An encryption method that is largely transparent to a user is accomplished by intercepting a change document or open document command, carrying out an encryption or decryption process, and then completing the command on an encrypted or decrypted file. The encryption method can be used in a wide variety of environments, such as an individual computer program, a database or electronic messaging over the Internet. The encryption method can select from a plurality of encryption algorithms. The encryption method can also allow just a portion of a document to be encrypted, placed in a container, and then be represented by an object linking and embedding ("OLE") container object or other representation supported by the file.

 
Web www.patentalert.com

< Method and apparatus for providing mobile and other intermittent connectivity in a computing environment

< Method for reducing signaling in an telecommunications network by arranging gatekeepers in a hierarchical structure

> Method of controlling an Internet browser interface and a controllable browser interface

> Internet telephone and method for recovering voice data lost therein

~ 00231