최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0762028 (2010-04-16) |
등록번호 | US-8327138 (2012-12-04) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 7 인용 특허 : 462 |
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
1. A method comprising: receiving a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy;decrypting the electronic document with a private state decryption key assigned to the state of the process-d
1. A method comprising: receiving a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy;decrypting the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users; andre-encrypting the electronic document with a public state encryption key assigned to the additional state. 2. The method of claim 1, wherein re-encrypting the electronic document with the public state encryption key comprises re-encrypting a file key by which a portion of the electronic document is encrypted. 3. The method of claim 1, further comprising: checking the request to transition the electronic document to the additional state for permission to perform the transition. 4. The method of claim 1, further comprising: generating the request to transition the electronic document to the additional state of the process-driven security policy in response to an internal or external system event. 5. The method of claim 4, wherein the request to transition the electronic document to the additional state of the process-driven security policy is based on a transition rule associated with the event. 6. The method of claim 1, further comprising: determining the state of the process-driven security policy based on security information within the electronic document. 7. The method of claim 1, further comprising: receiving a request for access to the electronic document;determining whether a set of access restrictions associated with the additional state of the process-driven security policy have been satisfied; anddecrypting the electronic document with a state decryption key assigned to the additional state of the process-driven security policy, wherein decrypting is permitted based on satisfaction of the set of access restrictions. 8. The method of claim 7, wherein decrypting the electronic document with the private state decryption key assigned to the additional state comprises decrypting the electronic document with the private state decryption key assigned to the additional state being a different key than the public state encryption key. 9. A non-transitory computer-readable device having computer-executable instructions stored thereon, execution of which, by a computing device, causes the computing device to perform operations comprising: receiving a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy;decrypting the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users; andre-encrypting the electronic document with a public state encryption key assigned to the additional state. 10. The computer-readable device of claim 9, wherein re-encrypting the electronic document with the public state encryption key comprises re-encrypting a file key by which a portion of the electronic document is encrypted. 11. The computer-readable device of claim 9, wherein the request to transition the electronic document to the additional state is checked for permission to perform the transition. 12. The computer-readable device of claim 9, wherein the request to transition the electronic document to the additional state of the process-driven security policy is generated automatically in response to an internal or external system event. 13. The computer-readable device of claim 12, wherein the request to transition the electronic document to the additional state of the process-driven security policy is based on a transition rule associated with the event. 14. The computer-readable device of claim 9, the operations further comprising: determining the state of the process-driven security policy based on security information within the electronic document. 15. The computer-readable device of claim 9, the method further comprising: receiving a request for access to the electronic document;determining whether a set of access restrictions associated with the additional state of the process-driven security policy have been satisfied; anddecrypting the electronic document with a state decryption key assigned to the additional state of the process-driven security policy, wherein decrypting is permitted based on satisfaction of the set of access restrictions. 16. The computer-readable device of claim 15, wherein decrypting the electronic document with the private state decryption key assigned to the additional state comprises decrypting the electronic document with the private state decryption key assigned to the additional state being a different key than the public state encryption key. 17. A system comprising: a tangible computer-readable medium configured to store: a receiving module configured to receive a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy,a decrypting module configured to decrypt the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users, andan encryption module configured to re-encrypt the electronic document with a public state encryption key assigned to the additional state; andone or more processors configured to process the modules.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.