Cryptography – Facsimile cryptography
Reexamination Certificate
1998-02-27
2001-01-23
Peeso, Thomas R. (Department: 2767)
Cryptography
Facsimile cryptography
C358S296000, C705S078000, C382S159000, C380S212000
Reexamination Certificate
active
06178243
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to document processing generally and more particularly to document processing which is protected against unauthorized access.
BACKGROUND OF THE INVENTION
Problems of security in information transmission have been addressed in various ways in the prior art. Various types of encryption techniques are presently used to provide desired levels of security for information transmission and to prevent unauthorized access thereto or modification thereof
Protecting the security of documents at the time and location of their creation has not been addressed in the same manner. Generally, security of documents generated using electronic apparatus is ensured by physical security of the electronic apparatus. Thus computers or the storage media thereof are maintained in physically secure installations.
Ensuring the security of documents in environments wherein maintenance of the computers or the storage media in physically secure installations is impractical appears to be a problem still awaiting a solution.
Various techniques are known for protection of communications against unauthorized access. Scrambling and various other forms of encryption are commonly employed for this purpose. Generally, an entire file is protected in this way.
There is described in applicant/inventor's pending PCT patent application, PCT/US94/08684 an apparatus and method for creating and transmitting confidential documents, the disclosure of which is hereby incorporated by reference. Disclosed inter alia in this document is the encryption of only part of a document, wherein the header of the document is left unencrypted.
In computer operating systems and methods it is common for a user carrying out a first process to trigger the operation of a second process. The trigger is typically the entry of a predetermined command which can be achieved using a conventional keyboard or mouse.
Designing the trigger is relatively straightforward when the programmer has access to the first process and is allowed to make changes thereto in order to accommodate the predetermined command.
Increasingly, there are operating environments which are in extremely widespread use, but whose operating commands cannot be accessed and modified in practice by designers of such second processes. Such operating environments may include operating systems, such as WINDOWS, a trademark of Microsoft Corporation, and operating processes, such as WORD 2.0 FOR WINDOWS, a trademark of Microsoft Corporation.
Even when the operating commands can be accessed and modified by designers of such second processes, it is often impractical or uneconomical to do so, since such modifications would require changes such as the creation of new “macros” for each application. There may exist therefore many “non-modified” operating environments for which the present invention is particularly suited.
The present invention concerns triggers operating in non-modified operating environments for enabling a user carrying out a first process to trigger the operation of a second process.
SUMMARY OF THE INVENTION
The present invention seeks to provide a secure document processing system, which preserves the security of documents processed thereby even in the absence of physical security at the location of the system.
There is thus provided in accordance with a preferred embodiment of the present invention, a secure document processing system including a document processor having an input device for inputting information in a non-secure form, an information storage medium associated with the document processor, and encryption apparatus associated with the document processor and with the information storage medium and being operative to encrypt all information received from the document processor prior to storage thereof by the information storage medium in a secure form.
In accordance with a preferred embodiment of the present invention, the system includes automatic encryption and storage apparatus which automatically encrypts and then stores information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor. This cessation may be intentional or unintentional.
Additionally in accordance with a preferred embodiment of the present invention, the system includes automatic encryption and storage apparatus which automatically encrypts and then stores information inputted by the input device upon interruption of information input for at least a predetermined time. Such interruption is normally indicative of the possible absence or lack of attention of the user.
There is also provided in accordance with a preferred embodiment of the present invention a secure document processing system including a document processor having an input device for inputting information in a non-secure form, an information output device associated with the document processor, and encryption apparatus associated with the document processor and with the information output device and being operative to encrypt all information received from the document processor prior to output thereof by the information output device in a secure form.
In accordance with a preferred embodiment of the present invention, the system includes automatic encryption and output apparatus which automatically encrypts and then outputs information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor.
Additionally in accordance with a preferred embodiment of the present invention, the system includes automatic encryption and output apparatus which automatically encrypts and then outputs information inputted by the input device upon interruption of information input for at least a predetermined time.
Preferably, the document processor is incapable of storing information in a non-secure form.
The information storage medium may be any suitable information storage medium, such as a magnetic medium. The information output device may be a printer or information transmitter.
There is additionally provided in accordance with a preferred embodiment of the present invention a secure document processing method including generating a document in a non-secure form on a document processor using an input device for inputting information, encrypting all information received from the document processor prior to storage thereof, and storing of the information following encryption thereof on an information storage medium.
In accordance with a preferred embodiment of the present invention, the method includes automatic encryption and storage of information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor.
Additionally in accordance with a preferred embodiment of the present invention, the method includes automatic encryption and storage of information inputted by the input device upon interruption of information input for at least a predetermined time.
There is further provided in accordance with a preferred embodiment of the present invention a secure document processing method including generating a document in a non-secure form on a document processor using an input device for inputting information, encrypting all information received from the document processor prior to output thereof, and outputting of the information following encryption thereof on an information storage medium.
In accordance with a preferred embodiment of the present invention, the method includes automatic encryption and outputting of information inputted by the input device periodically in order not to lose said information upon cessation of the supply of electrical power to the document processor.
Additionally in accordance with a preferred embodiment of the present invention, the method includes automatic encryption and outputting of information inputted by the input device upon interruption of information input for at least
Cohen Ram
Menczer Emanuel
Pomerantz Itzhak
Aliroo LTD
Jack Todd
Ladas & Parry
Peeso Thomas R.
LandOfFree
User-controlled document processing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with User-controlled document processing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and User-controlled document processing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2518393