최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0034147 (2013-09-23) |
등록번호 | US-9542560 (2017-01-10) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 474 |
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
1. A method for securing an electronic document, the method comprising: obtaining an electronic document to be secured;determining a particular electronic document data type corresponding to the electronic document, wherein the electronic document and the electronic document data type are associated
1. A method for securing an electronic document, the method comprising: obtaining an electronic document to be secured;determining a particular electronic document data type corresponding to the electronic document, wherein the electronic document and the electronic document data type are associated with an application;obtaining a data type key associated with the electronic document data type that has been determined;encrypting at least a data portion of the electronic document using the data type key according to a public key encryption algorithm;producing an encrypted document corresponding to the electronic document and storing the encrypted document in an existing database, wherein the encrypted document is associated with the application and is in a format accessible by the application;wherein the data portion of the electronic document can be decrypted using the data type key upon determining that a requester has permission to access the particular electronic document data type of the electronic document. 2. The method as recited in claim 1, wherein the electronic document data type provides a categorization of different types of electronic document content. 3. The method as recited in claim 1, wherein the method further comprises: saving the secured electronic document to a storage device. 4. The method as recited in claim 1, wherein the determining comprises: receiving a selection of at least one of a plurality of available data types. 5. The method as recited in claim 1, wherein the determining comprises: displaying a plurality of available data types; andselecting at least one of the available data types being displayed. 6. The method as recited in claim 5, wherein the displaying and the selecting are performed with the assistance of a graphical user interface. 7. The method as recited in claim 1, further comprising attaching security information to the encrypted data portion, wherein the security information includes the data type key. 8. The method as recited in claim 7, wherein the data type key within the security information is encrypted. 9. The method as recited in claim 1, wherein the encrypting uses an encryption hierarchy, and wherein the data type key is used in at least one level of the encryption hierarchy. 10. The method as recited in claim 1, further comprising imposing at least one data type policy restriction to the encrypted document based on the electronic document data type corresponding to the electronic document. 11. The method as recited in claim 1, wherein the encrypted document maintains the same length as the electronic document. 12. The method as recited in claim 1, wherein the existing database is a financial application database. 13. The method as recited in claim 1, wherein the encrypting further comprises: accessing the electronic document via the application; andautomatically requesting, by the application, that the electronic document be encrypted using the data type key. 14. A method for decrypting a secure electronic document, the method comprising: identifying an electronic document to be unsecured for access by a requestor;determining a particular electronic document data type of the electronic document, wherein the electronic document and the electronic document data type are associated with an application;determining whether the requestor has permission to access the particular electronic document data type of the electronic document;obtaining a data type key associated with the electronic document data type when the determining determines that the requestor has permission to access electronic documents having the particular electronic document data type, wherein at least a data portion of the electronic document has been encrypted using the data type key according to a public key encryption algorithm, and wherein the encrypted electronic document is in a format accessible by the application;decrypting at least the data portion of the electronic document using at least the data type key upon determining that the requester has permission to access the particular electronic document data type of the electronic document; andproviding at least the unencrypted data portion to the requestor. 15. The method as recited in claim 14, wherein the electronic document data type provides a categorization of different types of electronic document content. 16. The method as recited in claim 14, wherein the secured electronic document includes the data portion and security information, the security information including a reference to the data type key in an encrypted or unencrypted manner. 17. The method as recited in claim 16, wherein the reference to the data type key within the security information is encrypted. 18. The method as recited in claim 14, wherein the decrypting is used to reverse an encryption hierarchy, and wherein the data type key is used in at least one level of the encryption hierarchy. 19. The method as recited in claim 14, wherein the obtaining further comprises obtaining at least one data type policy restriction. 20. The method as recited in claim 19, wherein the at least one data type policy restriction prevents usage of the data type key in specified circumstances. 21. The method as recited in claim 19, wherein the decrypting is prohibited when the at least one data type policy restriction is not satisfied. 22. The method as recited in claim 19, wherein the at least one data type policy restriction is specified by an administrative user. 23. The method as recited in claim 14, wherein the method further comprises: determining, prior to the providing, whether the secured electronic document has at least one data type policy restriction; andrequiring that the at least one data type policy restriction is satisfied before at least one of the obtaining, the decrypting, or the providing are performed. 24. The method as recited in claim 23, wherein the at least one data type policy restriction is a rule affiliated with the electronic document data type for the secured electronic document. 25. The method as recited in claim 14, wherein the unencrypted electronic document maintains the same length as the encrypted electronic document. 26. The method as recited in claim 14, wherein the electronic document is stored in an existing financial application database. 27. The method as recited in claim 14, wherein the decrypting further comprises: accessing the encrypted electronic document via the application; andautomatically requesting, by the application via a file system driver, that the electronic document be decrypted for use by the application. 28. A computer program product embodied in a non-transitory computer-readable storage medium having computer program logic recorded thereon enabling a hardware processor to secure an electronic document, said computer program code comprising: computer program code enabling a processor to obtain an electronic document to be secured;computer program code enabling the processor to determine a particular electronic document data type corresponding to the electronic document, wherein the electronic document and the electronic document data type are associated with an application;computer program code enabling the processor to obtain a data type key associated with the electronic document data type that has been determined;computer program code enabling the processor to encrypt at least a data portion of the electronic document using the data type key according to a public key encryption algorithm;computer program code enabling the processor to produce an encrypted document corresponding to the electronic document and store the encrypted document in an existing database, wherein the encrypted document is associated with the application and is in a format accessible by the application;wherein the data portion of the electronic document can be decrypted using the data type key upon determining that a requester has permission to access the particular electronic document data type of the electronic document.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.