Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Stealth Mechanism for a Distributed Data Processing System

IP.com Disclosure Number: IPCOM000107614D
Original Publication Date: 1992-Mar-01
Included in the Prior Art Database: 2005-Mar-22
Document File: 2 page(s) / 89K

Publishing Venue

IBM

Related People

Johnson, WJ: AUTHOR [+3]

Abstract

Often within an office, a user may wish to send a single document to a plurality of users. Sometimes the user may wish to conceal components of the document to particular recipients. For example, a user may wish to reveal all of the textual information of a document to all recipients, but wish to keep sensitive graphical information from particular recipients within the distribution.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Stealth Mechanism for a Distributed Data Processing System

       Often within an office, a user may wish to send a single
document to a plurality of users. Sometimes the user may wish to
conceal components of the document to particular recipients. For
example, a user may wish to reveal all of the textual information of
a document to all recipients, but wish to keep sensitive graphical
information from particular recipients within the distribution.

      This article describes a method by which particular components
of a distribution can be concealed from all or some recipients.
Current implementations require a user create separate documents, one
which contains information that can be conveyed to all recipients,
and one which has the absence of sensitive information for other
recipients. The method disclosed allows a user to mark and designate
particular components of a document/object which should be concealed
to particular recipients of a distribution.

      The creation of an end user interface which can block portions
of a document allows a user to designate criteria to be imposed on
the block within a distributed system. A service would be invoked
that displays choices on how the blocked portion should be conveyed.
For those portions which exist in non-textual media, the media would
be presented and marked at different sequences for the purpose of
concealment.

      After a selection of how the blocked portion should be
conveyed, the service could display the already chosen recipient's
along with their recipient type (i.e., Blind Copy, Carbon Copy,
etc.). The user could then mark those recipient's for which the
blocked portion would apply.

      Two choices can be employed for the distribution of this marked
document. The choices could be chosen on the basis of site policy or
user specification. The two methodologies which are practiced for the
distribution of the object are as follows:
      O    Information Evasion: If this option is chosen, the actual
blo...