WO2008063384A3 - Systems and methods for document control using public key encryption - Google Patents

Systems and methods for document control using public key encryption Download PDF

Info

Publication number
WO2008063384A3
WO2008063384A3 PCT/US2007/023244 US2007023244W WO2008063384A3 WO 2008063384 A3 WO2008063384 A3 WO 2008063384A3 US 2007023244 W US2007023244 W US 2007023244W WO 2008063384 A3 WO2008063384 A3 WO 2008063384A3
Authority
WO
WIPO (PCT)
Prior art keywords
document
key
documents
systems
methods
Prior art date
Application number
PCT/US2007/023244
Other languages
French (fr)
Other versions
WO2008063384A2 (en
Original Assignee
Fed Network Systems Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fed Network Systems Llc filed Critical Fed Network Systems Llc
Priority to CN200780041040.9A priority Critical patent/CN101554010B/en
Publication of WO2008063384A2 publication Critical patent/WO2008063384A2/en
Publication of WO2008063384A3 publication Critical patent/WO2008063384A3/en
Priority to HK09111806.2A priority patent/HK1135530A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1076Revocation

Abstract

Systems and methods for document control using public key encryption are provided An interface program serves as a software interface between user applications used to create and access documents and a data storage system that stores the documents in an encrypted form When a document is saved, information corresponding to the destruction of that document is obtained The document is encrypted and stored with a pointer to an encryption key on a token/key server When the document is subsequently accessed, the interface program will read the pointer and attempt to retneve the key If the key has expired in accordance with the destruction policy, the document is inaccessible Otherwise, the document is decrypted using the key Multiple documents may be saved according to the same destruction policy and even the same key, thereby greatly enhancing the ability to 'destroy' documents regardless of their location with minimal process
PCT/US2007/023244 2006-11-03 2007-11-05 Systems and methods for document control using public key encryption WO2008063384A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200780041040.9A CN101554010B (en) 2006-11-03 2007-11-05 Systems and methods for document control using public key encryption
HK09111806.2A HK1135530A1 (en) 2006-11-03 2009-12-16 Systems and methods for document control using public key encryption

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/556,372 2006-11-03
US11/556,372 US7916870B2 (en) 2006-11-03 2006-11-03 Systems and methods for document control using public key encryption

Publications (2)

Publication Number Publication Date
WO2008063384A2 WO2008063384A2 (en) 2008-05-29
WO2008063384A3 true WO2008063384A3 (en) 2008-08-07

Family

ID=39359753

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/023244 WO2008063384A2 (en) 2006-11-03 2007-11-05 Systems and methods for document control using public key encryption

Country Status (4)

Country Link
US (2) US7916870B2 (en)
CN (1) CN101554010B (en)
HK (1) HK1135530A1 (en)
WO (1) WO2008063384A2 (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7809156B2 (en) 2005-08-12 2010-10-05 Ricoh Company, Ltd. Techniques for generating and using a fingerprint for an article
US8554690B2 (en) 2006-03-31 2013-10-08 Ricoh Company, Ltd. Techniques for using media keys
US20070233612A1 (en) * 2006-03-31 2007-10-04 Ricoh Company, Ltd. Techniques for generating a media key
US20070229678A1 (en) * 2006-03-31 2007-10-04 Ricoh Company, Ltd. Camera for generating and sharing media keys
US9525547B2 (en) * 2006-03-31 2016-12-20 Ricoh Company, Ltd. Transmission of media keys
US8689102B2 (en) * 2006-03-31 2014-04-01 Ricoh Company, Ltd. User interface for creating and using media keys
US8756673B2 (en) 2007-03-30 2014-06-17 Ricoh Company, Ltd. Techniques for sharing data
US20080243702A1 (en) * 2007-03-30 2008-10-02 Ricoh Company, Ltd. Tokens Usable in Value-Based Transactions
US8402278B2 (en) * 2007-04-13 2013-03-19 Ca, Inc. Method and system for protecting data
US8209686B2 (en) * 2008-02-12 2012-06-26 International Business Machines Corporation Saving unsaved user process data in one or more logical partitions of a computing system
EP2304897A4 (en) * 2008-07-18 2011-08-03 Absolute Software Corp Privacy management for tracked devices
US8620815B1 (en) 2009-06-19 2013-12-31 United Services Automobile Association (Usaa) Systems and methods for document management
US20110019240A1 (en) * 2009-07-21 2011-01-27 Harris Technology, Llc Digital control and processing of transferred Information
FR2952778B1 (en) * 2009-11-17 2011-12-23 Thales Sa SECURE DATA TRANSMISSION METHOD AND ENCRYPTION AND ENCRYPTION SYSTEM FOR SUCH TRANSMISSION
US8619986B2 (en) 2011-07-21 2013-12-31 Patton Protection Systems LLC Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier
US20130041985A1 (en) * 2011-08-10 2013-02-14 Microsoft Corporation Token based file operations
US9509504B2 (en) * 2011-08-17 2016-11-29 Red Hat, Inc. Cryptographic key manager for application servers
US20140068256A1 (en) * 2012-09-04 2014-03-06 Bluebox Methods and apparatus for secure mobile data storage
GB2507100A (en) * 2012-10-19 2014-04-23 Ibm Secure sharing and collaborative editing of documents in cloud based applications
US20140258720A1 (en) * 2013-03-11 2014-09-11 Barracuda Networks, Inc. Systems and methods for transparent per-file encryption and decryption via metadata identification
CA2938318C (en) * 2014-01-30 2023-10-03 Nasdaq, Inc. Systems and methods for continuous active data security
US10110382B1 (en) 2014-09-02 2018-10-23 Amazon Technologies, Inc. Durable cryptographic keys
US10003584B1 (en) * 2014-09-02 2018-06-19 Amazon Technologies, Inc. Durable key management
US10374991B2 (en) 2015-06-22 2019-08-06 Ricoh Company, Ltd. Approach for sharing electronic documents during electronic meetings
US10484452B2 (en) * 2015-06-22 2019-11-19 Ricoh Company, Ltd. Approach for sharing electronic documents during electronic meetings
US10554728B2 (en) 2015-10-22 2020-02-04 Ricoh Company, Ltd. Approach for sharing electronic documents during electronic meetings
US10164987B2 (en) * 2016-02-29 2018-12-25 Microsoft Technology Licensing, Llc Controlling access to data originating from a third party website
US10205594B1 (en) * 2016-03-30 2019-02-12 EMC IP Holding Company LLC Crypto-erasure resilient to network outage
US10805080B2 (en) 2017-01-06 2020-10-13 Microsoft Technology Licensing, Llc Strong resource identity in a cloud hosted system
US10580242B2 (en) * 2017-01-20 2020-03-03 Macron International, Inc. Asset management system utilizing a mobile application
US10438006B2 (en) 2017-07-27 2019-10-08 Citrix Systems, Inc. Secure information storage
US11947686B2 (en) * 2022-07-14 2024-04-02 William D. Schwaderer Dynamically encrypting and decrypting application data using dynamically linked interposer modules
CN116760631B (en) * 2023-08-09 2023-10-31 国网浙江省电力有限公司 Multi-service data hierarchical management and control method and system based on regulation and control cloud platform

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030001757A1 (en) * 2000-10-19 2003-01-02 Tetsujiro Kondo Data processing device
US20060229911A1 (en) * 2005-02-11 2006-10-12 Medcommons, Inc. Personal control of healthcare information and related systems, methods, and devices

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000293587A (en) * 1999-04-09 2000-10-20 Sony Corp Information processor, information processing method, management device and method, and providing medium
JP4238410B2 (en) * 1999-04-09 2009-03-18 ソニー株式会社 Information processing system
US6289450B1 (en) * 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US6363480B1 (en) * 1999-09-14 2002-03-26 Sun Microsystems, Inc. Ephemeral decryptability
EP1107128A1 (en) * 1999-12-03 2001-06-13 Hyundai Electronics Industries Co., Ltd. Apparatus and method for checking the validity of links in a computer network
US7353209B1 (en) * 2000-01-14 2008-04-01 Microsoft Corporation Releasing decrypted digital content to an authenticated path
US6978376B2 (en) * 2000-12-15 2005-12-20 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
CN1165049C (en) * 2000-12-28 2004-09-01 日本胜利株式会社 Content recording device and media, reproducing device, transmitting method and media, and receiving method
US7480860B2 (en) * 2001-04-23 2009-01-20 Versata Computer Industry Solutions, Inc. Data document generator to generate multiple documents from a common document using multiple transforms
US7203966B2 (en) * 2001-06-27 2007-04-10 Microsoft Corporation Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
CN1356636A (en) * 2001-12-29 2002-07-03 徐翔 Method for creating electronic book with intellectual property right protection and its reader
CN1614688A (en) * 2004-07-05 2005-05-11 上海交通大学 Monitoring data file processing method and hard disk inspecting method based on hard disk
US20060277229A1 (en) * 2005-05-31 2006-12-07 Michihiro Yoshida Document management server, information terminal, document managing method, and program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030001757A1 (en) * 2000-10-19 2003-01-02 Tetsujiro Kondo Data processing device
US20060229911A1 (en) * 2005-02-11 2006-10-12 Medcommons, Inc. Personal control of healthcare information and related systems, methods, and devices

Also Published As

Publication number Publication date
WO2008063384A2 (en) 2008-05-29
HK1135530A1 (en) 2010-06-04
US7916870B2 (en) 2011-03-29
US20110167266A1 (en) 2011-07-07
CN101554010B (en) 2014-01-29
CN101554010A (en) 2009-10-07
US20080107271A1 (en) 2008-05-08
US8681994B2 (en) 2014-03-25

Similar Documents

Publication Publication Date Title
WO2008063384A3 (en) Systems and methods for document control using public key encryption
US7979700B2 (en) Apparatus, system and method for securing digital documents in a digital appliance
ES2426256T3 (en) System and procedure for the protection of digital works
US20030208686A1 (en) Method of data protection
CA2341931C (en) System and method for protection of digital works
WO2002044970A1 (en) Data terminal for managing ciphered content data and license acquired by software
WO2007008806A3 (en) Secure clipboard function
WO2007008807A3 (en) Secure local storage of files
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
WO2007008808A3 (en) Maintaining security for file copy operations
GB2387937B (en) Secure cpu and memory management unit with cryptographic extensions
WO2004040410A3 (en) Password encryption key
JP2011081842A (en) Managing data object in dynamic, distributed and collaborative context
JP2006244486A (en) Method for forming right of use for item on bases of access right and computer readable medium
CA2341979A1 (en) System and method for protection of digital works
JP2006085360A5 (en)
US9076007B2 (en) Portable data support with watermark function
Foltz et al. Simplified key management for digital access control of information objects
WO2007000761A3 (en) Method and apparatus for protecting files from none authorized access
WO2005106672A3 (en) Hierarchical storage management of encrypted data files
CN113806785A (en) Method and system for carrying out safety protection on electronic document
Simpson et al. Electronic Record Key Management for Digital Rights Management
Halcrow Demands, solutions, and improvements for Linux filesystem security
CN103971032A (en) File copy-prevention method and a file copy-prevention system
Zheng et al. Research on digital rights management model for spatial data files

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780041040.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07867354

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07867354

Country of ref document: EP

Kind code of ref document: A2