Claims
- 1. A self-protecting document embodied as data stored on a tangible storage medium, the self-protecting document comprising:
an encrypted content segment containing data representative of document contents; a permissions segment; and a code segment comprising a polarization subsection
- 2. The self-protecting document of claim 1, wherein the code segment further comprises:
a rights-enforcement subsection; and, a rendering subsection.
- 3. The self-protecting document of claim 1, wherein the code segment further comprises an executable code for enabling use of the self protecting document.
- 4. The self-protecting document of claim 1, wherein the polarization subsection comprises a polarization engine and a depolarization engine.
- 5. The self-protecting document of claim 1, wherein the polarization subsection contains executable computer code adapted to modify the encrypted content segment.
- 6. The self-protecting document of claim 1, wherein the polarization subsection contains executable computer code adapted to modify the encrypted content segment into a polarized content segment.
- 7. A method for creating a self-protecting document, comprising the steps of:
receiving an unencrypted document; modifying the unencrypted document to produce an original content segment; creating a rights specification; creating a code segment containing a polarization subsection; and combining the original content segment, the rights specification, and the code segment to produce a generic self-protecting document.
- 8. The method of claim 7, wherein the modifying step comprises the step of encrypting the unencrypted document.
- 9. The method of claim 7, wherein the modifying step further comprises the stop of pre-processing the unencrypted document.
- 10. The method of claim 7, further comprising the step of customizing the generic self-protecting document.
- 11. The method of claim 10, wherein the customizing step comprises the substeps of:
receiving a user's document request; receiving the user's public key; creating a rights and permissions segment consent with the user's document request and the rights specification; encrypting the original content segment to produce an encrypted content segment; and combining the code segment, the rights and permissions segment, and the encrypted content segment to produce a customized self-protecting document.
- 12. A method for using a self-protecting document having an encrypted content segment on a user's system, comprising the steps of:
obtaining a polarization key; modifying the encrypted content segment with the polarization key to produce polarized content; rendering the polarized content to produce rendered polarized content for output on an output device; depolarizing the rendered polarized content with the polarization key to produce rendered clear content; and sending the rendered clear content to the output device.
- 13. The method of claim 12, wherein the step of modifying the encrypted content segment comprises a substep of transforming the encrypted content segment via an encryption algorithm employing the polarization key.
- 14. The method of claim 13, wherein the sub-step of transforming the encrypted content segment comprises the substeps of:
identifying data information and format information within the encrypted content segment; separating the data information and the format information from the encrypted content segment; encrypting the data information with the polarization key; and combining the encrypted data information with the format information to produce the polarized content,
- 15. The method of claim 12, wherein the polarization key comprises a combination of state information derived from the user's system.
CROSS REFERENCES TO RELATED APPLICATIONS
[0001] This application is a continuation under 37 C.F.R. 1.53(b) of U.S. patent application Ser. No. 09/178,529 filed Oct. 23, 1998.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09178529 |
Oct 1998 |
US |
Child |
10196953 |
Jul 2002 |
US |