WO2008063384A3 - Systems and methods for document control using public key encryption - Google Patents
Systems and methods for document control using public key encryption Download PDFInfo
- Publication number
- WO2008063384A3 WO2008063384A3 PCT/US2007/023244 US2007023244W WO2008063384A3 WO 2008063384 A3 WO2008063384 A3 WO 2008063384A3 US 2007023244 W US2007023244 W US 2007023244W WO 2008063384 A3 WO2008063384 A3 WO 2008063384A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- key
- documents
- systems
- methods
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
- 230000006378 damage Effects 0.000 abstract 3
- 238000013500 data storage Methods 0.000 abstract 1
- 230000002708 enhancing effect Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1076—Revocation
Abstract
Systems and methods for document control using public key encryption are provided An interface program serves as a software interface between user applications used to create and access documents and a data storage system that stores the documents in an encrypted form When a document is saved, information corresponding to the destruction of that document is obtained The document is encrypted and stored with a pointer to an encryption key on a token/key server When the document is subsequently accessed, the interface program will read the pointer and attempt to retneve the key If the key has expired in accordance with the destruction policy, the document is inaccessible Otherwise, the document is decrypted using the key Multiple documents may be saved according to the same destruction policy and even the same key, thereby greatly enhancing the ability to 'destroy' documents regardless of their location with minimal process
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200780041040.9A CN101554010B (en) | 2006-11-03 | 2007-11-05 | Systems and methods for document control using public key encryption |
HK09111806.2A HK1135530A1 (en) | 2006-11-03 | 2009-12-16 | Systems and methods for document control using public key encryption |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/556,372 | 2006-11-03 | ||
US11/556,372 US7916870B2 (en) | 2006-11-03 | 2006-11-03 | Systems and methods for document control using public key encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008063384A2 WO2008063384A2 (en) | 2008-05-29 |
WO2008063384A3 true WO2008063384A3 (en) | 2008-08-07 |
Family
ID=39359753
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/023244 WO2008063384A2 (en) | 2006-11-03 | 2007-11-05 | Systems and methods for document control using public key encryption |
Country Status (4)
Country | Link |
---|---|
US (2) | US7916870B2 (en) |
CN (1) | CN101554010B (en) |
HK (1) | HK1135530A1 (en) |
WO (1) | WO2008063384A2 (en) |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7809156B2 (en) | 2005-08-12 | 2010-10-05 | Ricoh Company, Ltd. | Techniques for generating and using a fingerprint for an article |
US8554690B2 (en) | 2006-03-31 | 2013-10-08 | Ricoh Company, Ltd. | Techniques for using media keys |
US20070233612A1 (en) * | 2006-03-31 | 2007-10-04 | Ricoh Company, Ltd. | Techniques for generating a media key |
US20070229678A1 (en) * | 2006-03-31 | 2007-10-04 | Ricoh Company, Ltd. | Camera for generating and sharing media keys |
US9525547B2 (en) * | 2006-03-31 | 2016-12-20 | Ricoh Company, Ltd. | Transmission of media keys |
US8689102B2 (en) * | 2006-03-31 | 2014-04-01 | Ricoh Company, Ltd. | User interface for creating and using media keys |
US8756673B2 (en) | 2007-03-30 | 2014-06-17 | Ricoh Company, Ltd. | Techniques for sharing data |
US20080243702A1 (en) * | 2007-03-30 | 2008-10-02 | Ricoh Company, Ltd. | Tokens Usable in Value-Based Transactions |
US8402278B2 (en) * | 2007-04-13 | 2013-03-19 | Ca, Inc. | Method and system for protecting data |
US8209686B2 (en) * | 2008-02-12 | 2012-06-26 | International Business Machines Corporation | Saving unsaved user process data in one or more logical partitions of a computing system |
EP2304897A4 (en) * | 2008-07-18 | 2011-08-03 | Absolute Software Corp | Privacy management for tracked devices |
US8620815B1 (en) | 2009-06-19 | 2013-12-31 | United Services Automobile Association (Usaa) | Systems and methods for document management |
US20110019240A1 (en) * | 2009-07-21 | 2011-01-27 | Harris Technology, Llc | Digital control and processing of transferred Information |
FR2952778B1 (en) * | 2009-11-17 | 2011-12-23 | Thales Sa | SECURE DATA TRANSMISSION METHOD AND ENCRYPTION AND ENCRYPTION SYSTEM FOR SUCH TRANSMISSION |
US8619986B2 (en) | 2011-07-21 | 2013-12-31 | Patton Protection Systems LLC | Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier |
US20130041985A1 (en) * | 2011-08-10 | 2013-02-14 | Microsoft Corporation | Token based file operations |
US9509504B2 (en) * | 2011-08-17 | 2016-11-29 | Red Hat, Inc. | Cryptographic key manager for application servers |
US20140068256A1 (en) * | 2012-09-04 | 2014-03-06 | Bluebox | Methods and apparatus for secure mobile data storage |
GB2507100A (en) * | 2012-10-19 | 2014-04-23 | Ibm | Secure sharing and collaborative editing of documents in cloud based applications |
US20140258720A1 (en) * | 2013-03-11 | 2014-09-11 | Barracuda Networks, Inc. | Systems and methods for transparent per-file encryption and decryption via metadata identification |
CA2938318C (en) * | 2014-01-30 | 2023-10-03 | Nasdaq, Inc. | Systems and methods for continuous active data security |
US10110382B1 (en) | 2014-09-02 | 2018-10-23 | Amazon Technologies, Inc. | Durable cryptographic keys |
US10003584B1 (en) * | 2014-09-02 | 2018-06-19 | Amazon Technologies, Inc. | Durable key management |
US10374991B2 (en) | 2015-06-22 | 2019-08-06 | Ricoh Company, Ltd. | Approach for sharing electronic documents during electronic meetings |
US10484452B2 (en) * | 2015-06-22 | 2019-11-19 | Ricoh Company, Ltd. | Approach for sharing electronic documents during electronic meetings |
US10554728B2 (en) | 2015-10-22 | 2020-02-04 | Ricoh Company, Ltd. | Approach for sharing electronic documents during electronic meetings |
US10164987B2 (en) * | 2016-02-29 | 2018-12-25 | Microsoft Technology Licensing, Llc | Controlling access to data originating from a third party website |
US10205594B1 (en) * | 2016-03-30 | 2019-02-12 | EMC IP Holding Company LLC | Crypto-erasure resilient to network outage |
US10805080B2 (en) | 2017-01-06 | 2020-10-13 | Microsoft Technology Licensing, Llc | Strong resource identity in a cloud hosted system |
US10580242B2 (en) * | 2017-01-20 | 2020-03-03 | Macron International, Inc. | Asset management system utilizing a mobile application |
US10438006B2 (en) | 2017-07-27 | 2019-10-08 | Citrix Systems, Inc. | Secure information storage |
US11947686B2 (en) * | 2022-07-14 | 2024-04-02 | William D. Schwaderer | Dynamically encrypting and decrypting application data using dynamically linked interposer modules |
CN116760631B (en) * | 2023-08-09 | 2023-10-31 | 国网浙江省电力有限公司 | Multi-service data hierarchical management and control method and system based on regulation and control cloud platform |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030001757A1 (en) * | 2000-10-19 | 2003-01-02 | Tetsujiro Kondo | Data processing device |
US20060229911A1 (en) * | 2005-02-11 | 2006-10-12 | Medcommons, Inc. | Personal control of healthcare information and related systems, methods, and devices |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293587A (en) * | 1999-04-09 | 2000-10-20 | Sony Corp | Information processor, information processing method, management device and method, and providing medium |
JP4238410B2 (en) * | 1999-04-09 | 2009-03-18 | ソニー株式会社 | Information processing system |
US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
US6363480B1 (en) * | 1999-09-14 | 2002-03-26 | Sun Microsystems, Inc. | Ephemeral decryptability |
EP1107128A1 (en) * | 1999-12-03 | 2001-06-13 | Hyundai Electronics Industries Co., Ltd. | Apparatus and method for checking the validity of links in a computer network |
US7353209B1 (en) * | 2000-01-14 | 2008-04-01 | Microsoft Corporation | Releasing decrypted digital content to an authenticated path |
US6978376B2 (en) * | 2000-12-15 | 2005-12-20 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
CN1165049C (en) * | 2000-12-28 | 2004-09-01 | 日本胜利株式会社 | Content recording device and media, reproducing device, transmitting method and media, and receiving method |
US7480860B2 (en) * | 2001-04-23 | 2009-01-20 | Versata Computer Industry Solutions, Inc. | Data document generator to generate multiple documents from a common document using multiple transforms |
US7203966B2 (en) * | 2001-06-27 | 2007-04-10 | Microsoft Corporation | Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices |
CN1356636A (en) * | 2001-12-29 | 2002-07-03 | 徐翔 | Method for creating electronic book with intellectual property right protection and its reader |
CN1614688A (en) * | 2004-07-05 | 2005-05-11 | 上海交通大学 | Monitoring data file processing method and hard disk inspecting method based on hard disk |
US20060277229A1 (en) * | 2005-05-31 | 2006-12-07 | Michihiro Yoshida | Document management server, information terminal, document managing method, and program |
-
2006
- 2006-11-03 US US11/556,372 patent/US7916870B2/en not_active Expired - Fee Related
-
2007
- 2007-11-05 CN CN200780041040.9A patent/CN101554010B/en not_active Expired - Fee Related
- 2007-11-05 WO PCT/US2007/023244 patent/WO2008063384A2/en active Application Filing
-
2009
- 2009-12-16 HK HK09111806.2A patent/HK1135530A1/en not_active IP Right Cessation
-
2011
- 2011-03-15 US US13/048,349 patent/US8681994B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030001757A1 (en) * | 2000-10-19 | 2003-01-02 | Tetsujiro Kondo | Data processing device |
US20060229911A1 (en) * | 2005-02-11 | 2006-10-12 | Medcommons, Inc. | Personal control of healthcare information and related systems, methods, and devices |
Also Published As
Publication number | Publication date |
---|---|
WO2008063384A2 (en) | 2008-05-29 |
HK1135530A1 (en) | 2010-06-04 |
US7916870B2 (en) | 2011-03-29 |
US20110167266A1 (en) | 2011-07-07 |
CN101554010B (en) | 2014-01-29 |
CN101554010A (en) | 2009-10-07 |
US20080107271A1 (en) | 2008-05-08 |
US8681994B2 (en) | 2014-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008063384A3 (en) | Systems and methods for document control using public key encryption | |
US7979700B2 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
ES2426256T3 (en) | System and procedure for the protection of digital works | |
US20030208686A1 (en) | Method of data protection | |
CA2341931C (en) | System and method for protection of digital works | |
WO2002044970A1 (en) | Data terminal for managing ciphered content data and license acquired by software | |
WO2007008806A3 (en) | Secure clipboard function | |
WO2007008807A3 (en) | Secure local storage of files | |
US20040039932A1 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
WO2007008808A3 (en) | Maintaining security for file copy operations | |
GB2387937B (en) | Secure cpu and memory management unit with cryptographic extensions | |
WO2004040410A3 (en) | Password encryption key | |
JP2011081842A (en) | Managing data object in dynamic, distributed and collaborative context | |
JP2006244486A (en) | Method for forming right of use for item on bases of access right and computer readable medium | |
CA2341979A1 (en) | System and method for protection of digital works | |
JP2006085360A5 (en) | ||
US9076007B2 (en) | Portable data support with watermark function | |
Foltz et al. | Simplified key management for digital access control of information objects | |
WO2007000761A3 (en) | Method and apparatus for protecting files from none authorized access | |
WO2005106672A3 (en) | Hierarchical storage management of encrypted data files | |
CN113806785A (en) | Method and system for carrying out safety protection on electronic document | |
Simpson et al. | Electronic Record Key Management for Digital Rights Management | |
Halcrow | Demands, solutions, and improvements for Linux filesystem security | |
CN103971032A (en) | File copy-prevention method and a file copy-prevention system | |
Zheng et al. | Research on digital rights management model for spatial data files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780041040.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07867354 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07867354 Country of ref document: EP Kind code of ref document: A2 |