WO2000008793A2 - Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom - Google Patents

Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom Download PDF

Info

Publication number
WO2000008793A2
WO2000008793A2 PCT/US1999/017647 US9917647W WO0008793A2 WO 2000008793 A2 WO2000008793 A2 WO 2000008793A2 US 9917647 W US9917647 W US 9917647W WO 0008793 A2 WO0008793 A2 WO 0008793A2
Authority
WO
WIPO (PCT)
Prior art keywords
policy
packaged
object product
capabilities
capability
Prior art date
Application number
PCT/US1999/017647
Other languages
French (fr)
Other versions
WO2000008793A3 (en
Inventor
Steven T. Senator
M. Geoff Mulligan
John Blumenthal
Original Assignee
Interosa, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interosa, Inc. filed Critical Interosa, Inc.
Priority to EP99938984A priority Critical patent/EP1104606A2/en
Priority to AU53354/99A priority patent/AU5335499A/en
Priority to CA002339239A priority patent/CA2339239A1/en
Publication of WO2000008793A2 publication Critical patent/WO2000008793A2/en
Publication of WO2000008793A3 publication Critical patent/WO2000008793A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail

Definitions

  • the present invention relates generally to object-oriented communication techniques and constructs. More particularly, the present invention relates to a packaged-object product. The present invention also relates to a method and apparatus for packaging a data payload with executable code to form the packaged-object product.
  • the executable code defines at least one policy, and a set of capabilities is associated with each policy. The policy responds to events which are associated with the capabilities.
  • the packaged-object product created according to an embodiment of the present invention forms an encapsulated object having active, self- enforcing policies.
  • a receiving station such as a computer
  • requests are made of the capability at the receiving station.
  • the encapsulated object responds to the requests in a manner such that the policy, or policies, defined by the executable code are enforced.
  • the data payload forms a digital data file, such as an e-mail document or facsimile document.
  • the executable code packaged together defines at least one policy with which a capability is associated.
  • the policy embodied by the executable code defines who. when, or how a capability can be performed upon the data file.
  • An exemplary policy embodied by the executable code comprises a restriction to access to the data file, and arr exemplary capability includes a read capability to permit reading of the data file if compliance with the policy is achieved.
  • a communication system includes a sending station and a receiving station interconnected by way of a communication channel
  • the information which is to be transmitted between the sending and receiving stations is typically in the form of. or is represented by. binary bits
  • the binary bits are transmitted upon the communication channel to be received b ⁇ the receiving station
  • binary bits forming the information might first be converted into a form to permit their transmission upon the communication channel And.
  • facsimile machines also permit the communication of information between a sending-facsimile machine and a receiving-facsimile machine, typically connected together by way of a PSTN (public-switched telephonic network).
  • PSTN public-switched telephonic network
  • a document which is to be transmitted is converted into digital form and a binary representation of the document is transmitted by the sending-facsimile machine to a receiving-facsimile machine.
  • Digitized information can analogously be communicated between a sending and a receiving station of other types of communication systems.
  • Security issues relating to data communicated between a sending and a receiving station is sometimes of concern.
  • Security of the communications is sometimes of concern, not only during transmission of information upon a communication channel but also subsequent to its reception at a receiving station.
  • Encryption techniques are sometimes utilized to encrypt information prior to its transmission upon a communication channel to a receiving station. Encryption of the information reduces the possibility that a recipient, other than an intended recipient, shall be able to recover the informational content of the information.
  • the received information is de-encrypted, and thereafter, the informational content of the information is recovered. Once the information has been de-encrypted, the sender of the information no longer controls access to the information.
  • the sender loses use-control over the information. If, however, the sender were able to maintain use-control over the information, the sender would be able to limit access to. and use of. the information.
  • the present invention accordingly, advantageously provides apparatus, and an associated method, for packaging a data payload together with executable code to form a packaged-object product.
  • the executable code defines a policy with which compliance must be achieved to permit a capability, such as a read or copy operation, to be performed upon the data payload.
  • the present invention further advantageously provides a packaged- object product formed of a data payload and executable code which defines a policy and with which a capability is associated.
  • the policy responds to events which are associated with the capability.
  • the packaged-object product forms an encapsulated object having active, self-enforcing policies.
  • requests are made of the capability associated with the executable code forming a policy and which is included as a portion of the encapsulated object.
  • the encapsulated object responds to the requests made of the encapsulated object at the receiving station.
  • the responses are made in a manner such that the policy defined by the executable code is enforced.
  • the executable code forming the policy defines who. when or how a capability can be performed. And. the capability associated with the policy defines an act which can be carried out upon the object.
  • One or more policies are defined by the executable code and each policy has associated therewith one or more capabilities. That is to say, a set of capabilities is associated with each policy.
  • An act carried out upon an object is dependent upon the requests made upon the encapsulated object by the receiving station. Thereby, separate acts might be performed upon the encapsulated object dependent upon the requests made of it by the receiving station.
  • policies Through use of appropriate policies, access to the object can be made to be limited. Security problems associated with an object subsequent to its de-encryption are obviated due to the self-enforcing nature of the policies of the encapsulated object.
  • the executable code defining the policy of the encapsulated object is formed of objects-oriented codes, such as JAVA TM code.
  • An encapsulated object of an embodiment of the present invention is able to implement the specified policies which have associated therewith dynamics capabilities.
  • the packaged-object product includes a digital data file, such as an e-mail document, facsimile document, text file, picture file, or digitized audio file.
  • a digital data file such as an e-mail document, facsimile document, text file, picture file, or digitized audio file.
  • the policy embodied by the executable code with which the data file is packaged defines who, when, or how a capability, such as a read capability, is performed upon the data file.
  • the policy packager packages data within at least one policy to form a packaged-object product.
  • At least one policy is stored at a storage location of a storage element.
  • Each policy has a set of capabilities associated therewith. Each capability of the set of capabilities is effectuable responsive to compliance with the policy to which the set of capabilities is associated.
  • An adder is coupled to receive the data and to the storage element. The adder selectively accesses the storage location at which the policy is stored. The selected policy is retrieved and added to the data to package the data therewith. _The data, once packaged with the selected policy, forms the packaged-object product.
  • a packaged-object product and an apparatus and method for producing such product, is provided.
  • the packaged- object product includes a data payload.
  • At least one policy is packaged together with the data payload.
  • the at least one policy defines selected criteria and has associated therewith a set of capabilities. Each capability of the set of capabilities defines an event capable of being performed upon the data payload when compliance with the selected criteria defined by the policy is achieved.
  • Figure 1 illustrates a functional block diagram of a policy packager of an embodiment of the present invention.
  • Figure 2 illustrates a representation of an encapsulated object of an embodiment of the present invention formed during operation of the policy packager shown in Figure 1 .
  • Figure 3 illustrates a representation of a portion of the encapsulation layer of the encapsulated object shown in Figure 2.
  • Figure 4 illustrates a functional block diagram of a communication system in which an encapsulated object, such as the encapsulated object shown in Figure 2. is generated and transmitted between a sending and a recei v ing station.
  • an encapsulated object such as the encapsulated object shown in Figure 2.
  • Figure 5 illustrates a method flow diagram listing the method acts of the method of operation of an embodiment of the present invention.
  • a policy packager shown generally at 10. is operable to package an object 12 forming a digital payload together with one or more policies to form an encapsulated object 14.
  • the policy packager is formed of a digital processor, such as a personal computer or other computing device.
  • the objects 12 may also be generated at the digital processing device.
  • the object 12 is here represented as an input to the policy packager 10 as. in the exemplary implementation, the object 12 is separately created and then applied to the policy packager 10.
  • the policy packager 10 is here shown to be coupled to a user interface.
  • the user interface 16 forms a computer key board permitting a user to enter input commands to effectuate operation of the policy packager, as appropriate.
  • a controller 18 is operable to control packaging operations of the packager 10 and is here shown to be coupled to receive commands generated by way of actuation of the user interface 16.
  • the policy packager 10 is further shown to include a storage element 22 having a plurality of storage locations 24.
  • the storage elements 22 is formed alternately of computer main memory or storage elements of a computer-peripheral, storage device. Data stored in the storage locations of the storage elements 22 form executable code defining policies.
  • Each policy has associated therewith a set of one or more capabilities.
  • Each policy defines who. when or how a capability can be performed. And. each capability defines an action.
  • the policy packager further includes an adder 26 coupled to receive the object 12 and also to data stored in storage locations 24 of the storage element 22. Operation of the adder 26 is here shown to be controlled by the controller 1 8 which is also operable to control which of the data stored in the selected ones of the_storage locations is provided to the adder 26.
  • the adder 26 is operable to package together the objects 12 and one or more policies formed of the data stored in the storage locations 24 of the storage element.
  • the adder forms the encapsulated object 14 by packaging together the objects 12 together with the data forming the policies retrieved from the storage locations 24. Selection of which of the policies is added by the adder 26 together with the object 12 is made by user actuation of the user interface 16 or can be automatically selected by way of an automated process.
  • the adder 26 is operable, for example, to concatenate together an object 12 to the data forming the selected policies.
  • the data payload forming the object 12 forms a facsimile document
  • the policy packager 10 forms a portion of a facsimile machine.
  • the data payload forming the object 1 2 comprises an e-mail document, such as that generated at a personal computer
  • the policy packager 10 forms a portion of such personal computer.
  • the data payload forming the object 12 can also be formed of any digital material, such as digitized text, digitized picture information, and digitized audio information.
  • the policy packager 10 forms a portion of digital processing apparatus operable to receive and perform operations upon such digital data.
  • FIG 2 illustrates an encapsulated object 14 of an embodiment of the present invention.
  • the encapsulated object 14 forms a packaged-object product, such as that formed by the policy packager 10 shown in Figure 1 .
  • the encapsulated object 14 is formed of a data payload. here the object 12.
  • Exemplary objects 12 include facsimile documents, e-mail documents, text documents, digitized picture documents, digitized audio documents, and the like.
  • the encapsulated object 14 also includes executable code forming one or more policies 32. While in an actual implementation, the executable code forming policies 32 are concatenated together with the objects 12. Policies 32 are here shown to be packaged about, or to encapsulate, the objects 12.
  • Such encapsulation indicates that the access to the objects 1 2 is limited, and the policies 32 form a self-enforcing, content-control mechanism which limits the performance of actions upon the object unless compliance with at least one. more than one. or all of the policies 32 is achieved.
  • the exemplary object 14 shown in Figure 2 includes N policies which encapsulate the object 12. N can be of anv selected number.
  • a set of capabilities is associated with each policy 32.
  • a policy defines who, when or how. an action can be performed upon the objects 12.
  • the capability defines the action which can be performed upon the object if the policy with which the capability is associated is complied with, the capability can be performed upon the objects 12.
  • Figure 3 illustrates the policies 32, and sets 34 of capabilities 36 associated with the policies 32.
  • the executable code of which the policies 32 are formed comprise object-oriented code, such as JAVA TM code.
  • Exemplary capabilities 36 associated with various of the policies include, for example, a read capability, a forward capability, a change (or overwrite) capability, an append capability, an annotate capability, and a delete-object capability.
  • Each policy 32 forms a content-control mechanism controlling access to the objects 12 to have one or more capabilities performed thereon.
  • An exemplary encapsulated object includes a text document forming the object 12 and which includes a legal notice message.
  • the document forming the object 12 is encapsulated with a policy of: a presentation of the legal notice to a prospective-accessor, and legal notice acknowledgment, or a failure to do so.
  • a capability associated with such policy permits limited access to the document if the prospective-accessor acknowledges retrieval of the legal notice.
  • Such an encapsulated object limits access to the document unless a prospective accesser acknowledges receipt of the legal notice associated with the document.
  • Figure 4 illustrates a communication system, shown generally at 52, having a transmitting station 54 and a receiving station 56, interconnected by way of a communication channel 58.
  • the transmitting and receiving stations 54 and 56 form computer stations connected together by way of a computer network which forms the communication channel 58.
  • the transmitting station 54 includes a policy packager 10 and, here, also an object creator 62.
  • the object creator 62 creates an object 12 (shown in Figure 1 ).
  • the object created by the object creator 62 is provided to the policy packager 10 which packages the object together with one or more policies as above-described to form an encapsulated object 14 (shown in Figures 1 and 2). Additional portions (not shown) of the transmitting station 54 place the object 14 in a form to permit its communication upon the networked connection 58 for transmission to the receiving station 56.
  • the receiving station 56 receives the encapsulated object 14 transmitted upon the network 58.
  • the encapsulated object is delivered to an area of the receiving station 56 at which requests are made of the capabilities associated with the at least one policy of the encapsulated object.
  • the receiving station generates events, also referred to as method requests or messages, and the encapsulated object responds to such events.
  • the object responds to the events in manners which enforce the policy or policies of the encapsulated object. When compliance is achieved with the policy or policies, performance of the one or more capabilities associated with such policy or policies is carried out at the receiving station.
  • Figure 5 illustrates a method, shown generally at 72. of an embodiment of the present invention.
  • the method 72 packages a data payload within at least one policy to form a packaged-object product.
  • At least one policy is stored.
  • the policy_ has a set of capabilities associated therewith. Each capability of a set of capabilities is effectuable responsive to compliance with the policy with which the set of capabilities is associated.
  • one or more policies stored during the act of storing is selectively accessed.
  • the policy accessed during the act of selectively accessing is retrieved.
  • the policy retrieved during the act of retrieving is added to the data payload. Thereby, the data payload is packaged with the policy.
  • the data payload, once packaged with the policy forms the packaged-object product.
  • the creator and sender of the encapsulated object of an embodiment of the present invention thereby includes active, self-enforcing policies.
  • effective control over the object is maintained by the creator by virtue of the policies packaged together with the object.

Abstract

An encapsulated object (14), and apparatus (10) and an associated method for forming an encapsulated object (14), is formed of an object (12) to which executable code is added. The executable code defines one or more policies, and a set of capabilities is associated with each policy. Compliance with the policy must be achieved prior to carrying out of an action upon the object (12).

Description

APPARATUS AND METHOD FOR FORMING A PACKAGED- OBJECT PRODUCT AND A PACKAGED-OBJECT PRODUCT FORMED THEREFROM
The present invention relates generally to object-oriented communication techniques and constructs. More particularly, the present invention relates to a packaged-object product. The present invention also relates to a method and apparatus for packaging a data payload with executable code to form the packaged-object product. The executable code defines at least one policy, and a set of capabilities is associated with each policy. The policy responds to events which are associated with the capabilities.
The packaged-object product created according to an embodiment of the present invention forms an encapsulated object having active, self- enforcing policies. When an encapsulated object is received at a receiving station, such as a computer, requests are made of the capability at the receiving station. The encapsulated object responds to the requests in a manner such that the policy, or policies, defined by the executable code are enforced.
In an exemplary implementation, the data payload forms a digital data file, such as an e-mail document or facsimile document. The executable code packaged together defines at least one policy with which a capability is associated. The policy embodied by the executable code defines who. when, or how a capability can be performed upon the data file. An exemplary policy embodied by the executable code comprises a restriction to access to the data file, and arr exemplary capability includes a read capability to permit reading of the data file if compliance with the policy is achieved.
BACKGROUND OF THE INVENTION Advancements in digital technologies have permitted the development of. and practical implementation of. a wide array of devices for performing tasks which can be carried out at rates dramatically more quickly than that which can be performed manually Devices utilizing digital technologies are typically able to perform repetitive functions at significant speeds Because of the speed at which such functions can be performed, activities preuousl} considered impractical can now be readily implemented
Devices used in a digital communication system are exemplar) of devices which make use of some of such advancements in digital technologies A communication system includes a sending station and a receiving station interconnected by way of a communication channel When the communication system is a digital communication system, the information which is to be transmitted between the sending and receiving stations is typically in the form of. or is represented by. binary bits The binary bits are transmitted upon the communication channel to be received b\ the receiving station Depending upon the characteristics of the communication channel, binary bits forming the information might first be converted into a form to permit their transmission upon the communication channel And. the receiving station must be able to receive and re-convert the converted-bits into a form to permit the informational content thereof to be recreated at the recemng station Ad\ ancements in digital technologies have also permitted the creation of. and
Figure imgf000004_0001
of. personal computers Personal computers increasingly are used as communication devices to form portions of a digital communication system Separate computers are connected together by way of private networks as well as by way of the internet Data generated, or stored. at one computer can readιl\ be transmitted to another computer by way of network interconnections E-mail documents, text documents, picture documents, and audio documents are all exemplary of information communicated between computers, or other digital processing devices
Many other types of communication systems similarly make use of digital technologies to communicate information between a sending station and a receiving station. For example, facsimile machines also permit the communication of information between a sending-facsimile machine and a receiving-facsimile machine, typically connected together by way of a PSTN (public-switched telephonic network). A document which is to be transmitted is converted into digital form and a binary representation of the document is transmitted by the sending-facsimile machine to a receiving-facsimile machine. Digitized information can analogously be communicated between a sending and a receiving station of other types of communication systems.
Security issues relating to data communicated between a sending and a receiving station is sometimes of concern. Security of the communications is sometimes of concern, not only during transmission of information upon a communication channel but also subsequent to its reception at a receiving station. Encryption techniques, for example, are sometimes utilized to encrypt information prior to its transmission upon a communication channel to a receiving station. Encryption of the information reduces the possibility that a recipient, other than an intended recipient, shall be able to recover the informational content of the information. When received at a receiving station, the received information is de-encrypted, and thereafter, the informational content of the information is recovered. Once the information has been de-encrypted, the sender of the information no longer controls access to the information.
More generally, once the information is sent by a sender, the sender loses use-control over the information. If, however, the sender were able to maintain use-control over the information, the sender would be able to limit access to. and use of. the information.
A manner by which better to provide a sender of information greater use-control over the information subsequent to its communication to a receiving station would be advantageous. It is in light of this background material related to the communication of information that the significant improvements of the present invention have evolved.
SUMMARY OF THE INVENTION The present invention, accordingly, advantageously provides apparatus, and an associated method, for packaging a data payload together with executable code to form a packaged-object product. The executable code defines a policy with which compliance must be achieved to permit a capability, such as a read or copy operation, to be performed upon the data payload.
The present invention further advantageously provides a packaged- object product formed of a data payload and executable code which defines a policy and with which a capability is associated. The policy responds to events which are associated with the capability. In one aspect of the present invention, the packaged-object product forms an encapsulated object having active, self-enforcing policies. When such an encapsulated object is provided to an appropriate receiving station, requests are made of the capability associated with the executable code forming a policy and which is included as a portion of the encapsulated object. The encapsulated object responds to the requests made of the encapsulated object at the receiving station. The responses are made in a manner such that the policy defined by the executable code is enforced. The executable code forming the policy defines who. when or how a capability can be performed. And. the capability associated with the policy defines an act which can be carried out upon the object.
One or more policies are defined by the executable code and each policy has associated therewith one or more capabilities. That is to say, a set of capabilities is associated with each policy. An act carried out upon an object is dependent upon the requests made upon the encapsulated object by the receiving station. Thereby, separate acts might be performed upon the encapsulated object dependent upon the requests made of it by the receiving station. Through use of appropriate policies, access to the object can be made to be limited. Security problems associated with an object subsequent to its de-encryption are obviated due to the self-enforcing nature of the policies of the encapsulated object.
The executable code defining the policy of the encapsulated object is formed of objects-oriented codes, such as JAVA ™ code. An encapsulated object of an embodiment of the present invention is able to implement the specified policies which have associated therewith dynamics capabilities.
In an exemplary implementation, the packaged-object product includes a digital data file, such as an e-mail document, facsimile document, text file, picture file, or digitized audio file. The policy embodied by the executable code with which the data file is packaged defines who, when, or how a capability, such as a read capability, is performed upon the data file.
In another aspect of the present invention, the policy packager, and an associated method, packages data within at least one policy to form a packaged-object product. At least one policy is stored at a storage location of a storage element. Each policy has a set of capabilities associated therewith. Each capability of the set of capabilities is effectuable responsive to compliance with the policy to which the set of capabilities is associated. An adder is coupled to receive the data and to the storage element. The adder selectively accesses the storage location at which the policy is stored. The selected policy is retrieved and added to the data to package the data therewith. _The data, once packaged with the selected policy, forms the packaged-object product.
In these and other aspects, therefore, a packaged-object product, and an apparatus and method for producing such product, is provided. The packaged- object product includes a data payload. At least one policy is packaged together with the data payload. The at least one policy defines selected criteria and has associated therewith a set of capabilities. Each capability of the set of capabilities defines an event capable of being performed upon the data payload when compliance with the selected criteria defined by the policy is achieved. A more complete appreciation of the present invention and the scope thereof can be obtained from the accompanying drawings which are briefly- summarized below, the following detailed description of the presently- preferred embodiments of the invention, and the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 illustrates a functional block diagram of a policy packager of an embodiment of the present invention.
Figure 2 illustrates a representation of an encapsulated object of an embodiment of the present invention formed during operation of the policy packager shown in Figure 1 . Figure 3 illustrates a representation of a portion of the encapsulation layer of the encapsulated object shown in Figure 2.
Figure 4 illustrates a functional block diagram of a communication system in which an encapsulated object, such as the encapsulated object shown in Figure 2. is generated and transmitted between a sending and a recei v ing station.
Figure 5 illustrates a method flow diagram listing the method acts of the method of operation of an embodiment of the present invention.
DETAI LED DESCRIPTION
Referring first to Figure 1 , a policy packager, shown generally at 10. is operable to package an object 12 forming a digital payload together with one or more policies to form an encapsulated object 14. In an exemplary implementation, the policy packager is formed of a digital processor, such as a personal computer or other computing device. In such an implementation, the objects 12 may also be generated at the digital processing device. The object 12 is here represented as an input to the policy packager 10 as. in the exemplary implementation, the object 12 is separately created and then applied to the policy packager 10. The policy packager 10 is here shown to be coupled to a user interface.
In an implementation in which the policy packager 10 forms a portion of a personal computer, the user interface 16 forms a computer key board permitting a user to enter input commands to effectuate operation of the policy packager, as appropriate. A controller 18 is operable to control packaging operations of the packager 10 and is here shown to be coupled to receive commands generated by way of actuation of the user interface 16.
The policy packager 10 is further shown to include a storage element 22 having a plurality of storage locations 24. In the implementation in which the policy packager is embodied by a computer, the storage elements 22 is formed alternately of computer main memory or storage elements of a computer-peripheral, storage device. Data stored in the storage locations of the storage elements 22 form executable code defining policies. Each policy has associated therewith a set of one or more capabilities. Each policy defines who. when or how a capability can be performed. And. each capability defines an action.
The policy packager further includes an adder 26 coupled to receive the object 12 and also to data stored in storage locations 24 of the storage element 22. Operation of the adder 26 is here shown to be controlled by the controller 1 8 which is also operable to control which of the data stored in the selected ones of the_storage locations is provided to the adder 26. The adder 26 is operable to package together the objects 12 and one or more policies formed of the data stored in the storage locations 24 of the storage element. The adder forms the encapsulated object 14 by packaging together the objects 12 together with the data forming the policies retrieved from the storage locations 24. Selection of which of the policies is added by the adder 26 together with the object 12 is made by user actuation of the user interface 16 or can be automatically selected by way of an automated process. The adder 26 is operable, for example, to concatenate together an object 12 to the data forming the selected policies. In one implementation, the data payload forming the object 12 forms a facsimile document, and the policy packager 10 forms a portion of a facsimile machine. In another implementation, the data payload forming the object 1 2 comprises an e-mail document, such as that generated at a personal computer, and the policy packager 10 forms a portion of such personal computer. In an analogous manner, the data payload forming the object 12 can also be formed of any digital material, such as digitized text, digitized picture information, and digitized audio information. The policy packager 10 forms a portion of digital processing apparatus operable to receive and perform operations upon such digital data. Figure 2 illustrates an encapsulated object 14 of an embodiment of the present invention. The encapsulated object 14 forms a packaged-object product, such as that formed by the policy packager 10 shown in Figure 1 . The encapsulated object 14 is formed of a data payload. here the object 12. Exemplary objects 12 include facsimile documents, e-mail documents, text documents, digitized picture documents, digitized audio documents, and the like. The encapsulated object 14 also includes executable code forming one or more policies 32. While in an actual implementation, the executable code forming policies 32 are concatenated together with the objects 12. Policies 32 are here shown to be packaged about, or to encapsulate, the objects 12. Such encapsulation indicates that the access to the objects 1 2 is limited, and the policies 32 form a self-enforcing, content-control mechanism which limits the performance of actions upon the object unless compliance with at least one. more than one. or all of the policies 32 is achieved. The exemplary object 14 shown in Figure 2 includes N policies which encapsulate the object 12. N can be of anv selected number. A set of capabilities is associated with each policy 32. A policy defines who, when or how. an action can be performed upon the objects 12. The capability defines the action which can be performed upon the object if the policy with which the capability is associated is complied with, the capability can be performed upon the objects 12.
Figure 3 illustrates the policies 32, and sets 34 of capabilities 36 associated with the policies 32. In an exemplary implementation, the executable code of which the policies 32 are formed comprise object-oriented code, such as JAVA ™ code. Exemplary capabilities 36 associated with various of the policies include, for example, a read capability, a forward capability, a change (or overwrite) capability, an append capability, an annotate capability, and a delete-object capability.
Both the policies and the capabilities associated with the policies are dynamically-selectable during creation of the object, such as by the policy packager 10 shown in Figure 1 . Each policy 32 forms a content-control mechanism controlling access to the objects 12 to have one or more capabilities performed thereon.
An exemplary encapsulated object includes a text document forming the object 12 and which includes a legal notice message. The document forming the object 12 is encapsulated with a policy of: a presentation of the legal notice to a prospective-accessor, and legal notice acknowledgment, or a failure to do so. A capability associated with such policy permits limited access to the document if the prospective-accessor acknowledges retrieval of the legal notice. Such an encapsulated object limits access to the document unless a prospective accesser acknowledges receipt of the legal notice associated with the document.
Figure 4 illustrates a communication system, shown generally at 52, having a transmitting station 54 and a receiving station 56, interconnected by way of a communication channel 58. In an exemplary implementation, the transmitting and receiving stations 54 and 56 form computer stations connected together by way of a computer network which forms the communication channel 58. The transmitting station 54 includes a policy packager 10 and, here, also an object creator 62. The object creator 62 creates an object 12 (shown in Figure 1 ). The object created by the object creator 62 is provided to the policy packager 10 which packages the object together with one or more policies as above-described to form an encapsulated object 14 (shown in Figures 1 and 2). Additional portions (not shown) of the transmitting station 54 place the object 14 in a form to permit its communication upon the networked connection 58 for transmission to the receiving station 56.
The receiving station 56 receives the encapsulated object 14 transmitted upon the network 58. The encapsulated object is delivered to an area of the receiving station 56 at which requests are made of the capabilities associated with the at least one policy of the encapsulated object. The receiving station generates events, also referred to as method requests or messages, and the encapsulated object responds to such events. The object responds to the events in manners which enforce the policy or policies of the encapsulated object. When compliance is achieved with the policy or policies, performance of the one or more capabilities associated with such policy or policies is carried out at the receiving station.
Figure 5 illustrates a method, shown generally at 72. of an embodiment of the present invention. The method 72 packages a data payload within at least one policy to form a packaged-object product.
First, and as indicated by the block 74. at least one policy is stored. The policy_has a set of capabilities associated therewith. Each capability of a set of capabilities is effectuable responsive to compliance with the policy with which the set of capabilities is associated. Then, and as indicated by the block 76. one or more policies stored during the act of storing is selectively accessed. Thereafter, and as indicated by the block 78. the policy accessed during the act of selectively accessing is retrieved. And. as indicated by the block 82, the policy retrieved during the act of retrieving is added to the data payload. Thereby, the data payload is packaged with the policy. The data payload, once packaged with the policy forms the packaged-object product.
Thereby, through operation of an embodiment of the present invention, self-enforcing content control is provided to an object. The creator and sender of the encapsulated object of an embodiment of the present invention thereby includes active, self-enforcing policies. When an encapsulated object is received at a receiving station, effective control over the object is maintained by the creator by virtue of the policies packaged together with the object.
The previous descriptions are of preferred examples for implementing the invention, and the scope of the invention should not necessarily be limited by this description. The scope of the present invention is defined by the followinc claims:

Claims

We claim:
1 . A packaged-object product receivable at a receiving station, said packaged-object product comprising: a data payload: and at least one policy packaged together with said data payload. said at least one policy defining selected criteria, and said at least one policy having associated therewith a set of capabilities, each capability of the set of capabilities defining an event capable of being performed upon said data payload when compliance with the selected criteria defined by said policy is achieved.
2. The packaged-object product of claim 1 wherein said at least one policy comprises executable code.
3. The packaged-object product of claim 2 wherein each capability of the set of capabilities associated with said policy forms an interface to the executable code of which said policy is comprised and to said data payload.
4. The packaged-object product of claim 1 wherein the receiving station includes a user actuator actuatable by a user, and wherein the compliance w ith the selected criteria defined by said policy is determined responsive to user actuation of the user actuator.
5. The packaged-object product of claim 1 wherein the receiving station includes at least one characteristic associated therewith, wherein the selected criteria defined by said policy pertains to a receiving-station characteristic, and wherein compliance with the selected criteria defined by said policy is achieved wherein the characteristic associated with the receiving station corresponds with the receiving-station characteristic formed of the selected criteria.
6. The packaged-object product of claim 1 wherein said at least one policy comprises a first policy and at least a second policy, said first policy defining first selected criteria and said at least second policy defining second selected criteria, said first policy having associated therewith a first set of capabilities and said at least second policy having associated therewith a second set of capabilities.
7. The packaged-object product of claim 1 wherein said set of capabilities associated with said policy comprises a first capability and at least a second capability, said first capability defining a first event and said at least second capability defining at least a second event.
8. The packaged-object product of claim 1 wherein said data payload comprises a digital work.
9. The packaged-object product of claim 8 wherein the receiving station comprises a facsimile machine and wherein said data payload comprises a facsimile document.
10. The packaged-object product of claim 8 wherein the receiving station comprises digital processing apparatus capable of receiving an e-mail document and wherein said data payload comprises an e-mail document.
1 1 . The packaged-object product of claim 8 wherein the receiving station comprises digital processing apparatus capable of receiving a text file and wherein said data payload comprises a text file.
1 2. The packaged-object product of claim 8 wherein the receiving station comprises digital processing apparatus capable of receiving a picture- document and wherein said data payload comprises a picture-document.
1 3. The packaged-object product of claim 8 wherein the receiving station comprises digital processing apparatus capable of receiving a digitized-audio document and wherein said data payload comprises a digitized audio-document.
14. The packaged-object product of claim 1 wherein a capability of the set of capabilities associated with said at least one policy comprises a read capability.
15. A policy packager for packaging data within at least one policy to form a packaged-object product, said policy packager comprising: a storage element having at least one storage location for storing at least one policy, each policy stored thereat having a set of capabilities associated therewith, each capability of the set of capabilities effectuable responsive to compliance with the policy to which the set of capabilities is associated: and an adder coupled to receive the data and to said storage element, said adder for selectively accessing the at least one storage location at which the at least one policy is stored for retrieving a selected policy of the at least one policy stored at said storage element, and for adding the selected policy to the data to package the data therewith, the data, once packaged with the selected policy, forming the packaged-object product.
1 6. The policy packager of claim 15 wherein said storage element comprises a computer memory of a computer system.
1 7. The policy packager of claim 16 wherein said adder comprises a computer processor of a computer system.
1 8. The policy packager of claim 1 5 further comprising a user actuator coupled to said adder, said user actuator actuatable by a user to cause accessing of the storage location of said storage element by said adder.
19. A method for packaging data payload within at least one policy to form a packaged-object product, said method comprising the acts of: storing at least one policy having a set of capabilities associated therewith, each capability of the set of capabilities effectuable responsive to compliance with the policy with which the set of capabilities is associated; selectively accessing a policy of the at least one policy stored during said act of storing; retrieving the policy accessed during said act of selectively accessing; and adding the policy retrieved during said act of retrieving to the data payload to package the data payload therewith, the data payload. once packaged with the policy, forming the packaged-object product.
PCT/US1999/017647 1998-08-04 1999-08-04 Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom WO2000008793A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP99938984A EP1104606A2 (en) 1998-08-04 1999-08-04 Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom
AU53354/99A AU5335499A (en) 1998-08-04 1999-08-04 Apparatus and method for forming a packaged-object product and a packaged-objectproduct formed therefrom
CA002339239A CA2339239A1 (en) 1998-08-04 1999-08-04 Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12946798A 1998-08-04 1998-08-04
US09/129,467 1998-08-04

Publications (2)

Publication Number Publication Date
WO2000008793A2 true WO2000008793A2 (en) 2000-02-17
WO2000008793A3 WO2000008793A3 (en) 2000-05-18

Family

ID=22440096

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/US1999/017647 WO2000008793A2 (en) 1998-08-04 1999-08-04 Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom
PCT/US1999/017786 WO2000008794A2 (en) 1998-08-04 1999-08-04 Systems and methods for securing electronic message

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/US1999/017786 WO2000008794A2 (en) 1998-08-04 1999-08-04 Systems and methods for securing electronic message

Country Status (5)

Country Link
EP (2) EP1101190A2 (en)
CN (1) CN1342278A (en)
AU (2) AU5335499A (en)
CA (1) CA2339239A1 (en)
WO (2) WO2000008793A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001076181A2 (en) * 2000-03-31 2001-10-11 Tumbleweed Communications Corp. Policy enforcement in a secure data file delivery system
EP1386242A1 (en) * 2001-04-03 2004-02-04 Purdue Pharma L.P. Privileged e-mail system with routing controls
US20080172717A1 (en) * 2000-11-08 2008-07-17 Peter Malcolm Information Management System
US10552603B2 (en) 2000-05-17 2020-02-04 Finjan, Inc. Malicious mobile code runtime monitoring system and methods

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9219755B2 (en) 1996-11-08 2015-12-22 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US8079086B1 (en) 1997-11-06 2011-12-13 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US6938065B2 (en) 2000-12-12 2005-08-30 Ericsson Inc. System and method for controlling inclusion of email content
US7725098B1 (en) 2003-09-04 2010-05-25 Emc Corporation Data message processing
US8831194B2 (en) 2005-06-30 2014-09-09 Emc Corporation Telephonic communication redirection and compliance processing
US8059805B2 (en) 2005-06-30 2011-11-15 Emc Corporation Enhanced services provided using communication redirection and processing
US8605878B2 (en) 2005-06-30 2013-12-10 Emc Corporation Redirecting and mirroring of telephonic communications
US20180176256A1 (en) * 2016-12-16 2018-06-21 Futurewei Technologies, Inc. Temporal Control and Access Control of Emails
US10924459B2 (en) * 2016-12-16 2021-02-16 Futurewei Technologies, Inc. Location control and access control of emails

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4525780A (en) * 1981-05-22 1985-06-25 Data General Corporation Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information
US4924513A (en) * 1987-09-25 1990-05-08 Digital Equipment Corporation Apparatus and method for secure transmission of data over an unsecure transmission channel
US5475845A (en) * 1993-07-19 1995-12-12 Taligent, Inc. Wrapper system for interfacing an object-oriented application to a procedural operating system
US5805700A (en) * 1996-10-15 1998-09-08 Intel Corporation Policy based selective encryption of compressed video data
US5825891A (en) * 1996-01-16 1998-10-20 Raptor Systems, Inc. Key management for network communication

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5325310A (en) * 1992-06-26 1994-06-28 International Business Machines Corporation Method and system for persistant electronic mail reply processing
JPH08331175A (en) * 1995-05-31 1996-12-13 Sony Corp Method for controlling information and device therefor
US5893910A (en) * 1996-01-04 1999-04-13 Softguard Enterprises Inc. Method and apparatus for establishing the legitimacy of use of a block of digitally represented information
US5937161A (en) * 1996-04-12 1999-08-10 Usa.Net, Inc. Electronic message forwarding system
US5903652A (en) * 1996-11-25 1999-05-11 Microsoft Corporation System and apparatus for monitoring secure information in a computer network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4525780A (en) * 1981-05-22 1985-06-25 Data General Corporation Data processing system having a memory using object-based information and a protection scheme for determining access rights to such information
US4924513A (en) * 1987-09-25 1990-05-08 Digital Equipment Corporation Apparatus and method for secure transmission of data over an unsecure transmission channel
US5475845A (en) * 1993-07-19 1995-12-12 Taligent, Inc. Wrapper system for interfacing an object-oriented application to a procedural operating system
US5825891A (en) * 1996-01-16 1998-10-20 Raptor Systems, Inc. Key management for network communication
US5805700A (en) * 1996-10-15 1998-09-08 Intel Corporation Policy based selective encryption of compressed video data

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BOYD C.: 'Modern data encryption' ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL October 1993, pages 271 - 278, XP002925136 *
FENNA ERIK: 'Data encryption protocols for electronic mail' IEEE 1984, pages 123 - 125, XP002925134 *
FORCE GORDON: 'Portable data encryption approaches' pages 413 - 419, XP002925133 *
SMID M.E. ET AL: 'The data encryption standard: past and future' PROCEEDINGS OF THE IEEE vol. 76, no. 5, May 1988, pages 550 - 559, XP002925135 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001076181A2 (en) * 2000-03-31 2001-10-11 Tumbleweed Communications Corp. Policy enforcement in a secure data file delivery system
WO2001076181A3 (en) * 2000-03-31 2002-03-21 Tumbleweed Comm Corp Policy enforcement in a secure data file delivery system
US8196183B2 (en) 2000-03-31 2012-06-05 Axway Inc. Policy enforcement in a secure data file delivery system
US10362063B2 (en) 2000-03-31 2019-07-23 Axway Inc. Policy enforcement in a secure data file delivery system
US10552603B2 (en) 2000-05-17 2020-02-04 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US20080172717A1 (en) * 2000-11-08 2008-07-17 Peter Malcolm Information Management System
US9225553B2 (en) * 2000-11-08 2015-12-29 Ca, Inc. Information management system
EP1386242A1 (en) * 2001-04-03 2004-02-04 Purdue Pharma L.P. Privileged e-mail system with routing controls
EP1386242A4 (en) * 2001-04-03 2005-02-09 Purdue Pharma Lp Privileged e-mail system with routing controls

Also Published As

Publication number Publication date
WO2000008794A3 (en) 2000-05-18
EP1104606A2 (en) 2001-06-06
CA2339239A1 (en) 2000-02-17
WO2000008794A2 (en) 2000-02-17
AU5670899A (en) 2000-02-28
AU5335499A (en) 2000-02-28
WO2000008793A3 (en) 2000-05-18
EP1101190A2 (en) 2001-05-23
CN1342278A (en) 2002-03-27

Similar Documents

Publication Publication Date Title
US6230186B1 (en) Private electronic message system
US6591367B1 (en) Method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network
CN1156765C (en) Security mechanism for providing access control to local hold data
US9825925B2 (en) Method and apparatus for securing sensitive data in a cloud storage system
US8601605B2 (en) Methods and apparatus for secure document printing
EP1104606A2 (en) Apparatus and method for forming a packaged-object product and a packaged-object product formed therefrom
US6665709B1 (en) Method, apparatus, and system for secure data transport
US7900211B2 (en) Method and apparatus for data transfer across a network
US20050105719A1 (en) Personal information control and processing
EP1662356A2 (en) Information leakage prevention method and apparatus and program for the same
US20020178353A1 (en) Secure messaging using self-decrypting documents
EP0880088A2 (en) Data copyright management system and apparatus
EP1359758A1 (en) Efficient encryption of image data
US20030044009A1 (en) System and method for secure communications with network printers
WO2001026277A1 (en) Method and apparatus for packaging and transmitting data
CN1522516A (en) Secure header information for multi-content e-mail
JP2002501334A (en) System for sending subscription information and content to mobile devices
WO1999017504A1 (en) Messaging application having a plurality of interfacing capabilities
WO1997039552A1 (en) An apparatus and method for re-encrypting data
US11216577B1 (en) Systems, methods, and computer-readable media for utilizing anonymous sharding techniques to protect distributed data
US20040088539A1 (en) System and method for securing digital messages
US20030081788A1 (en) Secure printing to a web-based imaging print service
CN104601548A (en) Generation method and device of encrypted file and computing equipment
US20050216754A1 (en) Method of encrypting digital items delivery through a communication network
JP3537959B2 (en) Information decryption device

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99809311.4

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2339239

Country of ref document: CA

Ref document number: 2339239

Country of ref document: CA

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1999938984

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999938984

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 1999938984

Country of ref document: EP