US 9,811,675 B2
Generation and use of a modified protected file
Howard Lu, Watertown, MA (US); Yongjian Feng, Newton, MA (US); Christopher Hebert, Framingham, MA (US); and Jean-Claude Paul, Newton, MA (US)
Assigned to EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed by EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed on Nov. 10, 2015, as Appl. No. 14/937,680.
Application 14/937,680 is a continuation of application No. 13/725,609, filed on Dec. 21, 2012, granted, now 9,275,233.
Prior Publication US 2016/0078241 A1, Mar. 17, 2016
Int. Cl. G06F 21/00 (2013.01); G06F 12/14 (2006.01); G06F 21/62 (2013.01); G06F 21/60 (2013.01); H04L 29/08 (2006.01); G06F 17/30 (2006.01); G06F 21/10 (2013.01); H04L 29/06 (2006.01)
CPC G06F 21/6209 (2013.01) [G06F 17/30179 (2013.01); G06F 21/10 (2013.01); G06F 21/60 (2013.01); H04L 63/0428 (2013.01); H04L 67/02 (2013.01); H04L 69/329 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2135 (2013.01); H04L 67/06 (2013.01); H04L 2463/101 (2013.01); Y10S 707/99942 (2013.01)] 12 Claims
OG exemplary drawing
1. A system to provide secure access to data, comprising:
a processor configured to:
rename a protected primary content object of a protected file, wherein the protected file comprises an encrypted Portable Document Format File (PDF);
receive a template file, wherein the template file comprises an unprotected file, wherein the template file comprises an unencrypted PDF file;
extract an unprotected replacement object from the template file, wherein the unprotected replacement object includes data configured to be rendered as a set of instructions associated with viewing a modified protected file at a first device at which an IRM client is not installed;
create the modified protected file based at least in part by inserting into the protected file the unprotected replacement object,
wherein the modified protected file comprises unprotected content including the unprotected replacement object and protected content including the renamed protected primary content object; and
send the modified protected file to a second device; and
a memory coupled to the processor and configured to store the protected file.