This disclosure relates generally to systems, methods, and computer readable media for determining user-defined, content-agnostic document and message permissioning through a network.
The proliferation of personal computing devices in recent years, especially mobile personal computing devices, combined with a growth in the number of widely-used communications formats (e.g., text, voice, video, image) and protocols (e.g., SMTP, IMAP/POP, SMS/MMS, XMPP, YMSG, etc.) has led to increased concerns regarding the safety and security of documents and messages that are sent over networks. Users desire a system that provides for the setting of custom, e.g., user-defined, content-agnostic permissions at a message-, document-, and/or sub-document- (i.e., a part of the document that comprises less than the entire document) level through a communications network. Such a system would allow customized privacy settings to be specified at various levels of social distance from the user sending the document or message (e.g., public, private, followers, groups, Level-1 contacts, Level-2 contacts, Level-3 contacts, etc.). Such a system may also allow the user to apply customized privacy settings and encryption keys differently to particular parts of a document, e.g., making a first part of a document available only to a first class of users and other parts of the document available to the first class of users and a second class of users.
Thus, a system for providing Adaptive Privacy Controls (APC) is described herein. APC comprises a user-controllable or system-generated, intelligent privacy system that can limit viewing, editing, and re-sharing privileges for files and other digital objects of all types stored in a compatible system (e.g., message objects, user profile fields, documents, etc.). APC allows users to share whatever information they want with whomever they want, while keeping others from accessing such information via assorted rights management techniques and/or encryption processes that can be initiated by user command or via system intelligence on entire objects or portions of objects. APC techniques may be applied to individuals, pre-defined groups, and/or ad-hoc groups. Customized encryption keys may further be applied to particular parties or groups of parties to enhance the security of the permissioning settings.
APC may also be used to apply privacy settings to only particular parts of a document. For example, User A in an organization may need to see the entire content of the organization's annual report drafts, but other users in the organization may only need to see a version that has sensitive financial/pro-forma data redacted. For example, pages 1-20 of the annual report would be available to User A, but only pages 1-19 would be available to the other users.
Thus, according to some embodiments, the network-based, user-defined, content-agnostic (i.e., agnostic as to both format and subject matter) document and message permissioning systems, methods, and computer readable media described herein may provide a seamless, intuitive user interface (e.g., using touch gestures or mouse input) allowing a user to block out particular areas of interest in a document or message from particular recipients or groups of recipients, as well as to specify privacy and permissioning settings for a single document or message—or across all documents owned by the user.
The subject matter of the present disclosure is directed to overcoming, or at least reducing the effects of, one or more of the problems set forth above. To address these and other issues, techniques that enable the setting of user-defined, content-agnostic permissions at a message-, document-, and/or sub-document-level through a communications network are described herein.
Disclosed are systems, methods, and computer readable media for creating user-defined, content-agnostic, custom privacy settings for documents, sub-documents, and messages that limit sharing privileges for files of all formats. More particularly, but not by way of limitation, this disclosure relates to systems, methods, and computer readable media to permit users of the permissioning system to combine customized permissioning settings at the document and sub-document levels with customized encryption keys to achieve a greater level of control over who their data is shared with and exactly what information is shared.
Referring now to
Server 106 in the server-entry point network architecture infrastructure 100 of
Referring now to
Referring now to
System unit 205 may be programmed to perform methods in accordance with this disclosure. System unit 205 comprises one or more processing units, input-output (I/O) bus 225 and memory 215. Access to memory 215 can be accomplished using the communication bus 225. Processing unit 210 may include any programmable controller device including, for example, a mainframe processor, a mobile phone processor, or, as examples, one or more members of the INTEL® ATOM™, INTEL® XEON™, and INTEL® CORE™ processor families from Intel Corporation and the Cortex and ARM processor families from ARM. (INTEL, INTEL ATOM, XEON, and CORE are trademarks of the Intel Corporation. CORTEX is a registered trademark of the ARM Limited Corporation. ARM is a registered trademark of the ARM Limited Company). Memory 215 may include one or more memory modules and comprise random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), programmable read-write memory, and solid-state memory. As also shown in
Referring now to
The processing unit core 210 is shown including execution logic 280 having a set of execution units 285-1 through 285-N. Some embodiments may include a number of execution units dedicated to specific functions or sets of functions. Other embodiments may include only one execution unit or one execution unit that can perform a particular function. The execution logic 280 performs the operations specified by code instructions.
After completion of execution of the operations specified by the code instructions, back end logic 290 retires the instructions of the code 250. In one embodiment, the processing unit core 210 allows out of order execution but requires in order retirement of instructions. Retirement logic 295 may take a variety of forms as known to those of skill in the art (e.g., re-order buffers or the like). In this manner, the processing unit core 210 is transformed during execution of the code 250, at least in terms of the output generated by the decoder, the hardware registers and tables utilized by the register renaming logic 262, and any registers (not shown) modified by the execution logic 280.
Although not illustrated in
Document and Sub-Document Level Permissioning Scheme with Custom, Recipient-Based Privacy Settings
According to some embodiments of a system for providing Adaptive Privacy Controls (APC), global, i.e., document-level or file-level permissioning may be implemented. For example, in one scenario, a user may wish to share a document with a colleague, but not allow that colleague to pass along the document to other parties. In such a scenario, User A may use the system to send the file (e.g. using SMTP, XMPP, etc.) to the colleague, User B, while selecting the appropriate APC option(s) to limit User B′s re-sharing ability. The client application or server (depending on system architecture) may then process the selected APC option(s) and protect the document with a shared password, public/private key encryption, token-controlled link, or other form of protection. User B can then receive a typical message with the attached file, held in a protected container, which requires a password (in the case of an off-system user) or private key (in the case of an on-system user). User B may also receive a typical message with a link to a token/access-controlled document for view only, download, live editing, or other such activity—each individually permissioned at User A's discretion.
If User B is an ‘on-system’ recipient, the system may process the shared file, use the recipient's public key to encrypt the file, and send it to the recipient in any desired format, using any desired protocol. When the recipient opens the message and attachment in a compatible application, the private key will automatically decrypt the file and open it for use. To protect against re-sharing, the system may make the file read-only (i.e., no download permissions). Any attempt on User B′s part to digitally transmit the file or portions of the file to other recipients will result in the recipient receiving unusable, encrypted content.
If, instead, User B is an ‘off-system’ recipient, the system may process the shared file and perform any of the following actions: 1) generate a protected .zip file (or other similar container) with a password that User A may share with User B via any preferred communication protocol; 2) generate a link to a web portal that requires User B to join the system and authenticate himself or herself prior to receiving the document (e.g., by matching email address identifiers and performing standard validation processes to ensure identity).
According to other embodiments of a system for providing Adaptive Privacy Controls (APC), local, i.e., sub-document-level or sub-file-level permissioning may be implemented. For example, a user may wish to share sensitive financial information contained in an Annual Report among a team. In such a scenario, User A may decide to share the Annual Report with his team, comprising User B and User C. In this scenario, User B has permission to see all of the Annual Report, but User C only has permission to view the summary worksheet on page 1 of the Annual Report. In such a scenario, APC would allow User A to share a fully-viewable document with User B and a partially-viewable version of the same document with User C. Prior to sending the file, User A could instruct the system to protect the sensitive data in the document using markup-specific substitutions.
Another exemplary situation wherein sub-document-level permissioning may be employed is in the sharing of picture or video media, whereby specific sections of the media content require selective censorship, redaction, or other protection for certain recipients, in order to maintain desired privacy or security levels. In one scenario, User A, the sharer, may want to share a humorous picture with his wife (User B) and young son (User C). Knowing that the picture contains certain explicit words or imagery but is still funny even without the explicit sub-portions of the content, User A may attach the photo to a message in a capable application and use the application's selection capabilities to “block-out” the explicit sub-portions of the image. User A may then instruct the system to allow User B to view the full uncensored image, while only allowing User C to view the censored portions of the image.
For both of the exemplary sub-document permissioning scenarios described above, the application can present a view of the object in question (e.g., via a compatible file viewer or image thumbnail, etc.) to the sender of the object. The sender can then use any desired form of selection input (e.g., touch gestures, mouse gestures, etc.) to indicate which content should be access-controlled. Those selections will be recorded and either processed locally or sent to a central server (depending on client capabilities), whereby the system will process the object's original source code (e.g. in XML format, MIME format, etc.), corresponding to the section or sections matching the user selection.
The section(s) in question may then be isolated (maintaining suitable markup) and replaced with a link reference or encrypted text (using any one of standard encryption practices, such as shared secrets, public/private key, etc.). The resulting “APC-enabled” object, when viewed in an authorized application, may prompt the application to attempt to contact a server to retrieve the markup text or (if encrypted) attempt to decrypt with the private key stored in the authorized application. Unsuccessful retrieval or decryption will result in the recipient only viewing “part” of the original file. Because this service requires knowledge of the markup structure of any compatible file type, all APC changes will be made while keeping the overall markup structure complete, such that the application may be opened (i.e., APC changes will not be implemented merely by removing sections of potentially important markup and thus corrupting the file).
Finally, the Creator may choose to send the document 305 to three separate users (either simultaneously or at different times), with the appropriate portions blocked out for the appropriate recipients, based on, e.g., their identity, status as a member of a particular group, or their status as a follower of the Creator, etc. For example, as is shown in
APC System Permissioning Settings Options
Several examples of potential APC system permissioning settings that may be applied to particular documents or messages are shown and described below:
As will be understood, the settings levels described above are merely exemplary, and other ways of specifying permissioning schemes may be used in particular implementations of an APC document permissioning system.
Attention is now directed to flowchart 450, which shows the process from the receiver's perspective. First, the system prompts the receiver to input his or her credentials for authentication (Step 455). Next, the receiver downloads the document or message that was sent to him or her (Step 460). Next, the receiver's client device decrypts the AES keys that he is able to with his private key (Step 465). Next, the receiver uses the AES keys he obtained to decrypt the pieces of the document that he is able to (Step 470). Finally, the receiver opens the document for reading and/or writing, but can only see the portions that he or she has access to (Step 475). The remaining portions of the document remain scrambled to the receiver.
It is to be understood that, although AES encryption is discussed here, any suitable form of encryption may be utilized to encrypt the documents and/or portions of the documents. Further, any suitable key size, e.g., 128, 192, or 256 bits, may be used, based on a particular implementation of the APC system.
Customized Privacy and Permissioning Setting using Encryption Keys
A in contact info database 510 may refer to the sender in the scenario described above with reference to
According to some embodiments of the customized privacy and permissioning settings system described herein, users may set the recipients of a particular document or message to have a status of: “Read only,” “Read and Share,” or neither. The user may also set a file to be re-sharable to the public (e.g., universally sharable) or to a particular group of recipients.
According to one embodiment of a method of utilizing user-defined, content-agnostic privacy and permissioning settings for document sharing, first, the user, e.g., User A as shown in
Example 1 is a non-transitory computer readable medium that comprises computer executable instructions stored thereon to cause one or more processing units to: receive an indication of a first portion of a first document; receive a first permissioning setting for the first portion; receive an indication of a first recipient for the first portion; generate a first encryption key for the first portion based, at least in part, on the first permissioning setting for the first portion and the indicated first recipient of the first portion; encrypt the first portion using the first generated encryption key for the first portion; and transmit the first document to the first recipient.
Example 2 includes the subject matter of example 1, wherein the computer executable instructions further cause the one or more processing units to: receive an indication of a second portion of the first document; receive a second permissioning setting for the second portion; receive an indication of a second recipient for the second portion; generate a second encryption key for the second portion based, at least in part, on the second permissioning setting for the second portion and the indicated second recipient of the second portion; and encrypt the second portion using the second generated encryption key for the second portion, wherein the first portion and the second portion of the first document are different.
Example 3 includes the subject matter of example 1, wherein the first portion comprises the entire first document.
Example 4 includes the subject matter of example 1, wherein the second portion comprises the entire first document.
Example 5 includes the subject matter of example 1, wherein the first permissioning setting comprises an indication that at least one of the following classes of recipients shall have access to the first portion of the first document: public, followers, contacts, user-defined groups.
Example 6 includes the subject matter of example 1, wherein the first permissioning setting comprises an indication that one or more particular levels of contacts shall have access to the first portion of the first document.
Example 7 includes the subject matter of example 1, wherein the instructions to encrypt the first portion further comprise instructions to encrypt the first portion using the Advanced Encryption Standard (AES).
Example 8 includes the subject matter of example 1, wherein the first permissioning setting comprises an indication that the first recipient may read the first document but may not share the first document.
Example 9 includes the subject matter of example 1, wherein the first permissioning setting comprises an indication that the first recipient may read and share the first document.
Example 10 includes the subject matter of example 1, wherein the first permissioning setting further comprises an indication that the first recipient may share the first document with the general public.
Example 11 is a system comprising: a memory; and one or more processing units, communicatively coupled to the memory, wherein the memory stores instructions to configure the one or more processing units to: receive an indication of a first portion of a first document; receive a first permissioning setting for the first portion; receive an indication of a first recipient for the first portion; generate a first encryption key for the first portion based, at least in part, on the first permissioning setting for the first portion and the indicated first recipient of the first portion; and transmit the first document to the first recipient.
Example 12 includes the subject matter of example 11, wherein the instructions are further configured to cause the one or more processing units to: receive an indication of a second portion of the first document; receive a second permissioning setting for the second portion; receive an indication of a second recipient for the second portion; generate a second encryption key for the second portion based, at least in part, on the second permissioning setting for the second portion and the indicated second recipient of the second portion; and encrypt the second portion using the second generated encryption key for the second portion, wherein the first portion and the second portion of the first document are different.
Example 13 includes the subject matter of example 11, wherein the first portion comprises the entire first document.
Example 14 includes the subject matter of example 11, wherein the second portion comprises the entire first document.
Example 15 includes the subject matter of example 11, wherein the first permissioning setting comprises an indication that at least one of the following classes of recipients shall have access to the first portion of the first document: public, followers, contacts, user-defined groups.
Example 16 includes the subject matter of example 11, wherein the first permissioning setting comprises an indication that one or more particular levels of contacts shall have access to the first portion of the first document.
Example 17 includes the subject matter of example 11, wherein the instructions to encrypt the first portion further comprise instructions to encrypt the first portion using the Advanced Encryption Standard (AES).
Example 18 includes the subject matter of example 11, wherein the first permissioning setting comprises an indication that the first recipient may read the first document but may not share the first document.
Example 19 includes the subject matter of example 11, wherein the first permissioning setting comprises an indication that the first recipient may read and share the first document.
Example 20 includes the subject matter of example 11, wherein the first permissioning setting further comprises an indication that the first recipient may share the first document with the general public.
Example 21 is a computer-implemented method, comprising: receiving an indication of a first portion of a first document; receiving a first permissioning setting for the first portion; receiving an indication of a first recipient for the first portion; generating a first encryption key for the first portion based, at least in part, on the first permissioning setting for the first portion and the indicated first recipient of the first portion; encrypting the first portion using the first generated encryption key for the first portion; and transmit the first document to the first recipient.
Example 22 includes the subject matter of example 21, further comprising: receiving an indication of a second portion of the first document; receiving a second permissioning setting for the second portion; receiving an indication of a second recipient for the second portion; generating a second encryption key for the second portion based, at least in part, on the second permissioning setting for the second portion and the indicated second recipient of the second portion; and encrypting the second portion using the second generated encryption key for the second portion, wherein the first portion and the second portion of the first document are different.
Example 23 includes the subject matter of example 21, wherein the first permissioning setting comprises an indication that one or more particular levels of contacts shall have access to the first portion of the first document.
Example 24 includes the subject matter of example 21, wherein the first permissioning setting comprises an indication that the first recipient may read the first document but may not share the first document.
Example 25 includes the subject matter of example 21, wherein the first permissioning setting comprises an indication that the first recipient may read and share the first document.
In the foregoing description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed embodiments. It will be apparent, however, to one skilled in the art that the disclosed embodiments may be practiced without these specific details. In other instances, structure and devices are shown in block diagram form in order to avoid obscuring the disclosed embodiments. References to numbers without subscripts or suffixes are understood to reference all instance of subscripts and suffixes corresponding to the referenced number. Moreover, the language used in this disclosure has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter. Reference in the specification to “one embodiment” or to “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one disclosed embodiment, and multiple references to “one embodiment” or “an embodiment” should not be understood as necessarily all referring to the same embodiment.
It is also to be understood that the above description is intended to be illustrative, and not restrictive. For example, above-described embodiments may be used in combination with each other and illustrative process steps may be performed in an order different than shown. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of the invention therefore should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. In the appended claims, terms “including” and “in which” are used as plain-English equivalents of the respective terms “comprising” and “wherein.”