최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0404578 (2012-02-24) |
등록번호 | US-8739302 (2014-05-27) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 2 인용 특허 : 435 |
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy and enforced in conjunction with one or more cryptographic methods.
1. A method comprising: transitioning from a previous state to a next state in accordance with a security policy;retrieving, responsive to the transitioning, a file key from a security information portion of a secured document, wherein the file key is encrypted by a first encryption in accordance wi
1. A method comprising: transitioning from a previous state to a next state in accordance with a security policy;retrieving, responsive to the transitioning, a file key from a security information portion of a secured document, wherein the file key is encrypted by a first encryption in accordance with the previous state;producing a decrypted file key, wherein producing the decrypted file key comprises decrypting the file key encrypted by the first encryption, wherein the decrypted file key is usable to decrypt an encrypted data portion of the secured document; andre-encrypting the decrypted file key with a second encryption in accordance with the next state, wherein the first encryption and the second encryption are different. 2. The method of claim 1, further comprising: receiving an event; anddetermining whether the event causes the transitioning. 3. The method of claim 2, wherein the event is an external event originating from outside of a file security system. 4. The method of claim 1, wherein additional states each have different access restrictions when applied to the secured document. 5. The method of claim 1, wherein producing the decrypted file key comprises: obtaining a decryption key corresponding, to the previous state; anddecrypting the file key encrypted by the first encryption using the decryption key. 6. The method of claim 1, wherein re-encrypting the decrypted file key comprises: obtaining an encryption key corresponding to the next state; andencrypting the decrypted file key with the second encryption using the encryption key. 7. A computer-readable storage device having instructions stored thereon, execution of which, by a computing device, causes the computing device to perform operations comprising: transitioning from a previous state to a next state in accordance with a security policy;retrieving, responsive to the transitioning, a file key from a security information portion of a secured document, wherein the file key is encrypted by a first encryption in accordance with the previous state;producing a decrypted file key, wherein producing the decrypted file key comprises decrypting the file key encrypted by the first encryption, wherein the decrypted file key is usable to decrypt an encrypted data portion of the secured document; andre-encrypting the decrypted file key with a second encryption in accordance with the next state, wherein the first encryption and the second encryption are different. 8. The computer-readable storage device of claim 7, the operations further comprising: receiving an event; anddetermining whether the event causes the transitioning. 9. The computer-readable storage device of claim 8, wherein the event is an external event originating from outside of a file security system. 10. The computer-readable storage device of claim 7, wherein additional states each have different access restrictions when applied to the secured document. 11. The computer-readable storage device of claim 7, wherein producing the decrypted file key comprises: obtaining a decryption key corresponding to the previous state; anddecrypting the file key encrypted by the first encryption using the decryption key. 12. The computer-readable storage device of claim 7, wherein re-encrypting the decrypted file key comprises: obtaining an encryption key corresponding to the next state; andencrypting the decrypted file key with the second encryption using the encryption key. 13. A system comprising: a memory configured to store a state machine, wherein the state machine is configured to: transition from a previous state to a next state in accordance with a security policy;retrieve, responsive to the transition, a file key from a security information portion of a secured document, wherein the file key is encrypted by a first encryption in accordance with the previous state,produce a decrypted file key, wherein producing the decrypted file key comprises decrypting the file key encrypted by the first encryption, wherein the decrypted file key is usable to decrypt an encrypted data portion of the secured document, andre-encrypt the decrypted file key with a second encryption in accordance with the next state, wherein the first encryption and the second encryption are different; andone or more processors configured to process the state machine. 14. The system of claim 13, wherein the state machine is further configured to receive an event and determine whether the event causes the transition. 15. The system of claim 14, wherein the event is an external event originating from outside of a file security system. 16. The system of claim 13, wherein additional states each have different access restrictions when applied to the secured document. 17. The system of claim 13, wherein the state machine is further configured to produce the decrypted file key by obtaining a decryption key corresponding to the previous state and decrypting the file key encrypted by the first encryption using the decryption key. 18. The system of claim 13, wherein the state machine is further configured to re-encrypt the decrypted file key by obtaining an encryption key corresponding to the next state and encrypting the decrypted file key with the second encryption using the encryption key.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.