최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0057015 (2008-03-27) |
등록번호 | US-8543827 (2013-09-24) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 7 인용 특허 : 465 |
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
1. A method comprising: configuring at least one computing device to perform the functions of:associating an access level with a store, the access level comprising access rules;retrieving the access rules based on a file being deposited in the store;encrypting the file in accordance with the access
1. A method comprising: configuring at least one computing device to perform the functions of:associating an access level with a store, the access level comprising access rules;retrieving the access rules based on a file being deposited in the store;encrypting the file in accordance with the access rules to produce an encrypted data portion;generating a header portion of the encrypted file to include encryption related security information from the access rules, wherein the access rules control at least a physical or network location from which a request for access to the file originates so as to permit access from a single access location at a time; andintegrating the header with the encrypted data portion to produce a secured file. 2. The method as recited in claim 1, wherein the electronic data is one or more of: streaming audio, streaming video, streaming multimedia, electronic files, electronic documents, images, executable code, audio files, databases, database tables, database table records, collections of electronic files; collections of electronic documents, stored passwords, stored ciphers, public encryption keys, private encryption keys, and multimedia files. 3. The method as recited in claim 2, wherein the streaming audio is one or more of audio streams created from applications, audio and real time audio streams. 4. The method as recited in claim 2, wherein the images are one or more of bitmapped graphics format files and image files created from applications. 5. The method as recited in claim 2, wherein the multimedia files are one or more of video files, multimedia files created from applications, video files created from applications, multimedia objects created from applications, and executable code. 6. The method as recited in claim 2, wherein the audio files are one or more of playlists, audio and files created from applications. 7. A computer readable storage device having computer program code stored thereon, execution of which, by a processing device, causes the processing device to perform operations comprising: associating an access level with a store, the access level comprising access rules;retrieving the access rules based on a file being deposited in the store;encrypting the file in accordance with the access rules to produce an encrypted data portion;generating a header portion of the encrypted file to include encryption related security information from the access rules, wherein the access rules control at least a physical or network location from which a request for access to the file originates so as to permit access from a single access location at a time; andintegrating the header with the encrypted data portion to produce a secured file. 8. The computer readable storage device as recited in claim 7, wherein the electronic data is one or more of: streaming audio, streaming video, streaming multimedia, electronic files, electronic documents, images, executable code, audio files, databases, database tables, database table records, collections of electronic files; collections of electronic documents, stored passwords, stored ciphers, public encryption keys, private encryption keys, and multimedia files. 9. The computer readable storage device as recited in claim 8, wherein the streaming audio is one or more of audio streams created from applications and real time audio streams. 10. The computer readable storage device as recited in claim 8, wherein the images are one or more of bitmapped graphics format files and image files created from applications. 11. The computer readable storage device as recited in claim 7, wherein the multimedia files are one or more of video files, multimedia files created from applications, video files created from applications, multimedia objects created from applications, and executable code. 12. The computer readable storage device as recited in claim 7, wherein the audio files are one or more of playlists audio and files created from applications. 13. A system comprising: a processor; anda memory storing a plurality of modules comprising:a first module configured to associate an access level with a store, the access level comprising access rules,a second module configured to retrieve the access rules based on a file being deposited in the store,a third module configured to encrypt the file in accordance with the access rules to produce an encrypted data portion,a fourth module configured to generate a header portion of the encrypted file to include encryption related security information from the access rules, wherein the access rules control at least a physical or network location from which a request for access to the file originates so as to permit access from a single access location at a time, anda fifth module configured to integrate the header with the encrypted data portion to produce a secured file. 14. The system as recited in claim 13, wherein the electronic data is one or more of: streaming audio, streaming video, streaming multimedia, electronic files, electronic documents, images, executable code, audio files, databases, database tables, database table records, collections of electronic files; collections of electronic documents, stored passwords, stored ciphers, public encryption keys, private encryption keys, and multimedia files. 15. The system as recited in claim 14, wherein the streaming audio is one or more of audio streams created from applications and real time audio streams. 16. The system as recited in claim 14, wherein the images are one or more of bitmapped graphics format files and image files created from applications. 17. The system as recited in claim 14, wherein the multimedia files are one or more of video files, multimedia files created from applications, video files created from applications, multimedia objects created from applications, and executable code. 18. The system as recited in claim 14, wherein the audio files are one or more of playlists and files created from applications.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.