Abstract: The present disclosure envisages a novel system that allows for the transfer of data from a protected source file, into a destination file that has the same or higher level of security than the aforementioned source file, such that the security of the data is not compromised; through a digital rights management system, capable of comparing the security levels on source and destination files and according allowing or disallowing the copying of content from source to destination file.
Claims:Claims
We claim:
1. A novel computer implemented system that allows copying of content from a digitally
secured source file and pasting it in another destination file without compromising security
of the content, said system comprising of a user device having a digital rights management
technology installed on it.
2. A system wherein the user need not install any software, other than the aforementioned
digital rights management technology.
3. A system wherein, the said digital rights management technology allows for the transfer of
content from a protected source file, into a destination file that has the same or higher level
of security than the aforementioned source file, such that the security of the content is not
compromised, comprising the following steps -
i. encrypting the desired content to be copied by the user and pasting it onto the
system clipboard in a custom format recognised only by certain application(s); this
content will remain on the clipboard until a system call to paste the content into the
destination file is generated.
ii. copying standard error message to the system clipboard simultaneous to
copying content from the source file.
iii. comparing the levels of protection enforced upon source and destination
applications.
iv. pasting the content copied on the clipboard into the destination file if the
security of the destination file is found to be more or equal to that of the source file
upon comparison (as mentioned in point iv)
v. would display standard message in case the security of destination file is less
than that of the source file. , Description:FIELD OF THE INVENTION:
The present invention relates to a system that allows copying of data from a digitally protected file without compromising the security of the content which was allowed to be copied.
DEFINITIONS:
As used in the present disclosure, the following terms are generally intended to have the meaning as set forth below, except to the extent that the context in which they are used, indicate otherwise.
The expression “Digital Right Management technology”; abbreviated as DRM, used hereinafter in this specification refers to, but is not limited to, an information rights management technology, designed to provide high levels of data security.
The expression “IDataObject interface”; used hereinafter in this specification refers to, but is not limited to, an interface that enables data transfer between applications.
The expression “source file”; used hereinafter in this specification refers to, but is not limited to, the digitally protected file from which data is to be copied.
The expression “destination file”; used hereinafter in this specification refers to, but is not limited to, a file in which the data copied from the source file is to be pasted.
BACKGROUND
Protecting confidentiality of sensitive data transferred between owner of any document/file, with the intended individual users or corporate teams is a necessity in this day and age. Many different solutions exist for protecting data and restricting its proliferation only to the intended users, including DRM. Generally, copying of data from a source file is prevented in a DRM protected document. But, in many cases, business needs dictate that data must be copied from a source file to a destination file. Thus, there is a need for a system that will allow for copying of data from a digitally protected file, without compromising the security of the data or content which is being copied. Existing systems of DRM adhere to one of two extreme alternatives – either they block all copying of data from the protected file or they freely allow copying of data from a protected file and pasting of said data into an unprotected file, hence nullifying the security imposed by the digital protection. The present invention overcomes these drawbacks of current systems of DRM, by providing a system that checks the permissions on the source and destination files and accordingly allows or disallows copying of the protected data in the source file.
OBJECTS:
The object of the present disclosure is aimed at ameliorating one or more problems of the prior art or to at least provide useful alternatives.
An object of the present invention is to provide a system that allows for the copying of data from a digitally protected source file to a destination file which has similar or higher level of digital protection.
SUMMARY:
The present invention provides a system that allows copying of data from a digitally protected source file to a destination file that has the same or higher level of digital protection. The system checks the permissions on the source and destination files and controls the copying of the data from the source file in such a way that it can only be pasted into a destination file that has equal or higher digital protection than the source file.
When a user attempts to copy data from a digitally protected file to the system clipboard, this message is intercepted by a DRM system. The DRM system encrypts the data and stores it on the system clipboard; the said data is however stored in a custom registered format. Simultaneously, it also copies a standard message to the system clipboard, said message stating that the user does not have the permission to copy this data. Depending on the level of protection of the destination file, either the data is decrypted and pasted or the standard message is displayed.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS:
Figure 1 is a general overview of the components involved in the implementation of the present invention.
Figure 2 depicts the system clipboard when data from a secure file is copied onto it.
Figures 3 and 4 depict the process of copying encrypted data from the system clipboard and pasting it onto a protected and unprotected destination file, respectively.
DETAILED DESCRIPTION:
The present invention describes a system that allows for the copying of content from a digitally protected source file and pasting of said content into a destination file with an equal or higher level of protection. Thus, once a file is protected through a DRM technology, this system is automatically applied to the file. When such a secured file, (i.e., a file protected by DRM), is accessed, the DRM intercepts system calls such as “copy” or “print”, (i.e., any attempts made by the application to access the system clipboard are intercepted), disallowing copying of secure data. But in some instances, it is necessary for the secured data to be copied from one file into another – the present invention provides for a means of doing the aforementioned.
When a user selects some content from the source file and copies it, it is temporarily pasted onto the system clipboard; it remains on the clipboard for the interim period between copying of data from source file to pasting of data in the destination file. Generally, when data is copied onto the system clipboard, it is copied in a standard format (such as text, rich text, image, etc), or it may be copied in a special format that is recognized only by a particular application(s); for example – Notepad will be unable to recognize format copied form Microsoft Word. Thus, when data is to be stored on the system clipboard, it is important that both format and content information are stored. Alternatively, in order to save memory; system clipboard allows applications to store information in the clipboard without actually copying the content – instead a “placeholder” is put in place of the actual content. This feature of the system clipboard is known as delayed rendering and is achieved by copying NULL data or copying COM object implementing IDataObject interface. When some other application requests for this information, the system generates an event for the source application (from which the data was copied to the clipboard) to collect the data from the source file.
In instances, wherein the actual data itself is copied onto the clipboard, it must be encrypted before being copied. This data is copied in a format known only to the controlling technology, i.e., the DRM technology under use. This encrypted data contains both the format as well as the content information. Simultaneously, the enwrapping feature of the DRM technology, i.e., the DRM encryption layer also copies a second, standard set of content onto the system clipboard, in a standard text and image format [Figure 2]. This second set of content has a message stating “The data copied to this system clipboard is protected. You do not have the required permissions to access it”. Depending on the level of security of the destination file, there will be one of two outcomes -
• If the destination file is of equal or higher security than the source file, the actual data which was copied from the source file will be pasted.
• If the destination file has a lower level of security than the source file, the aforementioned standard message will be pasted.
In general, the level of security of a document compared to another can be understood as follows – when a user can perform more activities on the content in a file A, said file A has lower level of security than a file B in which the user can perform fewer activities on the same content. In short, the security levels are enhanced by restricting the pool of users accessing the file as desired or by curtailing the editorial rights of the users over the shared file thereby achieving higher levels of security.
In the first scenario, the DRM technology ensures that the content is protected, by enforcing the permissions of the destination file.
Once the data has been copied form the source file onto the system clipboard, it must next be pasted into the destination file. During this process of pasting of data, there are two alternatives followed, depending on the manner in which the data was pasted onto the clipboard -
• If the original data itself was pasted, it will be present on the clipboard in an encrypted format. Thus, before being pasted into the destination file, the data is decrypted and then pasted
• If a placeholder was pasted instead of the actual data, then the destination application generates a system event for the source application to collect the data from the source file and relay it to the destination file.
Before the data is pasted into the destination file, the first step that is undertaken by the system is the comparison of the permissions of the source file and the destination file – if these permissions are the same or more constraining for the destination file, then the actual data copied from the source file is decrypted and pasted into the destination file [Figure 3]
Even if an application that is not protected under the DRM technology tries to access the data on the clipboard, it will not be able to, since the data has been encrypted and pasted in a format recognized only by the applications falling under the DRM technology. In such a scenario, the standard message stating “The data copied to this system clipboard is protected. You do not have the required permissions to access it” gets pasted in place of the actual data. [Figure 4]
TECHNICAL ADVANCEMENTS
The technical advancements of the system and method envisaged by the present disclosure include that:
• This system meets the business needs of transferring data from one protected file to another, without compromising the security of said data.
The disclosure has been described with reference to the accompanying embodiments which do not limit the scope and ambit of the disclosure. The description provided is purely by way of example and illustration.
The embodiments herein above and the various features and advantageous details thereof are explained with reference to the non-limiting embodiments in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
The foregoing description of the specific embodiments so fully revealed the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.
Throughout this specification, the word “comprise”, or variations such as “comprises” or “comprising”, will be understood to imply the inclusion of a stated element, integer or step, or group of elements, integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps.
The use of the expression “at least” or “at least one” suggests the use of one or more elements or ingredients or quantities, as the use may be in the embodiment of the disclosure to achieve one or more of the desired objects or results.
Any discussion of files, acts, materials, devices, articles or the like that has been included in this specification is solely for the purpose of providing a context for the disclosure. It is not to be taken as an admission that any or all of these matters form a part of the prior art base or were common general knowledge in the field relevant to the disclosure as it existed anywhere before the priority date of this application.
The numerical values mentioned for the various physical parameters, dimensions or quantities are only approximations and it is envisaged that the values higher/lower than the numerical values assigned to the parameters, dimensions or quantities fall within the scope of the disclosure, unless there is a statement in the specification, specific to the contrary.
While considerable emphasis has been placed herein on the components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.
| # | Name | Date |
|---|---|---|
| 1 | 201721029825-STATEMENT OF UNDERTAKING (FORM 3) [23-08-2017(online)].pdf | 2017-08-23 |
| 2 | 201721029825-POWER OF AUTHORITY [23-08-2017(online)].pdf | 2017-08-23 |
| 3 | 201721029825-FORM 1 [23-08-2017(online)].pdf | 2017-08-23 |
| 4 | 201721029825-DRAWINGS [23-08-2017(online)].pdf | 2017-08-23 |
| 5 | 201721029825-DECLARATION OF INVENTORSHIP (FORM 5) [23-08-2017(online)].pdf | 2017-08-23 |
| 6 | 201721029825-COMPLETE SPECIFICATION [23-08-2017(online)].pdf | 2017-08-23 |
| 7 | 201721029825-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [23-08-2017(online)].pdf | 2017-08-23 |
| 8 | 201721029825-CERTIFIED COPIES-CERTIFICATE U-S 72 147 & UR 133-2 [12-07-2018(online)].pdf | 2018-07-12 |
| 9 | 201721029825-FORM-26 [17-07-2018(online)].pdf | 2018-07-17 |
| 10 | 201721029825-FORM 18 [31-07-2018(online)].pdf | 2018-07-31 |
| 11 | Abstract1.jpg | 2018-08-11 |
| 12 | 201721029825-CORRESPONDENCE(IPO)-(CERTIFIED COPY)-(13-7-2018).pdf | 2018-08-11 |
| 13 | 201721029825-FORM 3 [23-08-2018(online)].pdf | 2018-08-23 |
| 14 | 201721029825-FORM 3 [24-07-2020(online)].pdf | 2020-07-24 |
| 15 | 201721029825-FER.pdf | 2021-10-18 |
| 16 | 201721029825-AbandonedLetter.pdf | 2024-01-15 |
| 1 | 2020-11-1015-04-31E_10-11-2020.pdf |