WO2002001271A1 - Multiple encryption of a single document providing multiple level access privileges - Google Patents
Multiple encryption of a single document providing multiple level access privileges Download PDFInfo
- Publication number
- WO2002001271A1 WO2002001271A1 PCT/EP2001/007090 EP0107090W WO0201271A1 WO 2002001271 A1 WO2002001271 A1 WO 2002001271A1 EP 0107090 W EP0107090 W EP 0107090W WO 0201271 A1 WO0201271 A1 WO 0201271A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- key
- keys
- encrypted
- encrypting
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Multiple encryption of a single document providing multiple level access privileges BACKGROUND OF THE INVENTION FIELD OF THE INVENTION The invention relates to document encryption and access restrictions on documents and more particularly to the encryption of each portion of a document such that access rights to respective portions may be obtained with corresponding keys. BACKGROUND Various kinds of document access protection are known. In one example, EP 0 848 314 Al for DOCUMENT SECURITY SYSTEM AND METHOD only documents to which the user has rights are generated from a database. Varying security levels are provided. Another system described in US Patent No. 5,052,040 for MULTIPLE USER STORED DATA CRYPTOGRAPHIC LABELING SYSTEM AND METHOD permits different users to utilize the same files. The system exploits an extension of the file label which contains configuration capabilities and user rights and privileges. The separate user rights and privileges in this case relate to the entire document such as read only, read and write, deletion, etc. The document is encrypted. Another prior art system is described in US Patent No. 6,011,847 for CRYPTOGRAPHIC ACCESS AND LABELING SYSTEM. In this system, encryption and decryption of files uses a relational key generated by the system. A computer program also generates a series of labels that are encrypted and appended as a trailer to the encrypted message. The encrypted labels provide a history behind the particular encryption and they can be individually selected, separated, and decrypted from the total file. An access control module provides access to an encryption portion of the document to users with passphrases by comparing a generated vector or key with a partially decrypted version of a second vector or key stored on a portable storage medium such as a floppy disk. In response, a main key can be generated to encrypt or decrypt the labels. The latter system is mainly concerned with adding descriptive labels to the end of an encrypted document and contains a key exchange method for passing the decryption key between a server and a client. Other prior art systems and methods are known, but none contain a very convenient, robust, and straightforward method for encryption-protection of different parts of a document based on access privileges. SUMMARY OF THE INVENTION A method and system for selectively encrypting and decrypting different sections of a document provides different access levels in a technique employing different keys. The documents may be encrypted at a document section level ("section"here used according to its general meaning) and uses a different set of encryption keys for each section. A user A with an access level 1 may access only those sections encoded with access level 1 plus unencoded sections. An application example of this technique is in hospitals. A patients records may each be segmented into separately-encrypted portions giving access to nurses for only suitable material while giving broader access to doctors. Thus, this example illustrates access control to information contained inside a document based on pre-defined roles accepted within a specific environment. The nurse would be provided with an access level key based on the access control rules defined by the hospital. Such key would allow the nurse to gain access to those parts of the document for which nurses have rights. There could also be a level to which only the primary care physician or health care proxy has access. A method for distributing keys is also provided. This method utilizes a key box which is created for holding keys used to encode the sections of the document. The key box contains a slot for each level of access. The set of keys that a user at a given level requires is placed in a corresponding slot. Each slot is encoded using the access level public key giving the user access to the keys in the appropriate slot when decrypted using the user's private key. An additional feature provides an outer layer of encryption using a public key for a requesting organization. Once the requesting organization opens the document using its private key, anyone in the receiving organization can apply their access level private key (s) to the key box, which in turn applies the keys in the corresponding slot to the document. This allows each user to view/modify the parts of the document to which they have access rights. The invention will be described in connection with certain preferred embodiments, with reference to the following illustrative figures so that it may be more fully understood. The description of this invention uses the definition of public key to correspond to the public portion of the public/private key pair that is used in the art to realize asymmetric algorithms. The description of this invention uses the definition of private key to correspond to the private portion of the public/private key pair that is used in the art to realize asymmetric algorithms. The description of this invention uses the definition of symmetric key to refer to the a single key that is used in the art to realize symmetric algorithms. With reference to the figures, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of the preferred embodiments of the present invention only, and are presented in the cause of providing what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the invention. In this regard, no attempt is made to show structural details of the invention in more detail than is necessary for a fundamental understanding of the invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the invention may be embodied in practice. BRIEF DESCRIPTION OF THE DRAWING Fig. 1 is an illustration of a computer environment in which the invention may be used. Fig. 2A is an illustration of a document indicating separate sections and the encryption processes to be applied to each section according to first embodiment of the invention in which public keys are used for encryption. Fig. 2B is an illustration of a document indicating separate sections and the encryption processes to be applied to each section according to second embodiment of the invention in which public keys are used for encryption. Fig. 3 is an illustration of a document indicating separate sections and the encryption processes to be applied to each section according to third embodiment of the invention in which document-specific keys are used. Fig. 4 is an illustration of a key box document used with the embodiment of Fig. 3. Fig. 5 is an illustration of a process for encrypting a document according to an embodiment compatible with any of the foregoing embodiments. Fig. 6 is an illustration of a process for encrypting a document according to an embodiment compatible with any of the foregoing embodiments. Fig. 7 is an alternative way of packaging the key box in a transmission by including it within a single document. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Referring to Fig. 1, the invention may be used in the environment of electronic document transfer. An example of such an environment is a sending computer 110 and a receiving computer 120 connected by a network 100 or simply by physical transfer of a nonvolatile data store 90 such as a floppy disk. Referring to Fig. 2A, a document 95 contains various sections 130,135,140, and 145. Each section is divided according to how the information contained in the section is desired to be made available to a particular person (organization or other entity) or class of persons. The document 95 is intended to be transferred by the sender 110 to the receiver 120, the receiver including each of the persons or classes of persons. The sections labeled 130 and 145 are encrypted with a public key LI corresponding to the first user or class of users. The section labeled 135 is encrypted with a second public key L2 corresponding to the second user or class of users. By virtue of being embedded in the section 135, section 145 is also encrypted with the L2 public key. Referring to Fig. 2B, the various sections may be encrypted with only one key or all keys from the access level to which they correspond down to the lowest level of access. Thus, in this example, document section 145 is encrypted with both the LI and L2 keys, but so is document section 130. Alternatively, each section may be encrypted with only a single key, so that a level 1 section appearing in a level 2 section is simply treated as a completely separate section with the level 2 section being broken into separate subsections for L2 encryption. The encryption methods described above permit multilevel access to a document based on the public keys of the intended audience. It is possible to limit access based on the user as well as the particular document as shown in the next embodiment. Referring now to Figs. 3 and 4, the document sections are encrypted with respective document keys, a respective one for each access level defined within the scope of the document. The document keys may be symmetric keys. The latter are not shared outside of the context of use of the document and the user need never directly know what the symmetric keys are. These document keys are then made available to the recipients by encrypting them into a separate document (which could be part of the original document as in a file header as illustrated in Fig. 7) called a key box. The key box has a slot corresponding to each access level defined within the scope of the organization that is requesting such document. A first slot 1 210 contains document keys for access levels 1 and 2 giving the user access to both levels. A second slot 1 215 contains document keys for access level 2. Each slot is encrypted using the public key of the organization that corresponds to the access level of the slot. The entire key box file and the document may be encrypted using the public key of the user to ensure confidentiality of the transmission of the document and the key box. Additionally, the key box and the document may be signed by the sender 110 to ensure integrity of the transmission and authenticity of the document. The preceding embodiment contemplates an agreement between the sender of the document who prepares the encryption and the organization receiving the document. This agreement would map access levels used in encrypting the document to the access levels in place at the receiver. For a given document, a given organization level may map to a single document access level. Alternatively, a given organization level may map to multiple document access level. Preferably, to assure data integrity and non-repudiation, the document source may sign the document hash with a private key. The requestor receiving the document together with the signature can then vouch for the validity of the source. Other mechanisms for authenticating the document's contents may also be used. When a person with access level N opens the document, he/she presents his/her organization access level private key, which corresponds to the asymmetric key pair, to a decryption process that uses the key to access the appropriate slot in the key box. The symmetric keys may be used by the process to access the appropriate levels of the document transparently to the user. The user never"handles"the symmetric document keys and simply accesses the portions of the document the user has permission to access. Referring now to Fig. 5, the detailed steps for creating, sending, receiving, and using a document begin with the receipt of a request S 10 for the document and the appropriate information such as the public keys of the users, a map of users to access levels, etc. Next, a key is created for each access level required S20. The document is then encrypted starting with the highest (most privileged) access level and going down S30. This may result in the layered encryption of either of Figs. 2A and 2B or the alternative process where each level is only encrypted once. The keys are formed into a key box document and each set separately encrypted using the public keys of the access levels S45. Then the document and key box are bundled and optionally encrypted using the public key of the receiver S55. When the receiver receives the file containing the encrypted document and the key box, the package is unbundled and optionally decrypted S60. The document and key box are then made available to the users S70. When a user accesses the document, the user provides his/her organization access level private key to a decryption process on a receiving computer (e. g. 120) which uses the key to decrypt the appropriate slot of the key box S75. The process then applies the symmetric keys, obtained from the decrypted slot in the key box, S80 to the document to allow the user to access the document S85. The user never directly accesses the symmetric access level keys or even concerns him/herself with how many keys are involved. Referring to Fig. 6, in an alternative embodiment, the public keys of the receivers are not used to encrypt the document. Rather step S45 is skipped and the key box is simply encrypted using the organization's public key. At the receiving organization, an additional step S90 between S65 and S70 is added wherein the slots of the key box are mapped to the access levels present in the organization and encrypted with the appropriate public keys of the users or group of users. It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01945301A EP1374009A2 (en) | 2000-06-29 | 2001-06-22 | Multiple encryption of a single document providing multiple level access privileges |
KR1020027002578A KR20020041809A (en) | 2000-06-29 | 2001-06-22 | Multiple encryption of a single document providing multiple level access privileges |
JP2002506149A JP2004502379A (en) | 2000-06-29 | 2001-06-22 | Multi-encryption of a single document granting multi-level access privileges |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US60633900A | 2000-06-29 | 2000-06-29 |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2002001271A1 true WO2002001271A1 (en) | 2002-01-03 |
WO2002001271A8 WO2002001271A8 (en) | 2002-02-07 |
WO2002001271A3 WO2002001271A3 (en) | 2003-10-02 |
Family
ID=24427575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2001/007090 WO2002001271A1 (en) | 2000-06-29 | 2001-06-22 | Multiple encryption of a single document providing multiple level access privileges |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1374009A2 (en) |
JP (1) | JP2004502379A (en) |
KR (1) | KR20020041809A (en) |
CN (1) | CN1471661A (en) |
WO (1) | WO2002001271A1 (en) |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1513075A2 (en) * | 2003-06-11 | 2005-03-09 | Microsoft Corporation | Method and apparatus for protecting regions of an electronic document |
WO2006047368A1 (en) * | 2004-10-22 | 2006-05-04 | Hewlett-Packard Development Company, L.P. | Systems and methods for multiple level control of access privileges to protected media content |
EP1669905A2 (en) * | 2004-12-09 | 2006-06-14 | Microsoft Corporation | System and Method for Restricting User Access to a Network Document |
GB2428546A (en) * | 2005-07-20 | 2007-01-31 | Lars Olaf Kanngard | Secure e-commerce wherein a string of transaction data is segmented and each segment individually encrypted for its intended recipient |
WO2007025998A2 (en) * | 2005-08-31 | 2007-03-08 | Nokia Siemens Networks Gmbh & Co. Kg | Method and system for resource encryption and decryption |
EP1865651A1 (en) * | 2006-06-08 | 2007-12-12 | Novell, Inc. | Cooperative encoding data by pluralities of parties |
WO2008003886A1 (en) * | 2006-07-06 | 2008-01-10 | France Telecom | Electronic module for storing data |
US7484107B2 (en) * | 2004-04-15 | 2009-01-27 | International Business Machines Corporation | Method for selective encryption within documents |
EP2033066A2 (en) * | 2006-05-31 | 2009-03-11 | Storwize Ltd. | Method and system for transformation of logical data objects for storage |
US20090112868A1 (en) * | 2007-10-25 | 2009-04-30 | Nithya Rajamani | Real-Time Interactive Authorization for Enterprise Search |
EP2093995A1 (en) * | 2008-02-21 | 2009-08-26 | Fujitsu Limited | Image encryption apparatus and image decryption apparatus |
GB2467580A (en) * | 2009-02-06 | 2010-08-11 | Thales Holdings Uk Plc | Secure container with multiple elements encrypted with different keys derived from access rules, said rules included in container metadata |
US7870386B2 (en) | 2004-04-29 | 2011-01-11 | International Business Machines Corporation | Method for permanent decryption of selected sections of an encrypted document |
US7889858B2 (en) | 2004-01-12 | 2011-02-15 | International Business Machines Corporation | Method and system for telephone wait user interface selection |
US8140857B2 (en) | 2003-10-23 | 2012-03-20 | International Business Machines Corporation | Method for selective encryption within documents |
US20130054636A1 (en) * | 2011-08-30 | 2013-02-28 | Ding-Yuan Tang | Document Journaling |
GB2494498A (en) * | 2011-08-04 | 2013-03-13 | Ibm | Handling defined areas within an electronic document to preserve integrity and context |
GB2472491B (en) * | 2009-02-06 | 2013-09-18 | Thales Holdings Uk Plc | System and method for multilevel secure object management |
US8769311B2 (en) | 2006-05-31 | 2014-07-01 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
WO2014149799A1 (en) * | 2013-03-15 | 2014-09-25 | Mcafee, Inc. | A multi-ring encryption approach to securing a payload using hardware modules |
US9015159B1 (en) * | 2002-03-29 | 2015-04-21 | Google Inc. | Method for searching media |
EP2863332A1 (en) * | 2013-10-15 | 2015-04-22 | One Drop Diagnostics Sàrl | System and method for controlling access to analytical results of a diagnostic test assay |
US9081953B2 (en) | 2012-07-17 | 2015-07-14 | Oracle International Corporation | Defense against search engine tracking |
USRE45952E1 (en) | 2002-03-29 | 2016-03-29 | Google Inc. | Method for searching media |
WO2016109588A1 (en) * | 2014-12-29 | 2016-07-07 | F16Apps, Inc. | Tiered access control |
US9633215B2 (en) | 2010-09-21 | 2017-04-25 | Hewlett-Packard Development Company, L.P. | Application of differential policies to at least one digital document |
GB2552522A (en) * | 2016-07-27 | 2018-01-31 | Scram Software Pty Ltd | Method and system for encrypting files and storing the encrypted files in a storage file system |
US10068099B1 (en) * | 2018-01-19 | 2018-09-04 | Griffin Group Global, LLC | System and method for providing a data structure having different-scheme-derived portions |
US10078759B1 (en) * | 2018-01-19 | 2018-09-18 | Griffin Group Global, LLC | System and method for data sharing via a data structure having different-scheme-derived portions |
AU2018200199B2 (en) * | 2015-03-03 | 2019-04-04 | Wonderhealth LLC. | Access control for encrypted data |
US10380379B2 (en) | 2015-03-03 | 2019-08-13 | WonderHealth, LLC | Selectively encrypting and displaying machine-readable identifiers in a device lock screen |
US10387577B2 (en) | 2015-03-03 | 2019-08-20 | WonderHealth, LLC | Secure data translation using machine-readable identifiers |
WO2023241879A1 (en) * | 2022-06-13 | 2023-12-21 | International Business Machines Corporation | Protecting sensitive data dump information |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4928117B2 (en) * | 2005-11-10 | 2012-05-09 | キヤノン株式会社 | Image processing apparatus, image management method, document management apparatus, document management method, computer program, and computer-readable storage medium |
US8887297B2 (en) | 2007-07-13 | 2014-11-11 | Microsoft Corporation | Creating and validating cryptographically secured documents |
JP2010157013A (en) * | 2008-12-26 | 2010-07-15 | Ricoh Co Ltd | Security setting device, security setting processing method, security release processing method, document sharing system, program, and recording medium |
KR102376506B1 (en) | 2014-10-20 | 2022-03-18 | 삼성전자주식회사 | Encryptor/decryptor, electronic apparatus including encryptor/decryptor and operation method of encryptor/decryptor |
US11449677B2 (en) | 2018-10-18 | 2022-09-20 | International Business Machines Corporation | Cognitive hierarchical content distribution |
CN111739190B (en) * | 2020-05-27 | 2022-09-20 | 深圳市元征科技股份有限公司 | Vehicle diagnostic file encryption method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
WO1997025798A1 (en) * | 1996-01-11 | 1997-07-17 | Mrj, Inc. | System for controlling access and distribution of digital property |
US5677953A (en) * | 1993-09-14 | 1997-10-14 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5953419A (en) * | 1996-05-06 | 1999-09-14 | Symantec Corporation | Cryptographic file labeling system for supporting secured access by multiple users |
-
2001
- 2001-06-22 KR KR1020027002578A patent/KR20020041809A/en not_active Application Discontinuation
- 2001-06-22 EP EP01945301A patent/EP1374009A2/en not_active Withdrawn
- 2001-06-22 JP JP2002506149A patent/JP2004502379A/en active Pending
- 2001-06-22 CN CNA018025439A patent/CN1471661A/en active Pending
- 2001-06-22 WO PCT/EP2001/007090 patent/WO2002001271A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5677953A (en) * | 1993-09-14 | 1997-10-14 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
WO1997025798A1 (en) * | 1996-01-11 | 1997-07-17 | Mrj, Inc. | System for controlling access and distribution of digital property |
US5953419A (en) * | 1996-05-06 | 1999-09-14 | Symantec Corporation | Cryptographic file labeling system for supporting secured access by multiple users |
Non-Patent Citations (2)
Title |
---|
"MULTIMEDIA MIXED OBJECT ENVELOPES SUPORTING A GRADUATED FEE SCHEME VIA ENCRYPTION", IBM TECHNICAL DISCLOSURE BULLETIN, IBM CORP. NEW YORK, US, vol. 37, no. 3, 1 March 1994 (1994-03-01), pages 413 - 417, XP000441522, ISSN: 0018-8689 * |
LOTUS DEVELOPMENT CORPORATION: "Inside Notes: The Architecture of Notes and the Domino Server", INTERNET, 19 April 2002 (2002-04-19), XP002195279, Retrieved from the Internet <URL:https://doc.notes.net/uafiles.nsf/docs/inside-notes/$File/insidenotes.pdf> [retrieved on 20030129] * |
Cited By (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9684676B1 (en) | 2002-03-29 | 2017-06-20 | Google Inc. | Method for searching media |
US9015159B1 (en) * | 2002-03-29 | 2015-04-21 | Google Inc. | Method for searching media |
USRE45952E1 (en) | 2002-03-29 | 2016-03-29 | Google Inc. | Method for searching media |
EP1513075A2 (en) * | 2003-06-11 | 2005-03-09 | Microsoft Corporation | Method and apparatus for protecting regions of an electronic document |
US9256753B2 (en) | 2003-06-11 | 2016-02-09 | Microsoft Technology Licensing, Llc | Method and apparatus for protecting regions of an electronic document |
EP1513075A3 (en) * | 2003-06-11 | 2007-12-26 | Microsoft Corporation | Method and apparatus for protecting regions of an electronic document |
US10528747B2 (en) | 2003-06-11 | 2020-01-07 | Microsoft Technology Licensing, Llc | Method and apparatus for protecting regions of an electronic document |
US8140857B2 (en) | 2003-10-23 | 2012-03-20 | International Business Machines Corporation | Method for selective encryption within documents |
US8364980B2 (en) | 2003-10-23 | 2013-01-29 | International Business Machines Corporation | System for selective encryption within documents |
US8683223B2 (en) | 2003-10-23 | 2014-03-25 | International Business Machines Corporation | Selective encryption within documents |
US7889858B2 (en) | 2004-01-12 | 2011-02-15 | International Business Machines Corporation | Method and system for telephone wait user interface selection |
US7484107B2 (en) * | 2004-04-15 | 2009-01-27 | International Business Machines Corporation | Method for selective encryption within documents |
US7917771B2 (en) | 2004-04-15 | 2011-03-29 | International Business Machines Corporation | Method for selective encryption within documents |
US7986776B2 (en) | 2004-04-15 | 2011-07-26 | International Business Machines Corporation | Method and system for telephone wait user interface selection |
US7870386B2 (en) | 2004-04-29 | 2011-01-11 | International Business Machines Corporation | Method for permanent decryption of selected sections of an encrypted document |
WO2006047368A1 (en) * | 2004-10-22 | 2006-05-04 | Hewlett-Packard Development Company, L.P. | Systems and methods for multiple level control of access privileges to protected media content |
US7958369B2 (en) | 2004-10-22 | 2011-06-07 | Hewlett-Packard Development Company, L.P. | Systems and methods for multiple level control of access of privileges to protected media content |
US7533420B2 (en) | 2004-12-09 | 2009-05-12 | Microsoft Corporation | System and method for restricting user access to a network document |
EP1669905A2 (en) * | 2004-12-09 | 2006-06-14 | Microsoft Corporation | System and Method for Restricting User Access to a Network Document |
EP1669905A3 (en) * | 2004-12-09 | 2007-08-01 | Microsoft Corporation | System and Method for Restricting User Access to a Network Document |
GB2428546A (en) * | 2005-07-20 | 2007-01-31 | Lars Olaf Kanngard | Secure e-commerce wherein a string of transaction data is segmented and each segment individually encrypted for its intended recipient |
WO2007025998A2 (en) * | 2005-08-31 | 2007-03-08 | Nokia Siemens Networks Gmbh & Co. Kg | Method and system for resource encryption and decryption |
WO2007025998A3 (en) * | 2005-08-31 | 2007-10-04 | Nokia Siemens Networks Gmbh | Method and system for resource encryption and decryption |
US8954403B2 (en) | 2006-05-31 | 2015-02-10 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9110913B2 (en) | 2006-05-31 | 2015-08-18 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US10380071B2 (en) | 2006-05-31 | 2019-08-13 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US10372680B2 (en) | 2006-05-31 | 2019-08-06 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US10268696B2 (en) | 2006-05-31 | 2019-04-23 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9479616B2 (en) | 2006-05-31 | 2016-10-25 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9367555B2 (en) | 2006-05-31 | 2016-06-14 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8626726B2 (en) | 2006-05-31 | 2014-01-07 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US9323773B2 (en) | 2006-05-31 | 2016-04-26 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9317516B2 (en) | 2006-05-31 | 2016-04-19 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9311320B2 (en) | 2006-05-31 | 2016-04-12 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8769311B2 (en) | 2006-05-31 | 2014-07-01 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8782436B2 (en) | 2006-05-31 | 2014-07-15 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US8788467B2 (en) | 2006-05-31 | 2014-07-22 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8793510B2 (en) | 2006-05-31 | 2014-07-29 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8819454B2 (en) | 2006-05-31 | 2014-08-26 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8832043B2 (en) | 2006-05-31 | 2014-09-09 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US9262427B2 (en) | 2006-05-31 | 2016-02-16 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8868930B2 (en) | 2006-05-31 | 2014-10-21 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8924367B2 (en) | 2006-05-31 | 2014-12-30 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US8930329B2 (en) | 2006-05-31 | 2015-01-06 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
EP2033066A2 (en) * | 2006-05-31 | 2009-03-11 | Storwize Ltd. | Method and system for transformation of logical data objects for storage |
US9251158B2 (en) | 2006-05-31 | 2016-02-02 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8954756B2 (en) | 2006-05-31 | 2015-02-10 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8959064B2 (en) | 2006-05-31 | 2015-02-17 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8958482B2 (en) | 2006-05-31 | 2015-02-17 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9218355B2 (en) | 2006-05-31 | 2015-12-22 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9218297B2 (en) | 2006-05-31 | 2015-12-22 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9176976B2 (en) | 2006-05-31 | 2015-11-03 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US9176975B2 (en) | 2006-05-31 | 2015-11-03 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
EP2033066A4 (en) * | 2006-05-31 | 2012-08-15 | Ibm | Method and system for transformation of logical data objects for storage |
US9104688B2 (en) | 2006-05-31 | 2015-08-11 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8750496B2 (en) | 2006-06-08 | 2014-06-10 | Oracle International Corporation | Cooperative encoding of data by pluralities of parties |
EP1865651A1 (en) * | 2006-06-08 | 2007-12-12 | Novell, Inc. | Cooperative encoding data by pluralities of parties |
US7940926B2 (en) | 2006-06-08 | 2011-05-10 | Novell, Inc. | Cooperative encoding of data by pluralities of parties |
WO2008003886A1 (en) * | 2006-07-06 | 2008-01-10 | France Telecom | Electronic module for storing data |
FR2903509A1 (en) * | 2006-07-06 | 2008-01-11 | France Telecom | ELECTRONIC MODULE FOR STORING DATA |
US9020913B2 (en) * | 2007-10-25 | 2015-04-28 | International Business Machines Corporation | Real-time interactive authorization for enterprise search |
US20090112868A1 (en) * | 2007-10-25 | 2009-04-30 | Nithya Rajamani | Real-Time Interactive Authorization for Enterprise Search |
EP2093995A1 (en) * | 2008-02-21 | 2009-08-26 | Fujitsu Limited | Image encryption apparatus and image decryption apparatus |
GB2467580B (en) * | 2009-02-06 | 2013-06-12 | Thales Holdings Uk Plc | System and method for multilevel secure object management |
US8683602B2 (en) | 2009-02-06 | 2014-03-25 | Thales Holdings Uk Plc | System and method for multilevel secure object management |
GB2467580A (en) * | 2009-02-06 | 2010-08-11 | Thales Holdings Uk Plc | Secure container with multiple elements encrypted with different keys derived from access rules, said rules included in container metadata |
GB2472491B (en) * | 2009-02-06 | 2013-09-18 | Thales Holdings Uk Plc | System and method for multilevel secure object management |
US9633215B2 (en) | 2010-09-21 | 2017-04-25 | Hewlett-Packard Development Company, L.P. | Application of differential policies to at least one digital document |
US8959344B2 (en) | 2011-08-04 | 2015-02-17 | International Business Machines Corporation | Method and system for handling defined areas within an electronic document |
GB2494498A (en) * | 2011-08-04 | 2013-03-13 | Ibm | Handling defined areas within an electronic document to preserve integrity and context |
US8935265B2 (en) * | 2011-08-30 | 2015-01-13 | Abbyy Development Llc | Document journaling |
US20130054636A1 (en) * | 2011-08-30 | 2013-02-28 | Ding-Yuan Tang | Document Journaling |
US9740881B2 (en) | 2012-07-17 | 2017-08-22 | Oracle International Corporation | Defense against search engine tracking |
US9081953B2 (en) | 2012-07-17 | 2015-07-14 | Oracle International Corporation | Defense against search engine tracking |
US9305172B2 (en) | 2013-03-15 | 2016-04-05 | Mcafee, Inc. | Multi-ring encryption approach to securing a payload using hardware modules |
US9860240B2 (en) | 2013-03-15 | 2018-01-02 | Mcafee, Llc | Multi-ring encryption approach to securing a payload using hardware modules |
WO2014149799A1 (en) * | 2013-03-15 | 2014-09-25 | Mcafee, Inc. | A multi-ring encryption approach to securing a payload using hardware modules |
US10380376B2 (en) | 2013-10-15 | 2019-08-13 | One Drop Diagnostics Sàrl | System and method for protecting and controlling access to analytical results of a diagnostic test assay |
WO2015055738A1 (en) * | 2013-10-15 | 2015-04-23 | One Drop Diagnostics Sàrl | System and method for protecting and controlling access to analytical results of a diagnostic test assay |
EP2863332A1 (en) * | 2013-10-15 | 2015-04-22 | One Drop Diagnostics Sàrl | System and method for controlling access to analytical results of a diagnostic test assay |
WO2016109588A1 (en) * | 2014-12-29 | 2016-07-07 | F16Apps, Inc. | Tiered access control |
AU2018200199B2 (en) * | 2015-03-03 | 2019-04-04 | Wonderhealth LLC. | Access control for encrypted data |
US10380379B2 (en) | 2015-03-03 | 2019-08-13 | WonderHealth, LLC | Selectively encrypting and displaying machine-readable identifiers in a device lock screen |
US10387577B2 (en) | 2015-03-03 | 2019-08-20 | WonderHealth, LLC | Secure data translation using machine-readable identifiers |
US10977532B2 (en) | 2015-03-03 | 2021-04-13 | WonderHealth, LLC | Access control for encrypted data in machine-readable identifiers |
US11301737B2 (en) | 2015-03-03 | 2022-04-12 | Wonderhealth, Llc. | Access control for encrypted data in machine-readable identifiers |
US11948029B2 (en) | 2015-03-03 | 2024-04-02 | WonderHealth, LLC | Access control for encrypted data in machine-readable identifiers |
GB2552522A (en) * | 2016-07-27 | 2018-01-31 | Scram Software Pty Ltd | Method and system for encrypting files and storing the encrypted files in a storage file system |
US10078759B1 (en) * | 2018-01-19 | 2018-09-18 | Griffin Group Global, LLC | System and method for data sharing via a data structure having different-scheme-derived portions |
US10068099B1 (en) * | 2018-01-19 | 2018-09-04 | Griffin Group Global, LLC | System and method for providing a data structure having different-scheme-derived portions |
WO2023241879A1 (en) * | 2022-06-13 | 2023-12-21 | International Business Machines Corporation | Protecting sensitive data dump information |
Also Published As
Publication number | Publication date |
---|---|
CN1471661A (en) | 2004-01-28 |
JP2004502379A (en) | 2004-01-22 |
EP1374009A2 (en) | 2004-01-02 |
WO2002001271A8 (en) | 2002-02-07 |
KR20020041809A (en) | 2002-06-03 |
WO2002001271A3 (en) | 2003-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002001271A1 (en) | Multiple encryption of a single document providing multiple level access privileges | |
US11664984B2 (en) | Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content | |
US11868447B2 (en) | Method and system for secure distribution of selected content to be protected | |
KR102111141B1 (en) | Medical data service method and system based on block chain technology | |
Benaloh et al. | Patient controlled encryption: ensuring privacy of electronic medical records | |
Narayan et al. | Privacy preserving EHR system using attribute-based infrastructure | |
US8619982B2 (en) | Method and system for secure distribution of selected content to be protected on an appliance specific basis | |
US7313694B2 (en) | Secure file access control via directory encryption | |
US20050172123A1 (en) | System and method for secure storage, transfer and retrieval of content addressable information | |
US20070180259A1 (en) | Secure Personal Medical Process | |
US20060288210A1 (en) | System of personal data spaces and a method of governing access to personal data spaces | |
JP2002501250A (en) | Protected database management system for sensitive records | |
EP1929423A2 (en) | Cryptographic role-based access control | |
KR20060052219A (en) | Contents encryption method, system and method for providing contents through network using the encryption method | |
KR20020067663A (en) | Data distribution system | |
US20100235924A1 (en) | Secure Personal Medical Process | |
Biget | The vault, an architecture for smartcards to gain infinite memory | |
Petković et al. | Cryptographically enforced personalized role-based access control | |
JP2007080145A (en) | Data management system, data processing method and data processing program | |
Kayem | On monitoring information flow of outsourced data | |
Awrangjeb et al. | A hierarchical security solution for medical image transmissions | |
JP2002083046A (en) | Method and apparatus for managing medical data | |
Server | 2. DESIGN GOALS AND SYSTEM ARCHITECTURE OF PCMHoDC | |
JP2002157436A (en) | Document distribution method | |
AU2002217630A1 (en) | System of databases of personal data and a method of governing access to databases of personal data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
AK | Designated states |
Kind code of ref document: C1 Designated state(s): CN JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: C1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
CFP | Corrected version of a pamphlet front page | ||
CR1 | Correction of entry in section i |
Free format text: PAT. BUL. 01/2002 REPLACE "A1" BY "A2" AND UNDER "PUBLISHED", REPLACE "WITH INTERNATIONAL SEARCH REPORT" BY "WITHOUT INTERNATIONAL SEARCH REPORT" |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1020027002578 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018025439 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 1020027002578 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001945301 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001945301 Country of ref document: EP |