EP1532505A2 - Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle privee - Google Patents
Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle priveeInfo
- Publication number
- EP1532505A2 EP1532505A2 EP03744450A EP03744450A EP1532505A2 EP 1532505 A2 EP1532505 A2 EP 1532505A2 EP 03744450 A EP03744450 A EP 03744450A EP 03744450 A EP03744450 A EP 03744450A EP 1532505 A2 EP1532505 A2 EP 1532505A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- document
- access
- file
- data
- policy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Definitions
- the present invention relates to security in computing systems, and particularly although not exclusively, to a method and apparatus for controlling access to documents and/ or data in database.
- nCipher www . nCipher . com
- JVM Java Virtual Machine
- the nCipher tamper proof cryptographic box can be applied to various cryptographic services.
- the nCipher system is intended to restrict the keys usage by enforcing a strict API.
- a time stamp service is disclosed, which also discloses controlling how, when and where a private key can be used.
- WO 00/122650 discloses a server side implementation of a cryptographic system. The system disclosed is concerned with making a server a control point, and dealing with private key usage.
- WO 01/22242 discloses a data providing system and method. This system o describes delivery of media data together with policy information determining who can view the media data. Both policy and content data are encrypted, and policy data is decrypted by an end point which will only decrypt content data if the policy is satisfied.
- WO 0152471 discloses a black box for digital rights management system. o The black box is used to enforce rights to a document.
- a document management service comprising: receiving a document; receiving an access policy data describing an access policy applicable to said received document; encrypting said document; signing said access policy data with a digital signature of a secure device.
- Fig. 1 illustrates schematically a prior art system for accessing encrypted documents
- Fig 2. illustrates schematically a first system for secure storage of documents which are remotely accessible, and in which access policy enforcement and key management are applied by a stand alone computer entity device according to a first specific implementation
- Fig 3. illustrates schematically an architecture and components of a policy enforcement and key management device according to a second specific implementation
- Fig 4. illustrates schematically an overall method of operation of the system of Fig. 3;
- Fig. 5 illustrates schematically by way of process steps, an overall operation of the system of Fig. 2;
- Fig. 6 illustrates schematically operation of the policy enforcement and key management device of Fig.3 in a specific mode of operation for encrypting a document and using an envelope file for passing back to a web server device for storage in a database;
- Fig. 7 illustrates schematically a specific mode of operation of the policy enforcement and key data management device of Fig.3 for enforcing a specific example of an access policy data attached to an encrypted document;
- Fig. 8 illustrates schematically a method for re-enveloping a decrypted document prior to sending to an authorized recipient
- Fig 9. illustrates schematically a second system, according to a second specific implementation, for storage and management of e-mails, in which access policy enforcement and key management are controlled by a stand alone policy enforcement and key management device;
- Fig. 10 illustrates schematically an example of an access policy data attaching to an e-mail document in the system of Fig 9.
- Entities when generally used is to be taken as including any type of entity which is capable of sending or receiving documents and includes computer devices, corporate bodies, governmental organizations, intergovernmental organizations, legal persons and natural persons. Entities as referred to in this specification may have identities, as evidenced by digital certificates issued to those entities.
- computer entity is used to refer to a device having data processing capability and memory, and electronic communications ability for communicating with other computer entities.
- a computer entity may be owned by, be operated by or represent an entity as described in the preceding paragraph.
- Specific implementations herein enable management of access control to encrypted documents by using control points and trusted third parties to tightly couple policy enforcement with usage of one or more private keys required to decrypt a document.
- a user submits a document together with policies for management of that document for retrieval to a control point.
- the control point returns a signed version of the policy and an encrypted and/or enveloped version of the document.
- the control point only decrypts or releases the document provided that an accompanying signed and trusted policy requirement has been satisfied.
- control point and/or trusted third party can be designed to be stateless, which enables the control point to be delivered as a tamper proof cryptographic box. This in turn means that the access control service can be used in a scalable way to manage complex access control issues. It also enables increased confidentially from the third party.
- an evaluatable policy is bound with a decryption key usage, in a secure hardware device.
- a solution is disclosed whereby a single control point, which could be a third party run service, is used to authenticate and/or validate an access policy, and to encrypt and decrypt a document.
- the solution uses asymmetric cryptography, specifically a private key to enforce both encryption and decryption, and authentication and validation of the access policy.
- the service can be designed to be stateless, so that it can be delivered via a tamper proof cryptographic box. This makes manufacture and distribution of such control points much more flexible and so aids the scalability of the solutions disclosed. It also ensures that a service provider does not have access to the documents, or even access to requests for access to documents. This is an added benefit for increasing confidentiality.
- a cryptographic box device is given a document and a policy concerning access rights to that document.
- the cryptographic device signs the policy, encrypts and/or envelopes the document, and returns both the encrypted/enveloped document and the signed policy back to a user or a users application.
- the user application stores the returned data and destroys the original document. From then on, the only way to recover the document is to pass the returned encrypted/enveloped data together with the appropriate authentication information back to the cryptographic box.
- the box does not need to hold any state with respect to these transactions. That is to say, the control point device does not need to remember or store any information regarding a document which the device has encrypted, or an access policy which the device has signed, and can "forget" about the document and policy.
- the device does however, need to maintain a state with respect to its own identity, that is , to store its own digital certificate and public and private.
- the device does however need a way to interpret and validate the authentication information.
- this is achieved by configuring the box to trust specific identified service providers, by including the public key of such providers in a "trusted provider" table, which will validate authentication information against a policy statements, and will sign, in a manner verifiable by the box, that it has checked it.
- the service and/or cryptographic box could have a relationship with a number of credentials providers and/or time stamp authorities, so that it can directly cross check the authentication information with the policy and form judgements by itself.
- a protocol is used to manufacture a set of such boxes with a same private key (which may in itself enhance scalability), or to escrow the key.
- XML can be used as an underlying format, to tie together the document, policy and authentication information at various points in the system.
- a third party document management service may assure customer confidentiality of stored documents by encrypting them. Each document is likely to have a unique access rights based on the policies of many customer corporations.
- An example of an access policy maybe: i) access only allowed after a particular date, for example January 22 2002;
- a request has credentials from a specified company X showing that 5 they have purchasing rights, or that they are from a second specified company Y and have selling rights;
- the request is audited by a third company Z.
- the policy and the document are passed to a cryptographic box which, in the case of the standard PKI model, encrypts the document and signs the policy information.
- the service may also destroy the original document, so that the only way to recover the original document is to submit the document with its signed 5 policy as part of the document, together with authentication information, which will satisfy the policy requirements. For example for the above case;
- the service has access to a trusted clock, so that the service can verify the time conditions; 0
- a request for decryption could also contain a public key of an intended recipient, so that the cryptographic box can re-envelope the o documents specifically for that user.
- FIG. 1 there is illustrated schematically one example of a prior art system for storage of encrypted documents which are remotely accessible.
- a web server 100 which has an associated database 101, is accessed by a user computer 102 over communications network 103 for example the internet.
- the user accesses the web server via a known portal, and web browser software.
- a plurality of electronic data records stored in the database are each encrypted.
- the documents have to be decrypted before they are sent to the user.
- access control policies need to be enforced, so that the data documents are only recoverable by authorised users.
- the user logs into the web server, using a browser, and makes a request to view a document.
- the web server 100 needs to determine that the user is an authorised user, before releasing a document, and needs to decrypt that document, or allow the user to decrypt the document, so that the user can read the content of the document.
- the point at which the point at which the proof of the user is determined is within the web server 100. This is in a different position, to the place where encryption keys are stored.
- FIG. 2 there is illustrated schematically a system for secure storage of documents, which are remotely accessible which operates by ensuring policy enforcement before allowing usage of a private key according to a specific implementation.
- the system comprises a user computer entity 200 having a known web browser, through which a user can access web sites; a web server computer 201 , the web server computer running a web site application; a database 202, the database storing encrypted data files, and communicating directly with the web server computer over a secure channel; a third party credential provider 203, for providing digital certificates identifying computer entities; and an enforcement and key management apparatus 204 for ensuring enforcement of policies for allowing access to encrypted documents, and for providing key management, allowing access to decryption capability for decrypting encrypted documents stored in the database 202.
- the device comprises a secure tamper proof casing 300 containing a power supply unit 301 ; a central processing unit 302 in the form of a known data processor device; and a plurality of firmware modules comprising a tamper detection module 303 for detecting whether the device has been tampered with; a policy engine 304 for enforcing data control policies for accessing data, an identity module 305 comprising means for generating one or a plurality of private keys, one or a plurality of public keys, and a digital certificate identifying the device; a secure timer device 306 capable of maintaining a device time; a trust list 307 comprising a list of pre-stored addresses of trusted computer entities with which the device can communicate; a communications port 308; and an internal bus 309 linking the components.
- both policy enforcement and protection of encryption keys is carried out by a single computer entity, the policy enforcement and key management device 300, for allowing access of users to the electronic database 202 storing encrypted documents.
- the policy enforcement and key management device provides a single control point for controlling access to encrypted data records stored in a database.
- the control point may be provided as a service to an operator of a web server computer 201 , or may be provided as a bought item, which an operator of the web server computer purchases, and links to their web server computer to provide access to that web server computer.
- FIG. 4 there is illustrated schematically a logical diagram showing policy enforcement and access control according to a specific method.
- a user 400 operator user computer entity 401 comprising a conventional web browser, which, via an internet portal 402, provided by an internet service provider, contacts a web server computer 403, with an identity of the user 400 being router through a single control point 404, provided by a policy enforcement and key management device as described with reference to Figs. 2 & 3 herein.
- a request to see a particular document stored in database 405 is made by the user 400 in order to access that document, a policy 406 is in force, specifying for example, that the user 400 needs to prove their identity prior to accessing the document, for example, where encrypted document stored in the database 405 are confidential patient health records, the policy 406 may specify that only qualified doctors may access those confidential patient health records. Therefore, in order to access the document, the user 400 needs to prove that they are a doctor, enforcement of the policy 406 is carried out at the control point 404, by establishing the identity of the user.
- the policy may be contained locally at the web server computer entity, enforcement of the policy is controlled in a separate device at a control point 404 separate from the web site.
- FIG. 5 there is illustrated schematically an overall process carried out by the system of Fig.4.
- step 500 a user requests to view or download a document from the website.
- a decision as to who accesses the database, as well as protection of a private key for decrypting the document is controlled by the control point.
- the user proves that they have rights to view the document.
- the credentials of the user are transmitted along with the request to view the document.
- the website retrieves the encrypted document in step 502 and in step 503 presents the encrypted document, along with the credentials of the user to the control point 404.
- the control point checks the user credentials against the access policy for that document, and in step 505, if the control point determines that the user credentials are verified, and that user of a user of that type is permitted to access that document, then in step 506 the document is decrypted and the decrypted document is sent by the control point to the user in step 507.
- step 508 the credentials of the user are not verified, or if a user having those credentials is denied access to the encrypted document by the access policy enforced for that document, then decryption is refused in step 508, and in step 509 the user is alerted that access to the document is denied.
- Fig 6. there is illustrated schematically process steps carried out by the policy enforcement and key management device for providing an encrypted document having attached policy access data.
- the device receives an electronic document from a web server computer in step 600, along with an associated access policy data corresponding to the electronic document in step
- step 602 the device encrypts the document.
- the original policy document may be overwritten within the device, so that the only way of retrieving the document is to decrypt the encrypted document, which will require the device to perform further operations when presented with that encrypted document by a computer entity referring the document to the device again.
- step 604 the policy data is signed, and in step 605, the signed access policy data and encrypted document are returned to the web server which originally sent the electronic document and policy data the device.
- the signed policy access data and encrypted document are provided within an electronic envelope, and returned to the web server.
- the web server computer entity can store the enveloped data file in the database. Any person attempting to access the database, cannot read the documents since it is encrypted. Further, any person requesting access to the documents including encryption, should satisfy the criteria for the access policy described by the access policy data comprising the file.
- the device receives the enveloped file comprising the signed access policy data and the encrypted document, from the web server.
- the web server may receive a request to access the document from a user computer via the web servers web interface (website), and in response, the web server computer retrieves the enveloped file from the database, and sends it to the device. Additionally, the web server collects authentication data from the user requesting a copy of the file, and passes this one to the device as well.
- the device receives the authentication data in step 701 and in step 702 sends the authentication to a computer entity of an auditor company Z, which is specified in the access control policy as being required to audit a request for a document before a document is released. This step is specifically carried out in response to part of the access control policy data.
- the device reads the policy data, and reads a requirement contained within the policy data that any requests for access to the document is sent to an auditing company Z for approval.
- step 703 the device reads from the access policy data that there is a time conditions applicable to the document, that is, the document is only accessible after a particular date.
- the device checks with its internal timer device to see if the date has been reached yet, and if so, can continue to process the file. If the time condition is not satisfied, then the device refuses the request for access to the file in step 707.
- step 705 the device received confirmation from the auditor company's computer entity, that they have approved the request, then in step 706 the document is decrypted and is returned to the web server computer.
- the web server computer may then send the document to the requesting user, or allow the requesting user to view the document over the website.
- a user in order to gain access to a protected file, a user satisfies the enforcement and key management device as to the identity of the user, and also the device reads the policy data and applies enforcement of the policy by, in this example, checking that the document is beyond a release date specified in the policy data for release of the document, and also by receiving confirmation from a third party company Z who audits all requests to access the document, that the user is a person authorized to access that document.
- the policy enforcement and key management device may provide the document, re-enveloped for a particular intended user, provided that the device receives the public key of the intended user recipient.
- the policy engine of the device checks an incoming message from the web server computer entity to see if a public key of an intended user recipient device is included. If the public key is included, then in step 802 the policy engine of the device re-envelopes the decrypted document, by encrypting it using the public key of the recipient user device. The policy enforcement and key management device may then send the re-envelope document directly to the recipient user device in step 803.
- a second example implementation provides a third party e-mail messaging service.
- Convention email although enormous effective as a messaging service, lacks many desirable properties such as assured delivery, receipting, and timed release. These properties can be provided by using an intermediary device which holds a message and records when the message is accessed and by whom.
- the cryptographic control point disclosed herein may form the basis of a third party service for providing timed release of documents, or receipting of documents and short delivery.
- a sender submits a message, and submits conditions under which the message may be released to the cryptographic service.
- the cryptographic service signs the conditions and encrypts the message.
- the cryptographic service only decrypts the message when it is satisfied that the specified conditions have been met.
- the sender may delete the original unencrypted email, once an encrypted version has been made by the cryptographic control point. From then on, where the sender destroys the original document, the only way of recovering the original unencrypted email is for the control point device, (or another equivalent control point device trusted by the control point device which originally encrypted the email) to decrypt the email in accordance with the access control policy specified in an electronic envelope containing the encrypted email.
- the service may be embodied as a stand alone secure equipment, and may be lent by a third party to a sender, thereby giving more assurance to the sender that no one except the intended recipients can see the message, not even the third party itself.
- the box apparatus may sign receipts and if appropriate sign time stamps depending on the level of evidence required from the third party.
- the equivalent box may be returned, and if intact, the third party may vouch for those receipts.
- One advantage of the service is that it involves a third party controlling the release or offering audit and receipting of documents.
- An advantage of the service is an extra level of control and ownership for users that the box delivery mechanism allows.
- a system for secure email transmission comprising an email server 900 operable for sending emails; a policy enforcement and key management device 901 , for enforcing the an access control policy attaching to one or more emails, and a plurality of receiving entities 902, 903.
- the e-mail server 900 has an associated database 903, for storing e-mails as document files.
- the e-mail may be intended for one or more ultimate recipient devices 902, 903.
- the sender may specify that individual intended recipients can view the e-mail.
- This information is contained in an access policy data 904 forwarded to the e-mail server along with the e-mail file 905.
- the access policy data may also specify items such as a timed release of information.
- a sender of the e-mail may wish the e-mail to be viewable on or after a specified time and date.
- the e-mail comprises a research paper
- the release of the research paper needs to be timed to occur after another event, for example filing a patent application for the same material
- the sender of the e-mail may wish to prepare the document for viewing in advance, but delay actual viewing of the document until a specified time and date. This delay can be specified in the access policy data 904.
- the sender may specify within the access policy data 904, the time and date on which those documents may be viewed, together with specifying the intended recipient devices to whom access of the document will be allowed.
- Enforcement of the access policy is made via a policy enforcement and key management device 901, acting in a role as a control point for allowing access to the e-mail and allowing distribution of the e-mails to intended recipients.
- the access policy data comprises a time field 1001 specifying a time after which the document can be made available for viewing and/or release; an authorised recipient field 1002, containing data describing one or more authorised recipient devices, and/or one of more authorised recipient users who are to be able to have access to view the document, the authorised recipient field may also contain a 'rights' field 1003 specifying, for each individual authorised recipient, or for each class of authorised recipient, a type of access right to the e-mail which is permitted, for example 'view only', or 'view and download'; a delivery method field 1004, specifying deliver criteria such as whether the document should be delivered encrypted with a public key of an intended recipient; a key field 1005 containing public keys of 5 intended recipients, and to be used for encrypting the e-mail with a public key where
- the email server submits an email message including conditions under which the message may be released, to the control point device 901 .
- the control point device 901 proceeds to encrypt the e-mail, and to sign the access policy data.
- the control point device then returns an enveloped file to the e-mail server 900.
- the control point device 901 does not store the original e-mail after it has 5 enveloped it. Once it has encrypted the e-mail and sent it back to the e-mail server 900, it does not send the original unencrypted email back to the server, but overwrites it.
- the e-mail server contains an e-mail application which sends an electronic o envelope comprising the encrypted email and the access policy data signed by the control point box to at least one specified recipient entity.
- the e-mail server sends the enveloped file comprising access policy data plus encrypted e-mail to the receiving computer entities.
- the receiving entities to open and read the emails, refers them back 907 to the control point device for decryption , i. e "opening" of the envelope.
- the control point device will only decrypt the email for the receiving entity, if the receiving entity can prove its identity and provided that the identity of the receiving entity is listed in the access policy data received by the control point device in the 0 envelope with the email.
- the control point device compares the time of release field 1001 with an internal timer within the control point device, to see if the unencrypted e-mail can be released to the receiving entity . If e-mail cannot be released, the control point device signals to the receiving entity that the e-mail cannot be released yet.
- a policy enforcement engine of the control point device proceeds to check the other access policy data criteria in the other fields of the access policy data to see whether the e-mail can be decrypted and sent to the receiving entity.
- the control point device reads the access policy dated to see whether that recipient is authorized, and if so, applies decryption to the document and then (optionally) re-encrypts the e-mail with the public key of the intended recipient, before sending it back 908 to the receiving entity.
- the control point device may also generate a receipt data, specifying that the control point device decrypted that document, and re-encrypted it with a recipients public key, at a particular time and date, and send 911 this receipt back to the originating sending entity.
- the receiver can receive an email, but can only open it after a specified date listed in the access policy data.
- the sender has confidence that the receiver cannot open the email before the date specified in the access control policy data, and providing all other conditions specified in the access policy data are met.
- identifying the control device may provide a way of identifying a binding service and/ or a document signing service. Multiple services may be provided resident on a secure control device as described herein.
- key management may be carried out entirely by a service method as disclosed, and a user and/or customer may be tied to a policy.
- the policy can be very rich, i.e. capable of being evaluated rather then being limited to just an access control list.
- the above described specific implementations provide for evaluation to be carried out in a secure hardware device.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un service de gestion de documents consistant : à recevoir un document; à recevoir des données de politique concernant l'accès qui décrivent une politique concernant l'accès applicable audit document reçu; à chiffrer ledit document; et à signer lesdites données de politique concernant l'accès au moyen d'une signature numérique d'un dispositif sécurisé.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0206399 | 2002-03-18 | ||
GB0206399A GB2386710A (en) | 2002-03-18 | 2002-03-18 | Controlling access to data or documents |
PCT/GB2003/001152 WO2003079165A2 (fr) | 2002-03-18 | 2003-03-17 | Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle privee |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1532505A2 true EP1532505A2 (fr) | 2005-05-25 |
Family
ID=9933232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03744450A Withdrawn EP1532505A2 (fr) | 2002-03-18 | 2003-03-17 | Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle privee |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1532505A2 (fr) |
GB (1) | GB2386710A (fr) |
WO (1) | WO2003079165A2 (fr) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2403107B (en) * | 2003-06-19 | 2006-06-14 | Hewlett Packard Development Co | Policy enforcement |
GB2405232B (en) * | 2003-08-21 | 2007-01-03 | Hewlett Packard Development Co | A method of and apparatus for controlling access to data |
US7606788B2 (en) * | 2003-08-22 | 2009-10-20 | Oracle International Corporation | Method and apparatus for protecting private information within a database |
GB0410180D0 (en) * | 2004-05-07 | 2004-06-09 | Hewlett Packard Development Co | An adaptive privacy management system for data repositories |
US8831228B1 (en) | 2009-08-28 | 2014-09-09 | Adobe Systems Incorporated | System and method for decentralized management of keys and policies |
US9830480B2 (en) | 2015-05-27 | 2017-11-28 | Google Llc | Policies for secrets in trusted execution environments |
US9697371B1 (en) | 2015-06-30 | 2017-07-04 | Google Inc. | Remote authorization of usage of protected data in trusted execution environments |
US10623184B2 (en) | 2015-09-29 | 2020-04-14 | International Business Machines Corporation | Smart resource access for decrypted information |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4713753A (en) * | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
JP3395863B2 (ja) * | 1994-08-10 | 2003-04-14 | 富士通株式会社 | ソフトウエア管理モジュール、ソフトウエア再生管理装置およびソフトウエア再生管理システム |
US5557765A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for data recovery |
US5721777A (en) * | 1994-12-29 | 1998-02-24 | Lucent Technologies Inc. | Escrow key management system for accessing encrypted data with portable cryptographic modules |
EP1526472A3 (fr) * | 1995-02-13 | 2006-07-26 | Intertrust Technologies Corp. | Systèmes et procédés de gestion de transactions sécurisées et de protection de droits électroniques |
US5696898A (en) * | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US6073124A (en) * | 1997-01-29 | 2000-06-06 | Shopnow.Com Inc. | Method and system for securely incorporating electronic information into an online purchasing application |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6158010A (en) * | 1998-10-28 | 2000-12-05 | Crosslogix, Inc. | System and method for maintaining security in a distributed computer network |
US6584466B1 (en) * | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
AU5634100A (en) * | 1999-06-23 | 2001-01-09 | Brodia Group, The | Software smart card |
EP1076279A1 (fr) * | 1999-08-13 | 2001-02-14 | Hewlett-Packard Company | Plate-formes d'ordinateurs et leurs procédés d'opération |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
US7017189B1 (en) * | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
-
2002
- 2002-03-18 GB GB0206399A patent/GB2386710A/en not_active Withdrawn
-
2003
- 2003-03-17 EP EP03744450A patent/EP1532505A2/fr not_active Withdrawn
- 2003-03-17 WO PCT/GB2003/001152 patent/WO2003079165A2/fr not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of WO03079165A3 * |
Also Published As
Publication number | Publication date |
---|---|
GB0206399D0 (en) | 2002-05-01 |
WO2003079165A2 (fr) | 2003-09-25 |
WO2003079165A3 (fr) | 2005-03-31 |
GB2386710A (en) | 2003-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100576198C (zh) | 权限管理的实体间消息策略和实施 | |
US6385728B1 (en) | System, method, and program for providing will-call certificates for guaranteeing authorization for a printer to retrieve a file directly from a file server upon request from a client in a network computer system environment | |
US20020046350A1 (en) | Method and system for establishing an audit trail to protect objects distributed over a network | |
AU2002230823B2 (en) | Method and system for obtaining digital signatures | |
US5745574A (en) | Security infrastructure for electronic transactions | |
US20030051172A1 (en) | Method and system for protecting digital objects distributed over a network | |
US20030237005A1 (en) | Method and system for protecting digital objects distributed over a network by electronic mail | |
US20030037261A1 (en) | Secured content delivery system and method | |
US20020032873A1 (en) | Method and system for protecting objects distributed over a network | |
US20090133107A1 (en) | Method and device of enabling a user of an internet application access to protected information | |
JP2001237827A (ja) | 構造化デジタル証明書 | |
EP1303803A2 (fr) | Systeme et procede de distribution de contenu securise | |
US20170279807A1 (en) | Safe method to share data and control the access to these in the cloud | |
CA2335968A1 (fr) | Transactions electroniques bidirectionnelles anonymes | |
US8166525B2 (en) | Document management system with public key infrastructure | |
KR101377352B1 (ko) | 중소 기업 내의 디지털 저작권 관리 수행 방법 및 장치 및 디지털 저작권 관리 서비스를 제공하기 위한 방법 | |
US20120089495A1 (en) | Secure and mediated access for e-services | |
WO2003079165A2 (fr) | Garantie de l'application d'une politique avant l'autorisation d'utilisation d'une cle privee | |
KR101449806B1 (ko) | 디지털 정보 상속 방법 | |
Hughes | Key Management | |
Polemi et al. | A framework for the security of telemedical services | |
Armintor et al. | NHSE Distribution of HPCC Software: Legal Issues and Technological Options | |
López | Overview of Technologies Supporting Security Requirements in 21 CFR Part 11 Part II |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050118 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20060201 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 1/00 20060101AFI20030930BHEP |