Claims
- 1. An information system, comprising:
a storage media storing information, whereby at least some of the information is encrypted and some is non-encrypted; and a delivery module capable of determining if a remote user possesses a key associated with some of the encrypted information, whereby the delivery module is adapted to download the non-encrypted information to a remote user, and in addition, at least some of the encrypted information when the remote user is determined by the delivery module to possess a key associated with the encrypted information.
- 2. The system of claim 1 whereby the encrypted information is discerned from the non-encrypted information with tags associated with the encrypted information.
- 3. The system of claim 1 in whereby multiple keys are used by the delivery module to encrypt different content within a same document forming the encrypted information.
- 4. The system of claim 1 wherein the storage media comprises a server.
- 5. The system of claim 4 wherein the server has many different sets of content secured with different keys for a same URL.
- 6. The system of claim 1 wherein the encrypted information is adapted to be decrypted by the remote user.
- 7. The system of claim 1 wherein the encrypted information comprises one encrypted page having a link to other encrypted pages.
- 8. The system of claim 1 wherein the delivery module is adapted to compare a remote user's key against a revocation list associated with the delivery module to determine the key is valid.
- 9. The system of claim 2 wherein the encrypted information associated with the tag represents information selected from the group comprising of:
a link, a text block, multimedia elements including pictures, sounds, animations, movies and new-media elements.
- 10. The system of claim 1 wherein the confidential information is stored using symmetric encryption.
- 11. The system of claim 1 wherein the confidential information is stored using a-symmetric encryption.
- 12. The system of claim 1 wherein the confidential information is stored using linear encryption.
- 13. The system of claim 1 wherein the confidential information is stored using non-linear encryption.
- 14. An information system, comprising:
a host having:
a storage media storing information, whereby at least some of the information is encrypted and some is non-encrypted; a delivery module adapted to deliver information upon detecting a key associated with some of the encrypted information, whereby the delivery module is adapted to download the non-encrypted information and in addition, at least some of the encrypted information upon detecting the key associated with the encrypted information; and at least one remote user having the key and adapted to selectively obtain said encrypted information from the host via a communication network.
- 15. The system as specified in claim 14 wherein the encrypted and non-encrypted information is a web page.
- 16. The system as specified in claim 14 wherein the key is adapted to permit access to an associated level of said encrypted information.
- 17. The system as specified in claim 14, wherein the host has different sets of content within a common document and the content is secured with different keys as said confidential information.
- 18. The system as specified in claim 17 comprising multiple said remote users, whereby different said remote users have different said keys permitting access to different said sets of content within said common document.
- 19. The system of claim 14 wherein the encrypted information is discerned from the non-encrypted information with tags associated with the encrypted information.
- 20. The system of claim 19 wherein the tags are recognizable by only certain said keys.
- 21. The system of claim 19 wherein the keys have hierarchy.
- 22. The system of claim 14 wherein the host comprises a server.
- 23. The system of claim 17 wherein the common document is a URL.
- 24. The system of claim 14 wherein said confidential information has links to other said confidential information.
- 25. The system of claim 24 wherein the links are a function of the key the remote user possesses.
- 26. The system of claim 14 wherein the remote user is adapted to decrypt said encrypted information using a device from the group comprising of:
a browser helper object, a browser plug in, and a specialized browser.
- 27. The system of claim 14 wherein the key is stored securely at said remote user.
- 28. The system of claim 27 wherein the key is stored on a removable storage media.
- 29. The system of claim 14 wherein the confidential information is stored using symmetric encryption.
- 30. The system of claim 14 wherein the confidential information is stored using a-symmetric encryption.
- 31. The system of claim 14 wherein the confidential information is stored using linear encryption.
- 32. The system of claim 14 wherein the confidential information is stored using non-linear encryption.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] Cross reference is made to commonly assigned co-pending application Ser. No. 09/797,272 entitled “Data Encryption System”, the teachings of which are incorporated herein by reference.