In addition to working with text input, computers now have the ability to record and modify electronic ink. Electronic ink may be kept in its native form or may be run through an analyzer to recognize text, drawings and annotations. Software applications are integrating the use and analysis of electronic ink into their functionality, enhancing the ability of users to create and edit documents.
In some circumstances, users of software applications may wish to secure electronic ink to prevent copying or unauthorized use of particular collections of electronic ink. For example, a user may use electronic ink to add their written signature to a word processing document. Other than completely preventing others' access to the entire document, there is currently no way to prevent another user from copying or printing the electronic ink signature. This deficiency may cause users to avoid using electronic ink due to fears of unauthorized use.
Methods and systems are needed to enable users and software applications to secure electronic ink
Provided are methods for protecting electronic ink (e.g., signatures input on a tablet computer) from unwanted duplication. A user may select one or more ink strokes and assign protection settings for the selected strokes.
The present invention is illustrated, by way of example and not limitation, in the accompanying figures in which like reference numerals indicate similar elements and in which:
Aspects of the present invention relate to protecting electronic ink strokes from being duplicated. Additional aspects relate to providing methods to prevent copying, pasting, or saving of protected electronic ink. Further aspects relate to providing methods for displaying protected electronic ink.
It is noted that various connections are set forth between elements in the following description. It is noted that these connections in general and, unless specified otherwise, may be direct or indirect and that this specification is not intended to be limiting in this respect.
This document is divided into sections to assist the reader. These sections include: an overview, characteristics of ink, terms, general-purpose computing environment, protecting electronic ink, and a conclusion.
Overview
According to various embodiments of the invention, electronic ink strokes may need protection from duplication in order to give users the ability to protect sensitive ink strokes, such as electronic ink signatures. Protection from duplication includes preventing a collection of ink strokes from being copied to a system clipboard, preventing ink strokes from being printed to an unauthorized printer, and preventing the ink strokes from being saved for later use. Other forms of duplication may additionally be prevented. In addition, electronic ink strokes may be saved/serialized and loaded/deserialized using encryption to prevent unauthorized access of ink strokes when stored on a storage medium.
Characteristics of Ink
As known to users of pens, markers, crayons, pencils, and other marking implements, physical ink (the kind laid down on paper using pen and ink or other writing and drawing implements) may convey more information than a series of coordinates connected by line segments. For example, physical ink can reflect pen pressure (by the thickness of the ink), pen angle (by the shape of the line or curve segments and the behavior of the ink around discreet points), and the speed of the nib of the pen (by the straightness, line width, and line width changes over the course of a line or curve). Further examples include the way ink is absorbed into the fibers of paper or other surface it is deposited on. These subtle characteristics also aid in conveying the above listed properties. Because of these additional properties, emotion, personality, emphasis and so forth can be more instantaneously conveyed than with uniform line width between points.
Electronic ink (or ink) relates to the capture and display of electronic information captured when a user uses a stylus-based input device. Electronic ink refers to a sequence or any arbitrary collection of strokes, where each stroke is comprised of a sequence of points. The strokes may have been drawn or collected at the same time or may have been drawn or collected at independent times and locations and for independent reasons. The points may be represented using a variety of known techniques including Cartesian coordinates (X, Y), polar coordinates (r, θ), and other techniques as known in the art. Electronic ink may include representations of properties of real ink including pressure, angle, speed, color, stylus size, and ink opacity. Electronic ink may further include other properties including the order of how ink was deposited on a page (a raster pattern of left to right then down for most western languages), a timestamp (indicating when the ink was deposited), indication of the author of the ink, and the originating device (at least one of an identification of a machine upon which the ink was drawn or an identification of the pen used to deposit the ink) among other information. Among the characteristics described above, the temporal order of strokes and a stroke being a series of coordinates may primarily be used.
Electronic ink may be submitted for analysis and recognition. Ink representing words and paragraphs may be analyzed in order to determine what words are intended. In analyzing ink, alternative recognition solutions may arise. For example, a person may handwrite the word “theme,” but an ink analyzer may not be sure if the ink represents the single word “theme” or the words “the me” depending on the person's handwriting. As such, an ink analyzer may use rules of grammar, the context of other nearby words, and other factors to infer a more correct analysis. In so doing, the ink may store a list of alternate words which were not selected along with the binary ink information.
General-Purpose Computing Environment
The invention is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network computers, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
With reference to
Computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, and removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements within computer 110, such as during start-up, is typically stored in ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120. By way of example, and not limitation,
The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180. The remote computer 180 may be a personal computer, a server, a router, a network computer, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110, although only a memory storage device 181 has been illustrated in
When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet. The modem 172, which may be internal or external, may be connected to the system bus 121 via the user input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
In some aspects, a pen digitizer 165 and accompanying pen or stylus 166 are provided in order to digitally capture freehand input. Pen digitizer 165 may further use capacitive or resistive technologies enabling an active stylus or a passive stylus (e.g., a finger or other pointing device). Although a direct connection between the pen digitizer 165 and the user input interface 160 is shown, in practice, the pen digitizer 165 may be coupled to the processing unit 110 directly, parallel port or other interface and the system bus 130 by any technique including wirelessly. Also, the pen 166 may have a camera associated with it and a transceiver for wirelessly transmitting image information captured by the camera to an interface interacting with bus 130. Further, the pen may have other sensing systems in addition to or in place of the camera for determining strokes of electronic ink including accelerometers, magnetometers, and gyroscopes.
It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used. The existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server. Any of various conventional web browsers can be used to display and manipulate data on web pages.
A programming interface (or more simply, interface) may be viewed as any mechanism, process, protocol for enabling one or more segment(s) of code to communicate with or access the functionality provided by one or more other segment(s) of code. Alternatively, a programming interface may be viewed as one or more mechanism(s), method(s), function call(s), module(s), object(s), etc. of a component of a system capable of communicative coupling to one or more mechanism(s), method(s), function call(s), module(s), etc. of other component(s). The term “segment of code” in the preceding sentence is intended to include one or more instructions or lines of code, and includes, e.g., code modules, objects, subroutines, functions, and so on, regardless of the terminology applied or whether the code segments are separately compiled, or whether the code segments are provided as source, intermediate, or object code, whether the code segments are utilized in a runtime system or process, or whether they are located on the same or different machines or distributed across multiple machines, or whether the functionality represented by the segments of code are implemented wholly in software, wholly in hardware, or a combination of hardware and software.
Notionally, a programming interface may be viewed generically, as shown in
Aspects of such a programming interface may include the method whereby the first code segment transmits information (where “information” is used in its broadest sense and includes data, commands, requests, etc.) to the second code segment; the method whereby the second code segment receives the information; and the structure, sequence, syntax, organization, schema, timing and content of the information. In this regard, the underlying transport medium itself may be unimportant to the operation of the interface, whether the medium be wired or wireless, or a combination of both, as long as the information is transported in the manner defined by the interface. In certain situations, information may not be passed in one or both directions in the conventional sense, as the information transfer may be either via another mechanism (e.g. information placed in a buffer, file, etc. separate from information flow between the code segments) or non-existent, as when one code segment simply accesses functionality performed by a second code segment. Any or all of these aspects may be important in a given situation, e.g., depending on whether the code segments are part of a system in a loosely coupled or tightly coupled configuration, and so this list should be considered illustrative and non-limiting.
This notion of a programming interface is known to those skilled in the art and is clear from the foregoing detailed description of the invention. There are, however, other ways to implement a programming interface, and, unless expressly excluded, these too are intended to be encompassed by the claims set forth at the end of this specification. Such other ways may appear to be more sophisticated or complex than the simplistic view of
A communication from one code segment to another may be accomplished indirectly by breaking the communication into multiple discrete communications. This is depicted schematically in
In some cases, it may be possible to ignore, add or redefine certain aspects (e.g., parameters) of a programming interface while still accomplishing the intended result. This is illustrated in
It may also be feasible to merge some or all of the functionality of two separate code modules such that the “interface” between them changes form. For example, the functionality of
A communication from one code segment to another may be accomplished indirectly by breaking the communication into multiple discrete communications. This is depicted schematically in
Yet another possible variant is to dynamically rewrite the code to replace the interface functionality with something else but which achieves the same overall result. For example, there may be a system in which a code segment presented in an intermediate language (e.g. Microsoft IL, Java ByteCode, etc.) is provided to a Just-in-Time (JIT) compiler or interpreter in an execution environment (such as that provided by the .Net framework, the Java runtime environment, or other similar runtime type environments). The JIT compiler may be written so as to dynamically convert the communications from the 1st Code Segment to the 2nd Code Segment, i.e., to conform them to a different interface as may be required by the 2nd Code Segment (either the original or a different 2nd Code Segment). This is depicted in
It is also noted that the above-described scenarios for achieving the same or similar result as an interface via alternative embodiments may also be combined in various ways, serially and/or in parallel, or with other intervening code. Thus, the alternative embodiments presented above are not mutually exclusive and may be mixed, matched and combined to produce the same or equivalent scenarios to the generic scenarios presented in
The stylus 204 may be equipped with one or more buttons or other features to augment its selection capabilities. In one embodiment, the stylus 204 could be implemented as a “pencil” or “pen”, in which one end constitutes a writing portion and the other end constitutes an “eraser” end, and which, when moved across the display, indicates portions of the display are to be erased. Other types of input devices, such as a mouse, trackball, or the like could be used. Additionally, a user's own finger could be the stylus 204 and used for selecting or indicating portions of the displayed image on a touch-sensitive or proximity-sensitive display. Consequently, the term “user input device”, as used herein, is intended to have a broad definition and encompasses many variations on well-known input devices such as stylus 204.
In various embodiments, the system provides an ink platform as a set of COM (component object model) services that a software application can use to capture, manipulate, and store ink. One service enables a software application to read and write ink using the disclosed representations of ink. The ink platform may also include a mark-up language including a language similar to extensible markup language (XML). Further, the system may use DCOM (distributed component object model) for other implementations. Yet further implementations may use programming models such as the Win32 programming model or the .Net programming model from Microsoft Corporation.
Protecting Electronic Ink
The word processor of
Ink protection choices displayed by submenu 402 here include “Prevent Copy,” “Prevent Print,” “Prevent Save,” and further “Display” options. If a user selects a series of ink strokes and opts to “Prevent Copy,” then strokes are protected such that when a user attempts to copy the strokes, he is unable to complete the operation, possibly with or without feedback.
Likewise, if a user opts to “Prevent Print,” when a user attempts to print a document containing the protected ink strokes, he or she may not be able to print the page, or alternatively the page will print without the protected ink strokes. “Prevent Print” may be selected by default. The concept of print prevention can be extended to preclude the protected ink strokes from displaying on any particular unregistered display surface, including additional monitors or printers. If computer 110 is connected to multiple printers, then only particular printers may be allowed to print any particular set of protected ink strokes. For example, signatures made up of protected ink strokes may only print to a special check printer, but not on any other connected printer. Particular printers and display surfaces may be registered with each collection of protected ink strokes.
A user selecting a collection of ink strokes and opting to “Prevent Save” will prevent the ink strokes from being saved either with the underlying document, or even saved as a file, including but not limited to an individual ink serialized format (ISF) file. This protection will carry through; even if the protected ink strokes are allowed to be copied, the copied set of protected ink strokes will not be saved.
A user selecting a collection of protected ink strokes may be presented with several display options in order to visually identify the collection of strokes as protected.
When ink strokes are to be protected, they may be moved from unprotected ink object 701 to protected ink object 702, which includes functions and features to protect the ink strokes from unauthorized duplication. The process of moving the ink strokes may be as simple as reassigning a reference from an unprotected ink object to a protect ink object. In addition, other properties and objects may be copied or reassigned (e.g., recognized text). A conversion function may transform the ink object from unprotected to protected. The additional functions and features of protected ink object 702 may take the form of a derived programming interface, derived from the ink object interface implemented by ink object 702. Or the protected ink object may be a subclass of the ink object class. Alternatively, all ink objects may include the protected ink object functions and features, using them only when needed.
Protected ink objects may include new methods and attributes not found in their unprotected equivalents. New methods may include the following:
SetProtect: Sets protection flags for different forms of ink protection described above. An implementing software application may call this method when modifying the types of duplication protection for the object and associated strokes.
GetProtect: Reads the protection flags previously set.
RegisterRenderSurface: Registers a particular render surface (e.g., printer, monitor, etc.) as being safe for rendering.
RemoveRenderSurface: Removes a previously registered render surface.
Render: Renders associated ink strokes when called, so long as rendering is allowable as indicated by the protection flags, and so long as the render surface is properly registered. If a particular display option (e.g., watermark or emboss) is selected, the function will render the ink strokes and background accordingly.
Save: Creates a serialized version of a protected ink object and associated ink strokes. Encrypts the serialized version to prevent unauthorized access using a cryptographic key provided by an implementing software application.
Load: Decrypts and deserializes a previously encrypted serialized version of a protected ink object and associated ink strokes. Decrypts the serialized version using a cryptographic key provided by an implementing software application.
New constants may be created as part of the protected ink object interface/class. These may define the flags for the types of ink stroke protections invoked (e.g., prevent copy, prevent save). Also defined may be flags indicating different types of visual render effects (e.g., watermark or emboss). Additional attributes, such as a watermark bitmap, may also be added to the protected ink object.
When loading and reconstituting protected ink object 702b and its constituent ink strokes 601, 602, a software application may provide a second cryptographic key 903b in order for the encrypted ISF stream 901 to be decrypted. Second cryptographic key 903b may or may not be the same as first key 903a, depending on whether the chosen encryption scheme is symmetrical (single private key) or asymmetrical (separate public and private keys).
Under this scheme, it would be the responsibility of a software application using protected ink objects to determine encryption strength, manage encryption and decryption keys, monitor the rights of users to access various protected ink objects (also known as digital rights management (DRM)), and so forth. Other schemes may be used to securely save and load the contents of a protected ink object. For example, the protected ink object may handle all of the encryption and decryption internally without needing cryptographic keys to be created by a software application requesting a save or load.
At step 1001, a selection of one or more electronic ink strokes is received. The selection may be the result of a user explicitly selecting the displayed strokes, or the strokes may be programmatically selected by a software application automatically. At step 1002, a request to protect the strokes is received. This request may be an explicit request to create a protected ink object, or it may come as a request to apply a particular protection flag to the strokes. At step 1003, the strokes are associated with a protected ink object, which may or may not have been instantiated especially for these strokes. At step 1004, protection flags for preventing duplication in various forms are set. These protection flags may be set as a result of a request that a particular flag be set, or it may be that certain flags (e.g., a “Prevent Print” flag) are automatically set upon instantiation of the object.
At step 1005, a request is received to duplicate one ore more of the strokes associated with the protected object. Duplication may mean that a request was received to copy the strokes to the clipboard, to render the strokes to a display or printer, or to save or serialize the strokes. At decision 1006, the protection flags of the protected ink object are inspected to see if the particular type of duplication is permitted. If not, then the duplication does not occur, possibly with an error message being displayed. If duplication is permitted, then at step 1007 the duplication of the strokes is initiated. In the case of displaying or printing the strokes, an optional watermark or other visual cue denoting protected strokes may be displayed along with the strokes.
The present subject matter has been described in terms of preferred and exemplary embodiments thereof. It is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.