 IL 9600088 W IL9600088 W IL 9600088W WO 9709817 A2 WO9709817 A2 WO 9709817A2
Authority
WO
WIPO (PCT)
Prior art keywords
document
information
text
user
encrypted
Prior art date
Application number
PCT/IL1996/000088
Other languages
French (fr)
Other versions
WO1997009817A3 (en
Inventor
Itzhak Pomerantz
Emanuel Menczer
Ram Cohen
Original Assignee
Aliroo Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from IL11507995A external-priority patent/IL115079A/en
Priority claimed from IL11527795A external-priority patent/IL115277A/en
Priority claimed from IL11621895A external-priority patent/IL116218A/en
Application filed by Aliroo Ltd. filed Critical Aliroo Ltd.
Priority to AU68358/96A priority Critical patent/AU6835896A/en
Priority to GB9804072A priority patent/GB2319428B/en
Priority to JP9511042A priority patent/JPH11511570A/en
Publication of WO1997009817A2 publication Critical patent/WO1997009817A2/en
Publication of WO1997009817A3 publication Critical patent/WO1997009817A3/en
Priority to US09/032,293 priority patent/US6178243B1/en
Priority to US09/687,640 priority patent/US6373947B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • the system includes automatic encryption and storage apparatus which automatically encrypts and then stores information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor. This cessation may be intentional or unintentional.
  • a secure document processing system including a document processor having an input device for inputting information in a non-secure form, an information output device associated with the document processor, and encryption apparatus associated with the document processor and with the information output device and being operative to encrypt all information received from the document processor prior to output thereof by the information output device in a secure form.
  • the system includes automatic encryption and output apparatus which automatically encrypts and then outputs information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor.
  • Selection of the portions of the document to be encrypted may be carried out concurrently with generation of the document or after generation thereof.
  • the encryp ⁇ tion can take place either on-line or off-line.
  • the non-modified operating environment is a WINDOWS environment.
  • Figs. 3A, 3B & 3C illustrate part of a document produced in accordance with one preferred embodiment of the present invention in non-encrypted form and two different selectably encrypted forms respectively;
  • the document processor 12 is incapable of preserving the contents of the document in non-secure form beyond the time period when it is actually being generated.
  • Fig. 9. which illustrates at block 312, definition of a given area of a text and copying thereof into a temporary storage facility, termed a "Clipboard" in WINDOWS, by means of a Copy command.
  • a Copy command As indicated at block 31 , upon entry of the Copy command, the contents of the Clipboard are compared with the previous contents of the Clipboard, stored in a copy buffer, which were entered by the previous Copy command in order to determine whether two repeated se ⁇ quential Copy commands were entered without altering the contents of the Clipboard.
  • the "Select” command enables the user to mark a segment of a document.
  • the "Copy” command enables the user to copy the selected segment of the document into the Clipboard, which makes it accessible by another process or program.
  • the "Paste” command enables the user to paste the contents of the Clipboard into any desired place in the document.

Abstract

A secure document processing system including a document processor having an input device for inputting information in a non-secure form, an information storage medium (20, 22, 44) associated with the document processor, and encryption apparatus (16) associated with the document processor and with the information storage medium and being operative to encrypt all information received from the document processor prior to storage thereof by the information storage medium in a secure form. There is also provided a system for selectable encryption of documents including a document generator and a user-controlled document encryptor operative to encrypt user-selected portions of a document generated on the document generator.

Description

DOCUMENT PROCESSING
The present invention relates to document processing generally and more particularly to document processing which is protected against unauthorized ac¬ cess.
Problems of security in information transmis¬ sion have been addressed in various ways in the prior art. Various types of encryption techniques are presently used to provide desired levels of security for informa¬ tion transmission and to prevent unauthorized access thereto or modification thereof.
Protecting the security of documents at the time and location of their creation has not been ad¬ dressed in the same manner. Generally, security of docu¬ ments generated using electronic apparatus is ensured by physical security of the electronic apparatus. Thus computers or the storage media thereof are maintained in physically secure installations.
Ensuring the security of documents in environ¬ ments wherein maintenance of the computers or the stor¬ age media in physically secure installations is impracti¬ cal appears to be a problem still awaiting a solution.
Various techniques are known for protection of communications against unauthorized access. Scrambling and various other forms of encryption are commonly em¬ ployed for this purpose. Generally, an entire file is protected in this way.
There is described in applicant/inventor's pending PCT patent application, PCT/US94/Θ8684 an appara¬ tus and method for creating and transmitting confidential documents, the disclosure of which is hereby incorporated by reference. Disclosed inter alia in this document is the encryption of only part of a document, wherein the header of the document is left unencrypted.
In computer operating systems and methods it is common for a user carrying out a first process to trigger the operation of a second process. The trigger is typi¬ cally the entry of a predetermined command which can be achieved using a conventional keyboard or mouse.
Designing the trigger is relatively straight¬ forward when the programmer has access to the first process and is allowed to make changes thereto in order to accommodate the predetermined command.
Increasingly, there are operating environments which are in extremely widespread use, but whose operat¬ ing commands cannot be accessed and modified in practice by designers of such second processes. Such operating environments may include operating systems, such as WINDOWS, a trademark of Microsoft Corporation, and oper¬ ating processes, such as WORD 2.0 FOR WINDOWS, a trade¬ mark of Microsoft Corporation. Even when the operating commands can be accessed and modified by de¬ signers of such second processes, it is often impractical or uneconomical to do so, since such modifications would require changes such as the creation of new "macros" for each application. There may exist therefore many "non- modified" operating environments for which the present invention is particularly suited.
The present invention concerns triggers operat¬ ing in non-modified operating environments for enabling a user carrying out a first process to trigger the opera¬ tion of a second process.
The present invention seeks to provide a secure document processing system, which preserves the security of documents processed thereby even in the absence of physical security at the location of the system.
There is thus provided in accordance with a preferred embodiment of the present invention, a secure document processing system including a document processor having an input device for inputting information in a non-secure form, an information storage medium associated with the document processor, and encryption apparatus associated with the document processor and with the information storage medium and being operative to encrypt all information received from the document processor prior to storage thereof by the information storage medium in a secure form.
In accordance with a preferred embodiment of the present invention, the system includes automatic encryption and storage apparatus which automatically encrypts and then stores information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor. This cessation may be intentional or unintentional.
Additionally in accordance with a preferred embodiment of the present invention, the system includes automatic encryption and storage apparatus which automat¬ ically encrypts and then stores information inputted by the input device upon interruption of information input for at least a predetermined time. Such interruption is normally indicative of the possible absence or lack of attention of the user.
There is also provided in accordance with a preferred embodiment of the present invention a secure document processing system including a document processor having an input device for inputting information in a non-secure form, an information output device associated with the document processor, and encryption apparatus associated with the document processor and with the information output device and being operative to encrypt all information received from the document processor prior to output thereof by the information output device in a secure form. In accordance with a preferred embodiment of the present invention, the system includes automatic encryption and output apparatus which automatically encrypts and then outputs information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor.
Additionally in accordance with a preferred embodiment of the present invention, the system includes automatic encryption and output apparatus which automat¬ ically encrypts and then outputs information inputted by the input device upon interruption of information input for at least a predetermined time.
Preferably, the document processor is incapable of storing information in a non-secure form. The information storage medium may be any suitable informa¬ tion storage medium, such as a magnetic medium. The information output device may be a printer or information transmitter.
There is additionally provided in accordance with a preferred embodiment of the present invention a secure document processing method including generating a document in a non-secure form on a document processor using an input device for inputting information, encrypt¬ ing all information received from the document processor prior to storage thereof, and storing of the information following encryption thereof on an information storage medium.
In accordance with a preferred embodiment of the present invention, the method includes automatic encryption and storage of information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor. Additionally in accordance with a preferred embodiment of the present invention, the method includes automatic encryption and storage of information inputted by the input device upon interruption of information input for at least a predetermined time.
There is further provided in accordance with a preferred embodiment of the present invention a secure document processing method including generating a docu¬ ment in a non-secure form on a document processor using an input device for inputting information, encrypting all information received from the document processor prior to output thereof, and outputting of the informa¬ tion following encryption thereof on an information storage medium.
In accordance with a preferred embodiment of the present invention, the method includes automatic encryption and outputting of information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor.
Additionally in accordance with a preferred embodiment of the present invention, the method includes automatic encryption and outputting of information input¬ ted by the input device upon interruption of information input for at least a predetermined time.
In such cases, no information is retained in a non-secure form at the document processor.
Preferably, the method includes prevention of storage of information in a non-secure form. The document processor may be a computer, such as a personal computer, equipped with a word and/or graphics processing program.
The present invention also seeks to provide an improved apparatus and method for protecting documents which, it is believed, will have broad application. There is thus provided in accordance with a preferred embodiment of the present invention a system for selectable encryption of documents including a docu¬ ment generator and a user-controlled document encryptor operative to encrypt user-selected portions of a document generated on the document generator.
In accordance with a preferred embodiment of the invention, the document generator comprises a comput¬ er having a word processing functionality and the user- controlled document encryptor comprises a hardware and/or software embodied functionality which enables the user to select portions of the document to be encrypted.
There is also provided in accordance with a preferred embodiment of the present invention a method for selectable encryption of documents including generat¬ ing a document and encrypting user-selected portions of the document. There is additionally provided in accordance with a preferred embodiment of the present invention a partially encrypted document produced using the method or the apparatus of the present invention.
In accordance with one embodiment of the present invention, a cut and paste functionality is employed for selecting portions of the document to be encrypted. Alternatively, text delimiters may be employed for selecting portions of the document to be encrypted.
Selection of the portions of the document to be encrypted may be carried out concurrently with generation of the document or after generation thereof. The encryp¬ tion can take place either on-line or off-line.
In accordance with a preferred embodiment of the present invention, the control characters employed in word processing are not encrypted. Accordingly, the selectably encrypted document may retain the format of the corresponding unencrypted document.
The document may include both text and graph- ics. The gϊaphics may be encrypted in a bit-map format, is appreciated that the present invention is equally applicable to decryption of documents.
The present invention also seeks to provide a mechanism and technique useful in a non-modified operat¬ ing environment for enabling a user carrying out a first process to trigger the operation of a second process.
There is thus provided in accordance with a preferred embodiment of the present invention a computer system including a first operating process operating in a non-modified operating environment and having at least one operating command which is normally employed only in a given mode in the first operating process, and at least one second operating process, the improvement comprising a trigger for enabling a user operating the first operat¬ ing process to initiate the second operating process, the trigger comprising said at least one operating command used in a mode other than said given mode.
There is also provided in accordance with a preferred embodiment of the present invention for use in a computer system including a first operating process operating in a non-modified operating environment and having at least one operating command which is normally employed only in a given mode in the first operating process, and at least one second operating process, a method for enabling a user operating the first operating process to initiate the second operating process, the method comprising entering said at least one operating command in a mode other than said given mode.
The invention is particularly suitable for situations wherein the first operating process operates in a non-modified operating environment.
In accordance with a preferred embodiment of the present invention, the first operating process is a text editing process.
Additionally in accordance with a preferred embodiment of the present invention, the given mode is a single, non-repeated entry. Preferably the mode other than the given mode is a sequential repeated entry.
In accordance with a preferred embodiment of the present invention, the at least one operating command is a copy command.
Further in accordance with a preferred embodi¬ ment of the present invention the non-modified operating environment is a WINDOWS environment.
The second operating process may be any suit¬ able process, such as a text encryption process described hereinabove. Another suitable second operating process is a spell checking process. The second operating process also could be, for example, a language translation proc¬ ess, a text capitalizing process, a text to speech con¬ version process or a decryption process.
The present invention will be understood and appreciated more fully from the following detailed de¬ scription, taken in conjunction with the drawings in which:
Fig. 1 is a simplified block diagram of a secure document processing system constructed and opera¬ tive in accordance with a preferred embodiment of the present invention;
Figs. 2A and 2B illustrate a document produced in accordance with the present invention in respective non-encrypted and selectably encrypted form;
Figs. 3A, 3B & 3C illustrate part of a document produced in accordance with one preferred embodiment of the present invention in non-encrypted form and two different selectably encrypted forms respectively;
Figs. 4A, 4B & 4C illustrate part of a document produced in accordance with another preferred embodiment of the present invention in non-encrypted form and two different selectably encrypted forms respectively;
Figs. 5A and 5B illustrate a document contain- ing text and graphics produced in accordance with the present invention in respective non-encrypted and select¬ ably encrypted form;
Figs. 6A, 6B , 6C and 6D illustrate selectable encryption of a document text that contains control characters ;
Figs. 7 and 8 are simplified block diagram illustrations of user selectable encryption and decryp¬ tion systems constructed and operative in accordance with a preferred embodiment of the present invention;
Fig. 9 is a simplified flow chart illustration of the invention;
Fig. 10 is a simplified block diagram illustra¬ tion of the invention; and
Fig. 11 is a simplified flow chart illustration of a preferred embodiment of the invention.
Reference is now made to Fig. 1, which is a simplified block diagram of a secure document processing system constructed and operative in accordance with a preferred embodiment of the present invention. An input device 10, such as a keyboard or graphics input device, is employed by an operator to generate a document on a document processor 12 in a non-secure form, such as a human-readable form used in conventional word processors. The document processor may be any suitable computer equipped for word processing.
It is a particular feature of the present invention that the document processor 12 is incapable of preserving the contents of the document in non-secure form beyond the time period when it is actually being generated.
The only information output facility or port of the document processor 12, here indicated by reference numeral 14, is non-re ovably connected to an encryption mechanism 16 which is operative to encrypt the contents of every document generated on the document processor 12. The encryption mechanism 16 may be any suitable type of encryption mechanism known in the art and commercially available and may provide encryption at any suitable level. A preferred encryption device may be that incorpo¬ rated in the PrivaSoft (trademark) encryption system commercially available from Aliroo Ltd. of Israel, the present assignee.
The output Ik of the encryption mechanism 16 is connected to a storage medium, typically including a disk drive 20 and magnetic storage apparatus 22. Alterna¬ tively or additionally, the output of the encryption mechanism 16 may be supplied to an output device, such as a printer 2k which produces a paper or other hard copy print out 26. The output device may alternatively in¬ clude an information transmitter, such as fax modem.
It is a particular feature of the present invention that information cannot be transferred from the document processor 12 to the storage media or the output device without first being encrypted.
It is additionally a particular feature of the present invention that the operation of the document processor and the encryption mechanism are such that once their operation is completed, no information in non- secure form remains therein or thereat.
In order to ensure that information in non- secure form is not inadvertently exposed when document processing operation is paused and the document processor is left unattended, the document processor may be pro¬ grammed so as to provide automatic encryption and subse¬ quent storage and/or outputting of information inputted by the input device upon interruption of information input for at least a predetermined time or upon cessation of the supply of electrical power to the document proces¬ sor.
In such cases, all the information in non- secure form is eliminated from the document processor and the encryption mechanism. The automatic encryption may employ a key which is provided by the user during docu¬ ment processing. In the absence of such key, the document processor irrevocably erases all information in non- secure form.
The encrypted information which was generated in the document processor may be downloaded from a stor¬ age medium such as magnetic storage apparatus 22 using the same or a different disk drive 44. If the encrypted information is in hard copy form, it may be scanned by a scanner 48. In either case, such information can be decrypted at any location by the use of a suitable de¬ cryption mechanism 52 and supplied to a document viewer 5 in non-secure, human readable form. Preferably, the decryption mechanism 2 and the document viewer have no information storage or hard copy output capability and are operative only when attended by an authorized user.
Reference is now made to Figs. 2A and 2B , which illustrate a document produced in accordance with the present invention in respective non-encrypted and select¬ ably encrypted form, indicated by respective reference numerals 110 and 122. The document may be any suitable document and may be generated in any suitable manner, such as on a conventional PC based word processor.
In accordance with a preferred embodiment of the present invention, a user may select portions of the document which are to be encrypted. For example, para¬ graph 112 of the document is unencrypted, as indicated at reference numeral 124 in Fig. 2B . Paragraph 114 is en¬ crypted, as indicated at reference numeral 126 in Fig. 2B, with the exception of one word "Friendship", indicat¬ ed by reference numeral 116 in both Figs. 2A and 2B .
Paragraph 118 is seen to be unencrypted, as indicated at reference numeral 128 in Fig. 2B , with the exception of one phrase "Top Secret", indicated by refer¬ ence numeral 120 in Fig. 2A and in its encrypted form in Fig. 2B , by reference numeral 130.
Reference is now made to Figs. 3A, 3B and 3C, which illustrate part of a document 200 produced in accordance with one preferred embodiment of the present invention in non-encrypted form and two different select¬ ably encrypted forms respectively. Here the segments to be encrypted are selected using a conventional "cut and paste" function which is available in most word proces¬ sors .
The advantage of this functionality is that the user need not modify the original text and that the segments may be selected for encryption after the docu¬ ment is finished. A disadvantage is that encryption has to be done in real time, segment by segment, because in most word processors only one continuous segment may be "cut" at a time.
Fig. 3A shows a passage with a segment l4θ marked for encryption. Fig. 3B shows the same passage with segment l4θ encrypted. Fig. 3C shows the identical passage with segment l4θ encrypted with the addition of a label section 144 which contains service information such as encryption key identification information or other information which is useful in decrypting the segment or encryptor identification information operative to identi¬ fy the serial number of the individual encryptor employed to encrypt the segment. Additionally text delimiters 146 and 148 and character data 149 may be provided in the encrypted text to enable automatic decryption.
Character data 149. also referred to as a key extension, is employed in a conventional manner to en¬ hance the robustness of the encryption. It is know that when multiple segments or pages of data are encrypted with the same key, cracking the encryption is made easi¬ er. In order to prevent this phenomenon but still require the user to enter only one key per document for decryp¬ tion, the encryption program generates random characters which constitute a key extension, which characters are employed together with the user-defined encryption key to create a new key which is the actual one used for the encryption. The key extension is inserted in the encrypt¬ ed document so that the decrypter uses it together with the user defined decryption key in order to reconstruct the key which is used for decrypting the document. The key extension can be recognized automatically or may be inserted manually since it is formed of printable charac¬ ters inserted into the encrypted document.
Reference is now made to Figs. 4A, 4B and 4C, which illustrate part of a document produced in accord¬ ance with another preferred embodiment of the present invention in non-encrypted form and two different select¬ ably encrypted forms respectively. Here the segments to be encrypted are selected using text delimiters, also known as control strings.
The advantage of this functionality is that the user can easily instruct the encryptor where to start and where to finish as he writes. Using this functionality, the user can save the file and have it encrypted off-line inasmuch as the text delimiters are part of the saved file.
Fig. 4A shows a passage with a segment 1 0 marked for encryption by text delimiters 1 and 15 . Fig. 4B shows the same passage with segment 150 encrypt¬ ed. Fig. 4C shows the identical passage with segment 150 encrypted with the addition of a label section 164 which contains service information such as encryption key identification information or other information which is useful in decrypting the segment or encryptor identifica¬ tion information operative to identify the serial number of the individual encryptor employed to encrypt the segment.
Additional text delimiters 166 and 168 and character data 169 may be provided in the encrypted text to enable automatic decryption.
Reference is now made to Figs. A and B. which illustrate a document containing text and graphics pro¬ duced in accordance with the present invention in respec¬ tive non-encrypted and selectably encrypted form. It is a particular feature of the invention that the overall layout of the document is preserved even when parts thereof are encrypted. It is also a particular feature of the invention that selectable parts of the graphics contained therein can be encrypted by bit map encryption techniques .
Reference is now made to Figs. 6A, 6B , 6C and 6D illustrate selectable encryption of a document text that contains control characters. In this embodiment, the encryptor recognizes control characters used by a word processor and does not encrypt them. Only the data, i.e. the text typed by the user which is visible on the screen and hard copy, is encrypted. As a result the encrypted document looks exactly like the original. Boldface re¬ mains boldface, underlining is unchanged and line justi¬ fication is intact. The same font and line spacing may be used notwithstanding that the document is wholly or partially encrypted.
Fig. 6A shows the unencrypted document includ¬ ing boldface characters indicated at reference numeral 190 and underlining, indicated at reference numeral 192. Fig. 6B shows the unencrypted document of Fig. 6A togeth¬ er with the control characters which are not normally displayed. Fig. 6C corresponds to Fig. 6B except that the document is encrypted. It is seen that the control char¬ acters are not affected by the encryption. Fig. 6D illus¬ trates the encrypted document. It is seen from Fig. 6D that the encrypted document looks exactly like the origi¬ nal. Boldface remains boldface, underlining is unchanged and line justification is intact. The same font and line spacing may be used notwithstanding that the document is wholly or partially encrypted.
Reference is now made to Figs. 7 and 8, which are simplified block diagram illustrations of user se¬ lectable encryption and decryption systems constructed and operative in accordance with a preferred embodiment of the present invention. As seen in Fig. 1 , an unen¬ crypted document 200 is suppled to an encryptor 202 having associated therewith an input device 204 and a viewing device 206. It is appreciated that elements 202, 204 and 206 may all be embodied in a suitably programmed personal computer having conventional word processing functionality. The output of encryptor 202 when the functionality described hereinabove is carried out is a user selected partially encrypted document 208 having encrypted portions 210.
Referring to Fig. 8, it is seen that an en¬ crypted document 220, having user selected encrypted portions 222, is supplied to a decrypter 224 having associated therewith an input device 226 and a viewing device 228. It is appreciated that elements 224, 226 and 228 may all be embodied in a suitably programmed person¬ al computer having conventional word processing function¬ ality. The output of decrypter 224, when the functionali¬ ty described hereinabove is carried out, is a decrypted document 230.
Further embodiments of the present invention will be described in the context of a text-editing pro¬ gram, such as WORD 2.0 FOR WINDOWS, operating in a WIN¬ DOWS operating environment. It is to be appreciated that the invention is not limited to text-editing nor to the WINDOWS operating environment.
The method of the invention will now be de¬ scribed with reference to Fig. 9. which illustrates at block 312, definition of a given area of a text and copying thereof into a temporary storage facility, termed a "Clipboard" in WINDOWS, by means of a Copy command. As indicated at block 31 , upon entry of the Copy command, the contents of the Clipboard are compared with the previous contents of the Clipboard, stored in a copy buffer, which were entered by the previous Copy command in order to determine whether two repeated se¬ quential Copy commands were entered without altering the contents of the Clipboard.
As indicated at blocks 316 and 322, if the current contents of the Clipboard are not identical to the previous Clipboard contents, indicating that two repeated sequential Copy commands were not entered, no trigger is recognized and no second process is initiated and the current contents of the Clipboard are copied into the copy buffer.
If the current contents of the Clipboard are identical to the previous Clipboard contents, indicating that two repeated sequential Copy commands were entered, a trigger is recognized, as indicated at block 320, producing a special operation, i.e. a second process.
Referring now to the simplified block diagram of Fig. 10, it is seen that text, indicated by reference numeral 330 is stored in a Clipboard 332. The current contents of the Clipboard 332 are compared by a compara¬ tor 334 with the previous contents of the Clipboard, which are stored in a copy buffer 336 under the control of control apparatus 338. The comparator 334, upon sens¬ ing a sequential repeat Copy command entry provides an output 3 0 which initiates a special operation. It is appreciated that the structure of Fig. 10 is normally embodied in software or a combination of hardware and software .
It is to be appreciated that although the invention has been described hereinabove in the context of the use of repeated Copy commands, the invention is not limited to such use and may be applicable to commands other than Copy commands , which may be independent of the Clipboard. Furthermore, although the invention as de¬ scribed hereinabove identifies the trigger by sensing identical Clipboard contents, this criteria need not be the only criteria and may be replaced by any other suit¬ able criteria.
Reference is now made to Fig. 11, which illus¬ trates the invention in the specific context of a WINDOWS text editing program having "Select", "Copy" and "Paste" commands. Descriptions of the structure of WINDOWS are in the public domain. One useful guide is The Microsoft guide to writing applications for Windows 3-1 by Charles Petzold, 3rd Edition, Published by Microsoft Press, Copyright 1992, the disclosure of which is hereby incor¬ porated by reference. ;
The "Select" command enables the user to mark a segment of a document. The "Copy" command enables the user to copy the selected segment of the document into the Clipboard, which makes it accessible by another process or program. The "Paste" command enables the user to paste the contents of the Clipboard into any desired place in the document.
In most operating systems, such as WINDOWS, any suitable process can be programmed to be aware of changes made to the contents of the Clipboard by being made a part of a "notification chain" invoked by the operating system each time such a change occurs. Additionally, in most operating systems, such as WINDOWS, any process may access the contents of the Clipboard for reading and/or modifying the contents.
In accordance with a preferred embodiment of the present invention the existing tools of a text edit¬ ing process, such as that in WINDOWS are employed to initiate another process, such as, for example, text encryption, text translation, text capitalization or text decryption, and to feed a desired segment of text into that second process. In accordance with the preferred embodiment of the present invention, and as described with reference to Fig. 11, the foregoing is accomplished by inspecting and storing the contents of the Clipboard whenever it is updated. If the contents of the Clipboard are found to be related in a predefined manner, such as being identical, to the contents of the Clipboard found upon the previous update, it is determined that the user intended to initi¬ ate the second process and the second process is operat¬ ed.
Further in accordance with a preferred embodi¬ ment of the present invention, the contents of the updat¬ ed Clipboard are employed as input data for the second process.
Additionally in accordance with a preferred embodiment of the present invention, the contents of the Clipboard, following operation of the second process thereon, constitute the output data of the second proc¬ ess .
The preferred embodiment of the invention assumes that inasmuch as it is totally useless for a user, working in the text editing operation, to execute the Copy command twice sequentially on the same portion of the text, it can be safely assumed that by executing the Copy command twice sequentially on the same portion of the text, the user expressed his intention that a second process be initiated.
Additional protection against unintended initi¬ ation of the second process can be achieved by limiting actuation of the second process to occurrences where the time duration between two consecutive Copy commands is less than a predetermined time.
Referring now specifically to Fig. 11, it is seen that the trigger operation begins by subscribing to the Clipboard changes notification chain, which is inher¬ ent in the WINDOWS chain, as indicated in block 350. Upon being informed of a change in Clipboard contents (block 352) , the mechanism and method of the invention compares (block 354) typically the first 128 bytes of data in the Clipboard with those in the copy buffer 336 (Fig. 10) . If the contents are not identical, the first typically 128 bytes of data from the new Clipboard are stored in buffer 336 (Blocks 356 and 358) . A further Clipboard change notification is awaited.
Preferably, if the contents of the Clipboard are identical to those in buffer 336, a time duration determination is made. If the two sequential Copy com¬ mands were given within a given maximum time duration (Block 36O) , typically one second, the second process is initiated (Block 362) . Otherwise, a further Clipboard change notification is awaited.
Following completion of the second process on the text in the Clipboard, a paste operation may be carried out within the first process wherein the modified text from the Clipboard, upon which the second process has operated, is replaced into the text being edited in the first, text editing process.
It is to be appreciated that the second process typically operates automatically but may be interactive and may involve parameter inputs, such as, for example, an encryption key, from the user. The second proc¬ ess in the above example is a single process. Alterna¬ tively it can be multiple processes and include a menu that allows a user to choose between a variety of second processes, such as encryption, decryption, spell check¬ ing, translation to other languages and text to speech conversion.
Appended hereto as Appendix A is a program listing of a source code, written in C language, for carrying out the preferred embodiment of the invention described hereinabove.
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention is defined only by the claims which follow:
Figure imgf000023_0001
wner = GetParent( wner , N
essage,wPara
Figure imgf000024_0001

Claims

C L A I M S
1. A secure document processing system including: a document processor having an input device for inputting information in a non-secure form; an information storage medium associated with the document processor; and encryption apparatus associated with the docu¬ ment processor and with the information storage medium and being operative to encrypt all information received from the document processor prior to storage thereof by the information storage medium in a secure form.
2. A secure document processing system according to claim 1 and also including automatic encryption and storage apparatus which automatically encrypts and then stores information inputted by the input device periodi¬ cally in order not to lose said information upon cessa¬ tion of the supply of electrical power to the document processor .
3. A secure document processing system according to either of claims 1 and 2 and also including automatic encryption and storage apparatus which automatically encrypts and then stores information inputted by the input device upon interruption of information input for at least a predetermined time.
4. A secure document processing system including: a document processor having an input device for inputting information in a non-secure form; an information output device associated with the document processor; and encryption apparatus associated with the docu¬ ment processor and with the information output device and being operative to encrypt all information received from the document processor prior to output thereof by the information output device in a secure form.
5- A secure document processing system according to claim 4 and also including automatic encryption and output apparatus which automatically encrypts and then outputs information inputted by the input device periodi¬ cally in order not to lose said information upon cessa¬ tion of the supply of electrical power to the document processor .
6. A secure document processing system according to claim 4 or claim and also including automatic en¬ cryption and output apparatus which automatically en¬ crypts and then outputs information inputted by the input device upon interruption of information input for at least a predetermined time.
7. A secure document processing system according to any of the preceding claims and wherein said document processor is incapable of storing information in a non- secure form.
8. A secure document processing method including: generating a document in a non-secure form on a document processor using an input device for inputting information ; encrypting all information received from the document processor prior to storage thereof; and storing of the information following encryption thereof on an information storage medium.
9. A secure document processing method according to claim 8 and also including automatic encryption and storage of information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the docu- ment processor.
10. A secure document processing method according to claim 8 or claim and also including automatic en¬ cryption and storage of information inputted by the input device upon interruption of information input for at least a predetermined time.
11. A secure document processing method including: generating a document in a non-secure form on a document processor using an input device for inputting information ; encrypting all information received from the document processor prior to output thereof; and outputting of the information following encryp¬ tion thereof on an information storage medium.
12. A secure document processing method according to claim 11 and also including automatic encryption and outputting of information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the docu¬ ment processor.
13. A secure document processing method according to claim 11 or claim 12 and also including automatic encryption and outputting of information inputted by the input device upon interruption of information input for at least a predetermined time.
14. A secure document processing method according to any of claims 8 - 13 and wherein no information is retained in a non-secure form at the document processor other that during user attended operation thereof.
15. A secure document processing method according to any of claims 8 - 14 and wherein storage of informa¬ tion in a non-secure form is prevented.
16. A system for selectable encryption of documents including a document generator and a user-controlled document encryptor operative to encrypt user-selected portions of a document generated on the document genera¬ tor.
17- A system for selectable encryption of documents according to claim 16 and wherein the document generator comprises a computer having a word processing functional¬ ity and the user-controlled document encryptor comprises a hardware and/or software embodied functionality which enables the user to select portions of the document to be encrypted.
18. A system according to either of claims 16 and 17 and wherein said document generator and user-con¬ trolled document encryptor employ a cut and paste func¬ tionality for selecting portions of the document to be encrypte .
19- A system according to either of claims 16 and 17 and wherein said document generator and user-con¬ trolled document encryptor employ text delimiters for selecting portions of the document to be encrypted.
20. A system according to any of claims 16 - 19 and wherein said document generator and user-controlled document encryptor provide an at least partially encrypt¬ ed document including a plurality of encrypted segments each having associated therewith at least one of a label section which contains service information useful in decrypting the segment, text delimiters and character data to enable automatic decryption of the segment.
21. A system according to any of claims 16 - 20 and wherein said document generator and user-controlled document encryptor are operative to permit selection of the portions of the document to be encrypted to be car- ried out either concurrently with generation of the document or after generation thereof.
22 . A system according to any of claims 16 - 21 and wherein said document generator and user-controlled document encryptor are operative to avoid encryption of the control characters employed in word processing.
23- A system according to any of claims 16 - 22 and wherein said document generator and user-controlled document encryptor are operative to provide a selectably encrypted document which retains the format of the corre¬ sponding unencrypted document.
24. A system according to any of claims 16 - 23 and wherein said document generator and user-controlled document encryptor are operative to provide a selectably partially encrypted document which includes both text and graphics .
25. A system according to claim 24 and wherein said document generator and user-controlled document encryptor are operative to encrypt graphics in a bit-map format.
26. A system for decryption of selectably encrypt¬ ed documents including a document decrypter operative to decrypt user-selected encrypted portions of a partially encrypted document.
27. A system for selectable decryption of documents according to claim 26 and wherein the decrypter comprises a hardware and/or software embodied functionality which enables decryption of user-selected encrypted portions of the document to be decrypted.
28. A system for selectable decryption of documents according to claim 26 and wherein the decrypter employs text delimiters for selecting portions of the document to be decrypted.
29. A system according to any of the preceding claims 26 - 28 and said document decrypter is operative to automatically decrypt an at least partially encrypted document including a plurality of encrypted segments each having associated therewith at least one of a label section which contains service information useful in decrypting the segment, text delimiters and character data to enable automatic decryption of the segment.
30. A method for selectable encryption of docu¬ ments including generating a document and encrypting user-selected portions of the document.
31. A method according to claim 30 and including functionality which enables the user to select portions of the document to be encrypted.
32. A method according to either of claims 30 and 31 and including a cut and paste functionality for se¬ lecting portions of the document to be encrypted.
33- A method according to either of claims 30 and 31 and employing text delimiters for selecting portions of the document to be encrypted.
34. A method according to any of claims 3 - 33 and providing an at least partially encrypted document in¬ cluding a plurality of encrypted segments each having associated therewith at least one of a label section which contains service information useful in decrypting the segment,' text delimiters and character data to enable automatic decryption of the segment. 35- A method according to any of the preceding claims 30 - 34 and wherein selection of the portions of the document to be encrypted may be carried out either concurrently with generation of the document or after generation thereof.
36. A method according to any of the preceding claims 30 - 35 and being operative to avoid encryption of the control characters employed in word processing.
37- A method according to any of claims 30 - 3 and being operative to provide a selectably encrypted docu¬ ment which retains the format of the corresponding unen¬ crypted document.
38. A method according to any of the preceding claims 30 - 37 and being operative to provide a select¬ ably partially encrypted document which includes both text and graphics.
39^ A method according to any of the preceding claims 30 - 38 and being operative to encrypt graphics in a bit-map format.
40. A partially encrypted document produced using the method of any of claims 30 - 39-
41. A partially encrypted document produced using the apparatus of any of claims 16 - 25-
42. A computer system including a first operating process operating in a non-modified operating environment and having at least one operating command which is nor¬ mally employed only in a given mode in the first operat¬ ing process, and at least one second operating process, the improvement comprising: a trigger for enabling a user operating the first operating process to initiate the second operating process, the trigger comprising said at least one operat¬ ing command used in a mode other than said given mode.
43- A system according to claim 42 and wherein the first operating process is a text editing process.
44. A system according to either of claims 42 and 43 and wherein the given mode is a single, non-repeated entry.
45- A system according to claim 44 and wherein the mode other than the given mode is a sequential repeated entry.
46. A system according to any of claims 42 - 5 and wherein said at least one operating command is a copy command.
47- A system according to any of claims 42 - 46 and wherein said non-modified operating environment is a WINDOWS environment.
48. A system according to any of claims 42 - 47 and wherein the second operating process is a text operation process .
9. A system according to claim 48 and wherein the text operation process is selected from a text encryption process, a spell checking process, a language translation process, a text capitalizing process, a text to speech conversion process and a decryption process.
50 A system according to claim 49 and wherein the text encryption process is operative to encrypt only part of a document.
51. A system according to any of claims 42 - 48 and wherein the second operating process includes multiple processes .
52. A system according to claim 51 and wherein the second operating process includes a menu enabling a user to select at least one of the multiple processes.
53- For use in a computer system including a first operating process operating in a non-modified operating environment and having at least one operating command which is normally employed only in a given mode in the first operating process, and at least one second operat¬ ing process, a method for enabling a user operating the first operating process to initiate the second operating process, the method comprising entering said at least one operating command in a mode other than said given mode.
54. A method according to claim 53 and wherein the first operating process is a text editing process.
55- A method according to either of claims 53 and 5 and wherein the given mode is a single, non-repeated entry.
56. A method according to claim 55 and wherein the mode other than the given mode is a sequential repeated entry .
57. A method according to any of the preceding claims 53 ~ 6 and wherein said at least one operating command is a copy command. 58. A method according to any of the preceding claims 53 ~ 57 and wherein said non-modified operating environment is a WINDOWS environment.
59- A method according to any of the preceding claims 53 " 3 and wherein the second operating process is a text operation process.
6θ. A method according to claim 59 and wherein the text operation process is selected from a text encryption process, a spell checking process, a language translation process, a text capitalizing process, a text to speech conversion process and a decryption process.
61. A method according to claim 60 and wherein the text encryption process is operative to encrypt only part of a document.
62. A method according to any of claims 53 ~ 59 and wherein the second operating process includes multiple processes .
63. A method according to claim 62 and wherein the second operating process includes a menu enabling a user to select at least one of the multiple processes.
PCT/IL1996/000088 1995-08-27 1996-08-26 Document processing WO1997009817A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
AU68358/96A AU6835896A (en) 1995-08-27 1996-08-26 Document processing
GB9804072A GB2319428B (en) 1995-08-27 1996-08-26 Operating process trigger in computer systems
JP9511042A JPH11511570A (en) 1995-08-27 1996-08-26 Document processing
US09/032,293 US6178243B1 (en) 1995-08-27 1998-02-27 User-controlled document processing
US09/687,640 US6373947B1 (en) 1996-08-26 2000-10-13 Document processing

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
IL11507995A IL115079A (en) 1995-08-27 1995-08-27 Document processing system
IL115079 1995-08-27
IL115277 1995-09-12
IL11527795A IL115277A (en) 1995-09-12 1995-09-12 System for selectable encryption of documents
IL11621895A IL116218A (en) 1995-11-30 1995-11-30 Method and system for triggering processes
IL116218 1995-11-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/032,293 Continuation-In-Part US6178243B1 (en) 1995-08-27 1998-02-27 User-controlled document processing

Publications (2)

Publication Number Publication Date
WO1997009817A2 true WO1997009817A2 (en) 1997-03-13
WO1997009817A3 WO1997009817A3 (en) 1997-05-01

Family

ID=27271723

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL1996/000088 WO1997009817A2 (en) 1995-08-27 1996-08-26 Document processing

Country Status (5)

Country Link
US (1) US6178243B1 (en)
JP (1) JPH11511570A (en)
AU (1) AU6835896A (en)
GB (2) GB2319428B (en)
WO (1) WO1997009817A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6799279B1 (en) * 2000-06-21 2004-09-28 Matsushita Electric Industrial Co., Ltd. Method and apparatus for stopping supply of power to a specific function for playing contents stored on media in response to a low battery level
US6963419B2 (en) 2000-08-25 2005-11-08 Murata Kikai Kabushiki Kaisha Facsimile apparatus and facsimile communication method
WO2010078812A1 (en) * 2008-12-29 2010-07-15 成都市华为赛门铁克科技有限公司 Method and apparatus for controlling operation of document
EP2246843A3 (en) * 2006-12-12 2010-12-08 National Institute of Information and Communications Technology Electronic device and information processing device
EP2096858A3 (en) * 2008-02-28 2014-02-12 Fujitsu Limited Image decrypting apparatus, image encrypting apparatus, and image decrypting method
US8948385B2 (en) 2007-05-31 2015-02-03 Pfu Limited Electronic document encrypting system, decrypting system, program and method

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11149511A (en) * 1997-11-14 1999-06-02 Hitachi Ltd Electronic slip processing method, its execution system and medium for recording its processing program
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US20010029582A1 (en) * 1999-05-17 2001-10-11 Goodman Daniel Isaac Method and system for copy protection of data content
JP3609263B2 (en) * 1998-08-25 2005-01-12 富士写真フイルム株式会社 Image encryption method and apparatus, image decryption method and apparatus, and recording medium
US7426054B1 (en) * 1999-05-13 2008-09-16 Canon Kabushiki Kaisha Image processing apparatus, image reproduction apparatus, system, method and storage medium for image processing and image reproduction
US6602298B1 (en) * 1999-06-04 2003-08-05 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving communications, information, and documents
US6650428B1 (en) * 1999-08-26 2003-11-18 Hewlett-Packard Development Company, L.P. Automated duplex image generation for a duplexing image forming device
US6839844B1 (en) * 2000-01-03 2005-01-04 Hirokazu Okano Image encryption method and device
US8972590B2 (en) 2000-09-14 2015-03-03 Kirsten Aldrich Highly accurate security and filtering software
US8677505B2 (en) * 2000-11-13 2014-03-18 Digital Doors, Inc. Security system with extraction, reconstruction and secure recovery and storage of data
GB2371401A (en) * 2001-01-18 2002-07-24 Bryan Kelly Personal data protector
US7353387B2 (en) * 2001-03-08 2008-04-01 International Business Machines Corporation Method and system for integrating encryption functionality into a database system
JP3781640B2 (en) * 2001-06-05 2006-05-31 シャープ株式会社 Encryption processing apparatus and encryption processing system
DE10203746B4 (en) * 2002-01-31 2005-03-31 Lew Sternberg Methods and apparatus for enciphering and deciphering texts for learning and playing purposes
US20040080772A1 (en) * 2002-10-24 2004-04-29 Snyders Lawrence M. Securing, tracking, and remotely printing sensitive data
US8666065B2 (en) * 2003-02-07 2014-03-04 Britesmart Llc Real-time data encryption
US8213601B2 (en) * 2003-02-07 2012-07-03 Patrick Zuili Font level encryption method and apparatus
ATE513266T1 (en) * 2003-02-07 2011-07-15 Research In Motion Ltd SYSTEM AND METHOD FOR PROCESSING A MESSAGE SENT BY A MOBILE COMPUTER DEVICE IN A SERVER OF A COMPUTER NETWORK
US20050021947A1 (en) * 2003-06-05 2005-01-27 International Business Machines Corporation Method, system and program product for limiting insertion of content between computer programs
JP2005020346A (en) * 2003-06-26 2005-01-20 Konica Minolta Business Technologies Inc Data encrypting device, data decrypting device, image data storage device, and image forming device
US8181261B2 (en) * 2005-05-13 2012-05-15 Xerox Corporation System and method for controlling reproduction of documents containing sensitive information
JP4892478B2 (en) * 2005-06-10 2012-03-07 パナソニック株式会社 Authentication system, authentication device, terminal device, and verification device
US20070176000A1 (en) * 2006-01-31 2007-08-02 Konica Minolta Systems Laboratory, Inc. Selective image encoding and replacement
US20080159530A1 (en) * 2006-11-20 2008-07-03 Mehran Randall Rasti Gadget to encrypt and keep account login information for ready reference
JP4593614B2 (en) * 2007-12-27 2010-12-08 富士通株式会社 Image data verification method and image data verification system
JP5176655B2 (en) * 2008-03-31 2013-04-03 富士通株式会社 Image decoding device
US8484746B2 (en) * 2008-05-09 2013-07-09 International Business Machines Corporation Method and system for managing electronic messages
US8484747B2 (en) * 2008-05-09 2013-07-09 International Business Machines Corporation Method and system for managing electronic messages
WO2009144796A1 (en) * 2008-05-29 2009-12-03 株式会社Pfu Electronic document processing system, method, and program
US8542823B1 (en) * 2009-06-18 2013-09-24 Amazon Technologies, Inc. Partial file encryption
JP2011232604A (en) * 2010-04-28 2011-11-17 Nec Corp Encryption device and encryption method
US9682590B1 (en) * 2013-09-16 2017-06-20 Amazon Technologies, Inc. Printed document security
US10834290B2 (en) 2013-10-10 2020-11-10 Elwha Llc Methods, systems, and devices for delivering image data from captured images to devices
US10185841B2 (en) 2013-10-10 2019-01-22 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy beacons
US9799036B2 (en) 2013-10-10 2017-10-24 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy indicators
US10102543B2 (en) * 2013-10-10 2018-10-16 Elwha Llc Methods, systems, and devices for handling inserted data into captured images
US10013564B2 (en) 2013-10-10 2018-07-03 Elwha Llc Methods, systems, and devices for handling image capture devices and captured images
US10346624B2 (en) 2013-10-10 2019-07-09 Elwha Llc Methods, systems, and devices for obscuring entities depicted in captured images
US20150106628A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Devices, methods, and systems for analyzing captured image data and privacy data
GB2526315A (en) * 2014-05-20 2015-11-25 Information Engineering Associates Ltd Security and verification device, method and system
EP2981063B1 (en) * 2014-07-31 2020-03-04 Samsung Electronics Co., Ltd Method of modifying image including photographing restricted element, and device for performing the method
US9740860B2 (en) * 2015-02-26 2017-08-22 Kairos Social Solutions, Inc. Device, system, and method of preventing unauthorized recording of visual content displayed on an electronic device
HUE16774544T1 (en) * 2016-07-29 2020-02-28 Permanent Privacy Ltd Applications in connection with secure encryption
US10846412B2 (en) 2017-11-14 2020-11-24 Blackberry Limited Electronic device including display and method of encrypting and decrypting information
CN111858094B (en) * 2020-07-14 2021-05-18 北京海泰方圆科技股份有限公司 Data copying and pasting method and system and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4947346A (en) * 1987-06-29 1990-08-07 Sharp Kabushiki Kaisha Word processor displaying instructions by monitoring user's key operations
US5157763A (en) * 1987-10-15 1992-10-20 International Business Machines Corporation Visually assisted method for transfer of data within an application or from a source application to a receiving application
US5212784A (en) * 1990-10-22 1993-05-18 Delphi Data, A Division Of Sparks Industries, Inc. Automated concurrent data backup system
US5313564A (en) * 1990-07-11 1994-05-17 Fontech Ltd. Graphic matter and process and apparatus for producing, transmitting and reading the same
US5392386A (en) * 1994-02-03 1995-02-21 Inter Hi-Tec Ag Method and apparatus for adding functionality to computer programs executing under graphical user interfaces
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5584023A (en) * 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH594261A5 (en) * 1975-11-20 1977-12-30 Europ Handelsges Anst
JPS6095591A (en) * 1983-10-31 1985-05-28 ぺんてる株式会社 Data display
US4924433A (en) * 1986-07-15 1990-05-08 Brother Kogyo Kabushiki Kaisha Word processor with attribute functions
JPH03232381A (en) * 1990-02-08 1991-10-16 Canon Inc Facsimile equipment
US5237614A (en) 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system
US5208853A (en) 1991-09-09 1993-05-04 Motorola, Inc. Method and apparatus for usage protection of data files using split key and unique variable
JPH06102822A (en) 1991-09-26 1994-04-15 Rooreru Intelligent Syst:Kk File security system
US5321749A (en) 1992-09-21 1994-06-14 Richard Virga Encryption device
US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5388158A (en) 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same
US5621875A (en) * 1993-10-26 1997-04-15 Microsoft Corp. Method and system for automatic formatting of user selected text
US5473691A (en) * 1993-11-05 1995-12-05 Microsoft Corporation System and method for computer data transmission
US5535277A (en) * 1994-03-10 1996-07-09 Mita Industrial Co., Ltd. Encryption communication apparatus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4947346A (en) * 1987-06-29 1990-08-07 Sharp Kabushiki Kaisha Word processor displaying instructions by monitoring user's key operations
US5157763A (en) * 1987-10-15 1992-10-20 International Business Machines Corporation Visually assisted method for transfer of data within an application or from a source application to a receiving application
US5313564A (en) * 1990-07-11 1994-05-17 Fontech Ltd. Graphic matter and process and apparatus for producing, transmitting and reading the same
US5212784A (en) * 1990-10-22 1993-05-18 Delphi Data, A Division Of Sparks Industries, Inc. Automated concurrent data backup system
US5504818A (en) * 1991-04-19 1996-04-02 Okano; Hirokazu Information processing system using error-correcting codes and cryptography
US5584023A (en) * 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism
US5392386A (en) * 1994-02-03 1995-02-21 Inter Hi-Tec Ag Method and apparatus for adding functionality to computer programs executing under graphical user interfaces

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6799279B1 (en) * 2000-06-21 2004-09-28 Matsushita Electric Industrial Co., Ltd. Method and apparatus for stopping supply of power to a specific function for playing contents stored on media in response to a low battery level
US6963419B2 (en) 2000-08-25 2005-11-08 Murata Kikai Kabushiki Kaisha Facsimile apparatus and facsimile communication method
EP2246843A3 (en) * 2006-12-12 2010-12-08 National Institute of Information and Communications Technology Electronic device and information processing device
US8948385B2 (en) 2007-05-31 2015-02-03 Pfu Limited Electronic document encrypting system, decrypting system, program and method
EP2096858A3 (en) * 2008-02-28 2014-02-12 Fujitsu Limited Image decrypting apparatus, image encrypting apparatus, and image decrypting method
WO2010078812A1 (en) * 2008-12-29 2010-07-15 成都市华为赛门铁克科技有限公司 Method and apparatus for controlling operation of document

Also Published As

Publication number Publication date
GB2319428B (en) 2000-07-05
GB2342768B (en) 2000-07-05
GB2319428A (en) 1998-05-20
JPH11511570A (en) 1999-10-05
WO1997009817A3 (en) 1997-05-01
US6178243B1 (en) 2001-01-23
GB9804072D0 (en) 1998-04-22
GB2342768A (en) 2000-04-19
GB0000149D0 (en) 2000-02-23
AU6835896A (en) 1997-03-27

Similar Documents

Publication Publication Date Title
US6178243B1 (en) User-controlled document processing
CN100371847C (en) Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN1132110C (en) Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy user interaction
US6848047B1 (en) Security managing system, data distribution apparatus and portable terminal apparatus
US7484107B2 (en) Method for selective encryption within documents
US6807388B1 (en) Data monitoring method, data monitoring device, copying device, and storage medium
US8166313B2 (en) Method and apparatus for dump and log anonymization (DALA)
US7475260B2 (en) Method and apparatus for protecting sensitive information in a log file
US20040184064A1 (en) Printer driver program and printer
EP0798619B1 (en) Identification of electronic documents
EP1596269A2 (en) A system and method for rendering selective presentation of documents
JP2007115192A (en) File management system, information processor, authentication system and file use right setting system
JP2006323503A (en) Document management device and its control method, computer program and storage medium
US6373947B1 (en) Document processing
JP3528701B2 (en) Security management system
JPH11143658A (en) Network system
US20030154386A1 (en) Device for access-protected processing of electronic data
US20050114684A1 (en) Contents use frequency limiting method, contents using terminal apparatus, contents using system, computer program and computer readable memory medium
US7519177B2 (en) Method and system for processing a data set
GB2276965A (en) Protecting temporarily stored data.
JP3885882B2 (en) Image forming apparatus and image forming system
IL115277A (en) System for selectable encryption of documents
JP2000099385A (en) Method and system for security for sharing file among plural users and storage medium for programming and recording the same method
JPH11203207A (en) Method and device for file production for production or decoding of enciphered file, storage medium storing program for the production or decoding, and device and system for information processing using the program
JP3492659B2 (en) Digital document mark recognition apparatus and method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM

AK Designated states

Kind code of ref document: A3

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 1997 511042

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 09032293

Country of ref document: US

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA