WO2014068362A1 - Method and system for secure computer file management and storage having high level of usability - Google Patents

Method and system for secure computer file management and storage having high level of usability Download PDF

Info

Publication number
WO2014068362A1
WO2014068362A1 PCT/IB2012/055990 IB2012055990W WO2014068362A1 WO 2014068362 A1 WO2014068362 A1 WO 2014068362A1 IB 2012055990 W IB2012055990 W IB 2012055990W WO 2014068362 A1 WO2014068362 A1 WO 2014068362A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
level
notes
computer
multimedia
Prior art date
Application number
PCT/IB2012/055990
Other languages
French (fr)
Inventor
Kwok Yan Karch Lam
Original Assignee
Soda Private Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Soda Private Limited filed Critical Soda Private Limited
Priority to PCT/IB2012/055990 priority Critical patent/WO2014068362A1/en
Priority to SG11201501347TA priority patent/SG11201501347TA/en
Publication of WO2014068362A1 publication Critical patent/WO2014068362A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Definitions

  • the present invention relates to method and system of secure computer file management and storage for use in desktop and mobile computing environments applicable to desktop computers, laptops, smart phones and tablet computing devices. More particularly, said computer file management and storage provides strong cryptographical protection of user data with support of multimedia annotations, which permit easy file or- ganization and efficient search of said protected data for accomplishing high level of usability.
  • File names pose limits on character types and length of name strings.
  • keywords and tags are dependent of file types and operating systems.
  • keywords entered as part of a file of the Portable Document Format (PDF) cannot be directly used in searches by native file browsers of major operating systems.
  • tags cannot be added to a Windows folder containing a group of related files.
  • adding keywords and tags to a large number of individual files is very time consuming, in- convenient and very often incomprehensible because of the limited contextual information keywords and tags can carry.
  • US7689547 has disclosed a method in which the hash values of keyword strings are used for search of encrypted data.
  • US7484092 has disclosed a technique which relies on keywords and file names as indexing information for speeding up search of encrypted files.
  • the present invention provides method and system for searchable and secure computer file management and storage having high level of usability.
  • Said computer file management allows the attachment of detailed information of any multimedia format to individual files and groups of files of any format, for augmenting the information stored in said files, and for enhancing usability in terms of file search, readability, operating-system neutral and ease of exporting the encrypted files to remote storage.
  • the present application provides method and system for secure computer file management and storage having high level of usability .
  • a method of secure computer file management and storage is provided.
  • a computer file of digital content is managed in a computing environment for accomplishing data security against unauthorized access, for ensuring efficient and ease of search by users of the computing environment, and for attaining high level of usability.
  • the method begins with associating at least one file-level multimedia note with the computer file for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file.
  • the method further associates at least one group-level multimedia note with the computer file for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file together with a plurality of oth- er computer files grouped together by the users.
  • the computer file, file-level and group-level multimedia notes are protected cryptographically against unauthorized access.
  • the users may comprise human individuals, computer tools and applications in communication and interfaced with the secure computer file management and storage.
  • the computing environment may be any computer operating systems capable of executing the tasks and activities performed by the users, and the computer operating systems may be installed and executing on any fixed and mobile devices including desktop computers, portable computers, tablet computers and mobile smart phones.
  • the computer file may be of any formats supported by the computing environment, and said any formats comprise content- specific and application-specific formats compliant to any open and proprietary standards.
  • the cryptographically protected computer file may be assigned a file name different from its original file name such that deriving the original file name from the assigned file name is impossible.
  • the assigned file name may comprise at least one randomly generated alphanumeric string.
  • the original file name and attributes of the computer file, together with the names, storage locations, time stamps and other attributes of the cryptographically protected computer file, the file-level multimedia notes and the group-level multimedia notes are cross-referenced, and the cross- reference information is cryptographically protected and stored in suitable means including computer registers, files and database records.
  • the file-level and group-level multimedia notes support sub- notes of any multimedia formats including text, audio, image and video.
  • Each of the non-text multimedia sub-notes of the file-level and group-level multimedia notes comprises at least one multimedia file of any non-text format.
  • the text sub-notes of the file-level and group level multimedia notes comprise a combination of contents created by users, information extracted from file attributes of the computer file and information generated automatically based upon time, date, location and any information deemed suitable.
  • the text sub-notes may support hyperlinks which point to any of the file-level and group-level multimedia notes, and external locations including directories and folders in the computing environment, website addresses and Internet Protocol addresses.
  • the text sub-notes may further support the use of all available character sets, font sizes, font types, font colours, bookmarks, highlights and other features typically performed by document editors, and the text sub-notes have no limitation in the number of characters used.
  • the text and non-text information in the file-level and group-level multimedia notes can be searched and compared against search criteria specified by the users, and the search results deemed sufficiently close and related to the search criteria are outputted to the computing environment in data files or interfaced to applicable computer applications.
  • the text information searched comprises user created content, extracted file attributes, automatically generated information, said original file name, bookmarks, hyperlinks, font characteristics, highlights, note subjects and categories.
  • the search of non-text information comprises techniques employed for image and facial recognition applicable to files comprising image and video data, speech recognition and voice recognition applicable to files comprising audio data.
  • the search results comprise names, attributes and content of the identified files and the associated file-level and group- level multimedia notes.
  • a dedicated graphical user interface may be used to create, edit, browse and search the file-level multimedia notes and group-level multimedia notes, and display the search results based upon the user-specified search criteria .
  • the cryptographically protected computer file, file-level and group-level multimedia notes are stored in permanent memory, whereas temporarily decrypted files, associated multimedia notes, and other non-permanent data may be stored in volatile memory which erases its stored data upon removal of power supply .
  • a system for secure computer file management and storage comprises a computer application which is executed in a computing environment for managing computer files to accomplish data security against unauthorized access, ensure efficient and ease of search by users, and attain high level of usability.
  • Each of the computer files is associated with at least one file-level multimedia note for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file.
  • each of the computer files is associated with at least one group-level multimedia note for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file and a plurality of other computer files grouped together by the users.
  • the computer files, the file-level and group-level multimedia notes are cryptographically protected against unauthorized access.
  • the file-level and group-level multimedia notes support sub- notes of any multimedia formats including text, audio, image and voice formats, with text sub-notes comprising a combination of contents created by users, information extracted from file attributes of the computer files and information generated automatically based upon time, date, location and any information deemed suitable.
  • the text sub-notes further support hyperlinks, bookmarks, highlights and all the available font sizes, font types, font colours and character sets, whereas non-text multimedia sub-notes comprise multimedia files of any non-text format.
  • the text and non-text information in the file-level and group-level multimedia notes are searchable against user- specified criteria, which comprise text segments, file names, hyperlinks, font characteristics, highlights and bookmarks, and the search criteria further comprising parameters associated with image, speech and voice recognition.
  • the computer application may comprise a dedicated graphical user interface for users to create, edit, browse and search the file-level multimedia notes and group-level multimedia notes, and display search results based upon the user-specified search criteria .
  • the cryptographically protected computer files, file-level and group-level multimedia notes are stored in permanent memory, and other non-permanent data may be stored in vola- tile memory which erases its stored data upon removal of pow- er supply.
  • FIG. 1 illustrates a searchable and secure computer file management and storage system managing a plurality of computer files by means of at least one shared group-level multimedia note, and each of said corn- puter files being further associated with at least one file-level multimedia note ,
  • FIG. 2 illustrates a secure cross-reference register linking the essential information pertaining to an encrypted computer file managed in the system of FIG. 1,
  • FIG. 3 shows a process flow executed by said secure file management system of FIG. 1 to protect a computer file cryptographically
  • FIG. 4 shows an embodiment of an interactive computer application for users to perform note editing, browsing, and searching of cryptographically protected data managed in the system of FIG. 1, and
  • FIG. 5 shows a process flow for searching through cryptographically protected computer files managed by the system of FIG. 1.
  • FIG. 1 illustrates a searchable and secure computer file management and storage system 100 (hereinafter referred to as "secure file management system") managing a plurality of computer files of digital content 110 for accomplishing data security against unauthorized access while maintaining high level of usability in terms of file management, handling and information search.
  • Said secure file management system 100 associates said computer files 110 collectively with at least one group-level multimedia note 130.
  • Each of said computer files 110 is further associated with at least one file-level multimedia note 120.
  • Said secure file management system 100 executes in a computer environment comprising any computer operating system capable of executing all the required computing tasks and related user-specific and application-specific computing activities.
  • Said computing environment executes on any fixed and mobile user devices including desktop computers, portable computers, tablet computers and mobile smart phones .
  • Said computer operating system includes but not limited to Windows, Linux, Mac, Unix, Android and iOS .
  • Said file-level multimedia note 120 comprises a plurality of text sub-notes 122 and non-text multimedia sub-notes 124, each of which serves to provide descriptive information, sup- plement the content of its associated computer file 110, as well as facilitate file search.
  • Said group-level multimedia note 130 comprises a plurality of text sub-notes 132 and nontext multimedia sub-notes 134, which serve to provide de- scriptive information, supplement the content of said computer files 110 grouped together by said users, as well as facilitate file search.
  • users comprise human individuals and computer applications in communication and interfaced with the secure file management system 100.
  • Said computer files 110 can be of any formats as long as they are supported in said computing environment in which said se- cure file management system 100 executes.
  • Said any formats include all content-specific and application-specific formats compliant to open and proprietary standards.
  • Said file-level multimedia notes 120 and group-level multime- dia notes 130 support sub-notes of any multimedia formats including text, audio, image and video.
  • Said text sub-notes 122 & 132 comprise contents created by users, information extracted from file attributes of said computer files 110 and information generated automatically based upon time, date, location and any information deemed suitable. Furthermore, said text sub-notes 122 & 132 support hyperlinks which point to any of said file-level and group- level multimedia notes 120 & 130, and external locations in- eluding directories and folders of said computing environment, website addresses and Internet Protocol addresses accessible from web browsers and related computer applications. In addition, said text sub-notes 122 & 132 support the use of all available character sets, font sizes and types, font colours, bookmarks, highlights and other features performed by typical document editors. Besides, there is no limitation in the number of characters used.
  • Each of said non-text multimedia sub-notes 124 & 134 of file- level and group-level multimedia notes 120 & 130 comprises at least one multimedia file of any non-text format.
  • All text sub-notes 122 & 132 and non-text multimedia sub- notes 124 & 134 can be created, edited, browsed (140) and searched (150) by said users.
  • Said computer files 110, file-level multimedia notes 120 and group-level multimedia notes 130 are protected cryptograph- ically before they are transferred to permanent memory, such as computer hard disks, for storage.
  • a movie file is protected cryptograph- ically by said secure file management system 100 of the present invention.
  • the user may enter text description about the movie in the text sub-note 122 of said file-level multimedia note 120. Information about the plot and reviews of the movie may be recorded in said text sub-note.
  • the user may attach photographic image files of the actors and an audio file carrying an interview of the lead actors as the non-text multimedia sub-note 124 of said file-level multimedia note 120.
  • the user may group this movie file with other movies produced by the same director using a group-level multimedia note 130.
  • the user may enter the biographical data of the director as the text sub-note 132, and attach photographic image files of the director as non-text multimedia sub-notes 134 of said group-level multimedia note 130.
  • FIG. 2 illustrates a secure cross-reference register 200 linking the essential information pertaining to any of the computer files 110 stored in the secure file management system 100.
  • Said register 200 comprises first sub-register 220 storing the name and other attributes of the original comput- er file, which is the unprotected version of said computer file 110.
  • Said cross-reference register 200 further comprises second sub-register 230 which stores the name, the location of storage, time stamps and other attributes of the crypto- graphically protected computer file 110.
  • Said protected com- puter file 110 is assigned a file name different from its original file name such that deriving the original file name from the assigned file name is impossible.
  • Said assigned file name may comprise at least one randomly generated alphanumeric string.
  • said secure file management system 100 Upon completing the process of protecting said original computer file cryptographically, said secure file management system 100 prompts the user to erase said original computer file. Alternatively, said secure file management system 100 performs erasure of the original file automatically.
  • the algorithm used to erase the original file may comprise zeroiza- tion and overwriting of said original and unprotected file with randomized data such that said original computer file is not recoverable.
  • Said cross-reference register 200 further comprises third sub-register 240 which stores the identifier, the location of storage, time stamps and other attributes of the file-level multimedia note 120 associated with said computer file 110.
  • Said register 200 further comprises fourth sub-register 240 which stores the identifier, the location of storage, time stamps and other attributes of the group-level multimedia note 120 associated with said computer file together with other computer files grouped by the users.
  • the information stored in said cross-reference register 200 is cryptographically protected and written to store in permanent computer memory as files, database records or any suitable means and formats .
  • FIG. 3 shows the process flow 300 executed by said secure file management system 100 to secure an unprotected computer file.
  • the process begins with step 310 in which the user selects a computer file of any format, followed by steps 320 & 330 in which the user creates a text sub-note 122 and inserts a non-text multimedia sub-note 124 respectively to form the file-level multimedia note 120 associated with said unprotected computer file.
  • the user selects an existing group-level multimedia note 130 to associate with said unprotected computer file in step 340, after which the user can edit the text and non-text multimedia sub-notes 132 & 134 of said selected group-level multimedia note 130.
  • the user creates a new group-level multimedia note 130 in step 350.
  • step 360 said secure file management system 100 encrypts the unprotected computer file, said file- level and group-level multimedia notes 120 & 130 with either the same cryptographic key or using one key for protecting said unprotected computer file and another key for encrypting said multimedia notes 120 & 130.
  • process 300 advances to step 370 in which said secure file management system 100 writes the names and other file attributes of said unprotected computer file, generated file name of the encrypted computer file 110, file-level multimedia notes and group level multimedia notes 120 & 130 in said cross-reference register 200, which is securely stored in protected file or database formats .
  • Said cryptographic encryption key can be of any type provided that it is sufficiently strong against attacks.
  • the public cryptographic key of an asymmetric cryptography key pair may be used to encrypt said unprotected computer file and multimedia notes 120 & 130, whereas the private key of said key pair is used to decrypt the encrypted files and notes.
  • the secret private key can be protected in a dedicated file, database or external storage using passwords and additional authentication factors including one-time-passwords and biometric verification techniques.
  • FIG. 4 shows an embodiment of an interactive computer application 400 comprising a graphical user interface for users to perform note creation, editing, browsing, and searching of cryptographically protected data filed in said secure file management system 100.
  • Said computer application 400 comprises a search engine which accepts user-specified search criteria 470.
  • the text and nontext information in said file-level and group-level multimedia notes 120 & 130 can be searched and compared against said user-entered search criteria 470.
  • Search results that are sufficiently close to said search criteria 470 are outputted to the graphical user interface for display, written to dedi- cated files or interfaced to other computer applications which initiate the search.
  • Searchable text information comprises any text content of said file-level and group-level multimedia notes 120 & 130.
  • Said searchable text information includes user created contents, information extracted from file attributes of said computer files 110, information generated automatically based upon time, date and location, and original file name of said computer file 110.
  • Said searchable text information further comprises note subjects, note categories, bookmarks, hyperlinks, highlights and font characteristics used in said file- level and group-level multimedia notes 120 & 130.
  • Search of non-text information comprises techniques employed for image and facial recognition applicable to files storing image and video data, speech recognition and voice recognition applicable to files storing audio data.
  • Search results comprise original file names and attributes of said computer files 110 identified in a search, together with the respective file-level and group-level multimedia notes 120 & 130 associated with said identified files.
  • Said computer application 400 may display said search results as a file list in an appropriate area 480 of its graphical user interface. Users may select any of said identified files from said file list 480 to view its associated multimedia notes.
  • the lists of file-level and group level multimedia notes 120 & 130 associated with any of the listed identified files are respectively displayed as file-level note list 440 and group-level note list 410.
  • the content of said text sub- notes 122 & 132 of said group-level and file-level multimedia notes are displayed respectively in text-note editors 450 & 420.
  • Said text-note editors 450 & 420 carry the functionalities of common document editors supporting the use of availa- ble font types, styles, sizes, colours, bookmarks and hyperlinks.
  • Bookmarks allow quick access when users activate dedicated function buttons provided in the graphical user interface.
  • Hyperlinks provide a convenient means for users to navigate to any of said file-level and group-level multimedia notes 120 & 130, and external locations including directories and folders of said computing environment, website addresses and Internet Protocol addresses accessible from web browsers and related computer applications.
  • Non-text multimedia sub- notes of said file-level and group-level multimedia notes 120 & 130 are displayed respectively in multimedia note areas 460 & 430. Users may select and play any of said displayed multimedia notes in areas 460 & 430 by means of appropriate computer applications launched external to said secure file management system 100. Alternatively, said displayed multimedia notes may be viewed directly in the graphical user interface by means of appropriate computer applications pre-integrated with said secure file management system 100.
  • Content of any listed file identified 480 by said computer application 400 may be selected to display in an appropriate area 490 in the graphical interface.
  • Said search results may also be outputted to said computing environment in data files or interfaced to other applicable computer applications.
  • Creation of the file-level multimedia note 120 can be accomplished with user selecting a computer file, followed by ac- tivating a dedicated function button on said graphical user interface to launch said text note editor 450 for the user to enter the text information as text sub-note 122. Users can further add multimedia files from file folders, cameras and any other sources as non-text multimedia sub-notes 124.
  • FIG. 5 shows a process flow 500 for searching through crypto- graphically protected files in said secure file management system 100 to identify files which sufficiently match user- specified search criteria entered in said interactive computer application 400.
  • the process begins with users entering search criteria in step 510, which comprises text segments associated with said file-level and group-level multimedia notes 120 & 130, note subjects, note categories, bookmarks, hyperlinks and highlights.
  • Search criteria further comprises non-text information including image, audio and video samples for use by the search engine of said secure file management system 100 to identify the intended objects, persons, spoken texts or speakers.
  • the search engine temporarily decrypts all the protected file-level and group- level multimedia notes 120 & 130 and searches through all the sub-notes 122, 124, 132 & 134 in step 530.
  • the contents of said file-level and group-level multimedia notes 120 & 130 can be indexed and stored in a secure database. Indexing may involve the process of scanning the original content, discarding content that carries little contextual information, and retaining the remaining content for scanning in searches. Indexed content, if available, is used to complement and speed up searches in step 522.
  • step 540 computer files 110 associated with multimedia notes 120 & 130 which have contents sufficiently close to said search criteria are identified and listed in appropriate area of said graphical user interface 480.
  • step 540 computer files 110 associated with multimedia notes 120 & 130 which have contents sufficiently close to said search criteria are identified and listed in appropriate area of said graphical user interface 480.
  • step 540 computer files 110 associated with multimedia notes 120 & 130 which have contents sufficiently close to said search criteria are identified and listed in appropriate area of said graphical user interface 480.
  • Temporarily decrypted information is contained within the secure environment of said secure file management system 100 against unauthorized access.
  • all temporarily decrypted files and multimedia notes, and all other non-permanent data are stored in volatile memory which loses all its stored data upon removal of power supply.
  • the present invention provides a method and sys- tern for searchable and secure file management and storage 100 having high level of usability.
  • Computer files 110 in a desktop, portable or mobile environment are associated with file- level and group-level notes 120 & 130 of text and non-text multimedia formats.
  • the multimedia notes 120 & 130 serve to augment the content and enhance ease of handling and search of the computer files 110. All computer files and multimedia notes are cryptographically protected against unauthorized access.
  • Text sub-notes 122 & 132 support a plurality of searchable features including font characteristics, bookmarks, hyperlinks and highlights.
  • Non-text multimedia sub- notes 124 & 134 comprise files of any multimedia formats.
  • a computer application 400 with dedicated graphical interface may be used for users to create, edit, browse and search said file-level and group-level multimedia notes 120 & 130, and display search results based upon user-specified search criteria, which comprise text segments associated with note sub- jects, note categories, bookmarks, hyperlinks, text highlights and text content of said file-level and group-level multimedia notes 120 & 130.
  • Search criteria further comprises non-text information including image, audio and video samples for use to identify the intended objects, persons, spoken texts or speakers.

Abstract

Method and system for secure computer file management and storage are provided. Computer files in a desktop, portable or mobile environment are associated with file-level and group-level notes of text and any multimedia format. The mul- timedia notes serve to provide descriptive information, aug- ment the content and enhance ease of handling and search of the computer files. All computer files and multimedia notes are cryptographically protected against unauthorized access. Text notes support a plurality of searchable font character- istics, bookmarks, hyperlinks and highlights. Non-text notes comprise files of any multimedia formats. A dedicated graph- ical interface may be used for users to create, edit, browse and search said file-level and group-level multimedia notes, and display search results based upon user-specified search criteria.

Description

METHOD AND SYSTEM FOR SECURE COMPUTER FILE MANAGEMENT AND STORAGE HAVING HIGH LEVEL OF USABILITY
FIELD OF THE INVENTION
The present invention relates to method and system of secure computer file management and storage for use in desktop and mobile computing environments applicable to desktop computers, laptops, smart phones and tablet computing devices. More particularly, said computer file management and storage provides strong cryptographical protection of user data with support of multimedia annotations, which permit easy file or- ganization and efficient search of said protected data for accomplishing high level of usability.
BACKGROUND OF THE INVENTION
While cryptography has been widely used to protect personal and business data from unauthorized access, cryptographically protected files are hard for computers to search and users to handle, particularly when the contents, names, descriptions and attributes pertaining to the files are encrypted. Usability and security have been widely reckoned as compromising to each other.
For the sake of increased productivity and easier file han- dling, many users tend to overlook and even neglect data security and privacy. Unprotected data, both personal and corporate, has been the target of malicious codes and intruders. The scale of financial and reputational damages incurred from security breaches has been escalating.
Existing practices address the problem with indexing and que- ry using content related keywords and tags. Many users incorporate plaintext keywords as part of the file name of an encrypted file, or tag a file with short descriptions.
There are many limitations curtailing the use of file names, keywords and tags. File names pose limits on character types and length of name strings. In desktop, mobile smart phone and mobile tablet computing environments, keywords and tags are dependent of file types and operating systems. As an example, keywords entered as part of a file of the Portable Document Format (PDF) cannot be directly used in searches by native file browsers of major operating systems. In addition, tags cannot be added to a Windows folder containing a group of related files. Furthermore, adding keywords and tags to a large number of individual files is very time consuming, in- convenient and very often incomprehensible because of the limited contextual information keywords and tags can carry.
US7689547 has disclosed a method in which the hash values of keyword strings are used for search of encrypted data.
US2009/0300351 has described a means of using an encrypted index derived from keywords defined by the file owner.
US7484092 has disclosed a technique which relies on keywords and file names as indexing information for speeding up search of encrypted files.
While keyword indexing can speed up file search processing, there is a need for a secure computer filing and storage sys- tern which readily allows users to handle their encrypted information with ease. The present invention provides method and system for searchable and secure computer file management and storage having high level of usability. Said computer file management allows the attachment of detailed information of any multimedia format to individual files and groups of files of any format, for augmenting the information stored in said files, and for enhancing usability in terms of file search, readability, operating-system neutral and ease of exporting the encrypted files to remote storage.
SUMMARY OF THE INVENTION
The present application provides method and system for secure computer file management and storage having high level of usability .
A method of secure computer file management and storage is provided. In the method, a computer file of digital content is managed in a computing environment for accomplishing data security against unauthorized access, for ensuring efficient and ease of search by users of the computing environment, and for attaining high level of usability.
The method begins with associating at least one file-level multimedia note with the computer file for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file. The method further associates at least one group-level multimedia note with the computer file for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file together with a plurality of oth- er computer files grouped together by the users. The computer file, file-level and group-level multimedia notes are protected cryptographically against unauthorized access.
The users may comprise human individuals, computer tools and applications in communication and interfaced with the secure computer file management and storage. The computing environment may be any computer operating systems capable of executing the tasks and activities performed by the users, and the computer operating systems may be installed and executing on any fixed and mobile devices including desktop computers, portable computers, tablet computers and mobile smart phones. The computer file may be of any formats supported by the computing environment, and said any formats comprise content- specific and application-specific formats compliant to any open and proprietary standards. The cryptographically protected computer file may be assigned a file name different from its original file name such that deriving the original file name from the assigned file name is impossible. The assigned file name may comprise at least one randomly generated alphanumeric string.
The original file name and attributes of the computer file, together with the names, storage locations, time stamps and other attributes of the cryptographically protected computer file, the file-level multimedia notes and the group-level multimedia notes are cross-referenced, and the cross- reference information is cryptographically protected and stored in suitable means including computer registers, files and database records. The file-level and group-level multimedia notes support sub- notes of any multimedia formats including text, audio, image and video. Each of the non-text multimedia sub-notes of the file-level and group-level multimedia notes comprises at least one multimedia file of any non-text format. The text sub-notes of the file-level and group level multimedia notes comprise a combination of contents created by users, information extracted from file attributes of the computer file and information generated automatically based upon time, date, location and any information deemed suitable. The text sub-notes may support hyperlinks which point to any of the file-level and group-level multimedia notes, and external locations including directories and folders in the computing environment, website addresses and Internet Protocol addresses. The text sub-notes may further support the use of all available character sets, font sizes, font types, font colours, bookmarks, highlights and other features typically performed by document editors, and the text sub-notes have no limitation in the number of characters used.
The text and non-text information in the file-level and group-level multimedia notes can be searched and compared against search criteria specified by the users, and the search results deemed sufficiently close and related to the search criteria are outputted to the computing environment in data files or interfaced to applicable computer applications. The text information searched comprises user created content, extracted file attributes, automatically generated information, said original file name, bookmarks, hyperlinks, font characteristics, highlights, note subjects and categories. The search of non-text information comprises techniques employed for image and facial recognition applicable to files comprising image and video data, speech recognition and voice recognition applicable to files comprising audio data. The search results comprise names, attributes and content of the identified files and the associated file-level and group- level multimedia notes. A dedicated graphical user interface may be used to create, edit, browse and search the file-level multimedia notes and group-level multimedia notes, and display the search results based upon the user-specified search criteria .
The cryptographically protected computer file, file-level and group-level multimedia notes are stored in permanent memory, whereas temporarily decrypted files, associated multimedia notes, and other non-permanent data may be stored in volatile memory which erases its stored data upon removal of power supply .
A system for secure computer file management and storage is provided. The system comprises a computer application which is executed in a computing environment for managing computer files to accomplish data security against unauthorized access, ensure efficient and ease of search by users, and attain high level of usability. Each of the computer files is associated with at least one file-level multimedia note for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file. Furthermore, each of the computer files is associated with at least one group-level multimedia note for providing descriptive information, supplementing the content and enhancing ease of handling and search of the computer file and a plurality of other computer files grouped together by the users. The computer files, the file-level and group-level multimedia notes are cryptographically protected against unauthorized access.
The file-level and group-level multimedia notes support sub- notes of any multimedia formats including text, audio, image and voice formats, with text sub-notes comprising a combination of contents created by users, information extracted from file attributes of the computer files and information generated automatically based upon time, date, location and any information deemed suitable. The text sub-notes further support hyperlinks, bookmarks, highlights and all the available font sizes, font types, font colours and character sets, whereas non-text multimedia sub-notes comprise multimedia files of any non-text format.
The text and non-text information in the file-level and group-level multimedia notes are searchable against user- specified criteria, which comprise text segments, file names, hyperlinks, font characteristics, highlights and bookmarks, and the search criteria further comprising parameters associated with image, speech and voice recognition. The computer application may comprise a dedicated graphical user interface for users to create, edit, browse and search the file-level multimedia notes and group-level multimedia notes, and display search results based upon the user-specified search criteria .
The cryptographically protected computer files, file-level and group-level multimedia notes are stored in permanent memory, and other non-permanent data may be stored in vola- tile memory which erases its stored data upon removal of pow- er supply. BRIEF DESCRIPTION
Embodiments according to the present invention will now be described with reference to the following figures, in which like reference numerals denote like elements.
FIG. 1 illustrates a searchable and secure computer file management and storage system managing a plurality of computer files by means of at least one shared group-level multimedia note, and each of said corn- puter files being further associated with at least one file-level multimedia note ,
FIG. 2 illustrates a secure cross-reference register linking the essential information pertaining to an encrypted computer file managed in the system of FIG. 1,
FIG. 3 shows a process flow executed by said secure file management system of FIG. 1 to protect a computer file cryptographically,
FIG. 4 shows an embodiment of an interactive computer application for users to perform note editing, browsing, and searching of cryptographically protected data managed in the system of FIG. 1, and
FIG. 5 shows a process flow for searching through cryptographically protected computer files managed by the system of FIG. 1. DETAILED DESCRIPTION
The present invention may be understood more readily by reference to the following detailed description of certain embodiments of the invention.
FIG. 1 illustrates a searchable and secure computer file management and storage system 100 (hereinafter referred to as "secure file management system") managing a plurality of computer files of digital content 110 for accomplishing data security against unauthorized access while maintaining high level of usability in terms of file management, handling and information search. Said secure file management system 100 associates said computer files 110 collectively with at least one group-level multimedia note 130. Each of said computer files 110 is further associated with at least one file-level multimedia note 120.
Said secure file management system 100 executes in a computer environment comprising any computer operating system capable of executing all the required computing tasks and related user-specific and application-specific computing activities. Said computing environment executes on any fixed and mobile user devices including desktop computers, portable computers, tablet computers and mobile smart phones . Said computer operating system includes but not limited to Windows, Linux, Mac, Unix, Android and iOS .
Said file-level multimedia note 120 comprises a plurality of text sub-notes 122 and non-text multimedia sub-notes 124, each of which serves to provide descriptive information, sup- plement the content of its associated computer file 110, as well as facilitate file search. Said group-level multimedia note 130 comprises a plurality of text sub-notes 132 and nontext multimedia sub-notes 134, which serve to provide de- scriptive information, supplement the content of said computer files 110 grouped together by said users, as well as facilitate file search.
Without loss of generality, users comprise human individuals and computer applications in communication and interfaced with the secure file management system 100.
Said computer files 110 can be of any formats as long as they are supported in said computing environment in which said se- cure file management system 100 executes. Said any formats include all content-specific and application-specific formats compliant to open and proprietary standards.
Said file-level multimedia notes 120 and group-level multime- dia notes 130 support sub-notes of any multimedia formats including text, audio, image and video.
Said text sub-notes 122 & 132 comprise contents created by users, information extracted from file attributes of said computer files 110 and information generated automatically based upon time, date, location and any information deemed suitable. Furthermore, said text sub-notes 122 & 132 support hyperlinks which point to any of said file-level and group- level multimedia notes 120 & 130, and external locations in- eluding directories and folders of said computing environment, website addresses and Internet Protocol addresses accessible from web browsers and related computer applications. In addition, said text sub-notes 122 & 132 support the use of all available character sets, font sizes and types, font colours, bookmarks, highlights and other features performed by typical document editors. Besides, there is no limitation in the number of characters used.
Each of said non-text multimedia sub-notes 124 & 134 of file- level and group-level multimedia notes 120 & 130 comprises at least one multimedia file of any non-text format.
All text sub-notes 122 & 132 and non-text multimedia sub- notes 124 & 134 can be created, edited, browsed (140) and searched (150) by said users. Said computer files 110, file-level multimedia notes 120 and group-level multimedia notes 130 are protected cryptograph- ically before they are transferred to permanent memory, such as computer hard disks, for storage. As an illustration, a movie file is protected cryptograph- ically by said secure file management system 100 of the present invention. In order to accomplish high level of security and usability, the user may enter text description about the movie in the text sub-note 122 of said file-level multimedia note 120. Information about the plot and reviews of the movie may be recorded in said text sub-note. The user may attach photographic image files of the actors and an audio file carrying an interview of the lead actors as the non-text multimedia sub-note 124 of said file-level multimedia note 120. The user may group this movie file with other movies produced by the same director using a group-level multimedia note 130. The user may enter the biographical data of the director as the text sub-note 132, and attach photographic image files of the director as non-text multimedia sub-notes 134 of said group-level multimedia note 130. FIG. 2 illustrates a secure cross-reference register 200 linking the essential information pertaining to any of the computer files 110 stored in the secure file management system 100. Said register 200 comprises first sub-register 220 storing the name and other attributes of the original comput- er file, which is the unprotected version of said computer file 110. Said cross-reference register 200 further comprises second sub-register 230 which stores the name, the location of storage, time stamps and other attributes of the crypto- graphically protected computer file 110. Said protected com- puter file 110 is assigned a file name different from its original file name such that deriving the original file name from the assigned file name is impossible. Said assigned file name may comprise at least one randomly generated alphanumeric string.
Upon completing the process of protecting said original computer file cryptographically, said secure file management system 100 prompts the user to erase said original computer file. Alternatively, said secure file management system 100 performs erasure of the original file automatically. The algorithm used to erase the original file may comprise zeroiza- tion and overwriting of said original and unprotected file with randomized data such that said original computer file is not recoverable.
Said cross-reference register 200 further comprises third sub-register 240 which stores the identifier, the location of storage, time stamps and other attributes of the file-level multimedia note 120 associated with said computer file 110. Said register 200 further comprises fourth sub-register 240 which stores the identifier, the location of storage, time stamps and other attributes of the group-level multimedia note 120 associated with said computer file together with other computer files grouped by the users.
The information stored in said cross-reference register 200 is cryptographically protected and written to store in permanent computer memory as files, database records or any suitable means and formats .
FIG. 3 shows the process flow 300 executed by said secure file management system 100 to secure an unprotected computer file. The process begins with step 310 in which the user selects a computer file of any format, followed by steps 320 & 330 in which the user creates a text sub-note 122 and inserts a non-text multimedia sub-note 124 respectively to form the file-level multimedia note 120 associated with said unprotected computer file. Next, the user selects an existing group-level multimedia note 130 to associate with said unprotected computer file in step 340, after which the user can edit the text and non-text multimedia sub-notes 132 & 134 of said selected group-level multimedia note 130. Alternatively, the user creates a new group-level multimedia note 130 in step 350. Next in step 360, said secure file management system 100 encrypts the unprotected computer file, said file- level and group-level multimedia notes 120 & 130 with either the same cryptographic key or using one key for protecting said unprotected computer file and another key for encrypting said multimedia notes 120 & 130. Next, process 300 advances to step 370 in which said secure file management system 100 writes the names and other file attributes of said unprotected computer file, generated file name of the encrypted computer file 110, file-level multimedia notes and group level multimedia notes 120 & 130 in said cross-reference register 200, which is securely stored in protected file or database formats .
Said cryptographic encryption key can be of any type provided that it is sufficiently strong against attacks. For instance, the public cryptographic key of an asymmetric cryptography key pair may be used to encrypt said unprotected computer file and multimedia notes 120 & 130, whereas the private key of said key pair is used to decrypt the encrypted files and notes. The secret private key can be protected in a dedicated file, database or external storage using passwords and additional authentication factors including one-time-passwords and biometric verification techniques. FIG. 4 shows an embodiment of an interactive computer application 400 comprising a graphical user interface for users to perform note creation, editing, browsing, and searching of cryptographically protected data filed in said secure file management system 100.
Said computer application 400 comprises a search engine which accepts user-specified search criteria 470. The text and nontext information in said file-level and group-level multimedia notes 120 & 130 can be searched and compared against said user-entered search criteria 470. Search results that are sufficiently close to said search criteria 470 are outputted to the graphical user interface for display, written to dedi- cated files or interfaced to other computer applications which initiate the search.
Searchable text information comprises any text content of said file-level and group-level multimedia notes 120 & 130. Said searchable text information includes user created contents, information extracted from file attributes of said computer files 110, information generated automatically based upon time, date and location, and original file name of said computer file 110. Said searchable text information further comprises note subjects, note categories, bookmarks, hyperlinks, highlights and font characteristics used in said file- level and group-level multimedia notes 120 & 130. Search of non-text information comprises techniques employed for image and facial recognition applicable to files storing image and video data, speech recognition and voice recognition applicable to files storing audio data. Search results comprise original file names and attributes of said computer files 110 identified in a search, together with the respective file-level and group-level multimedia notes 120 & 130 associated with said identified files. Said computer application 400 may display said search results as a file list in an appropriate area 480 of its graphical user interface. Users may select any of said identified files from said file list 480 to view its associated multimedia notes. The lists of file-level and group level multimedia notes 120 & 130 associated with any of the listed identified files are respectively displayed as file-level note list 440 and group-level note list 410. The content of said text sub- notes 122 & 132 of said group-level and file-level multimedia notes are displayed respectively in text-note editors 450 & 420. Said text-note editors 450 & 420 carry the functionalities of common document editors supporting the use of availa- ble font types, styles, sizes, colours, bookmarks and hyperlinks. Bookmarks allow quick access when users activate dedicated function buttons provided in the graphical user interface. Hyperlinks provide a convenient means for users to navigate to any of said file-level and group-level multimedia notes 120 & 130, and external locations including directories and folders of said computing environment, website addresses and Internet Protocol addresses accessible from web browsers and related computer applications. Non-text multimedia sub- notes of said file-level and group-level multimedia notes 120 & 130 are displayed respectively in multimedia note areas 460 & 430. Users may select and play any of said displayed multimedia notes in areas 460 & 430 by means of appropriate computer applications launched external to said secure file management system 100. Alternatively, said displayed multimedia notes may be viewed directly in the graphical user interface by means of appropriate computer applications pre-integrated with said secure file management system 100. Content of any listed file identified 480 by said computer application 400 may be selected to display in an appropriate area 490 in the graphical interface.
Said search results may also be outputted to said computing environment in data files or interfaced to other applicable computer applications.
Creation of the file-level multimedia note 120 can be accomplished with user selecting a computer file, followed by ac- tivating a dedicated function button on said graphical user interface to launch said text note editor 450 for the user to enter the text information as text sub-note 122. Users can further add multimedia files from file folders, cameras and any other sources as non-text multimedia sub-notes 124.
Creation of the group-level multimedia note 130 can be accomplished with user selecting a computer file, followed by activating a dedicated function button on said graphical user interface to launch said text note editor 420 for the user to enter the text information as text sub-note 132. Users can further add multimedia files from file folders, cameras and any other sources as non-text multimedia sub-notes 134. FIG. 5 shows a process flow 500 for searching through crypto- graphically protected files in said secure file management system 100 to identify files which sufficiently match user- specified search criteria entered in said interactive computer application 400. The process begins with users entering search criteria in step 510, which comprises text segments associated with said file-level and group-level multimedia notes 120 & 130, note subjects, note categories, bookmarks, hyperlinks and highlights. Search criteria further comprises non-text information including image, audio and video samples for use by the search engine of said secure file management system 100 to identify the intended objects, persons, spoken texts or speakers. In the next step 520, the search engine temporarily decrypts all the protected file-level and group- level multimedia notes 120 & 130 and searches through all the sub-notes 122, 124, 132 & 134 in step 530. The contents of said file-level and group-level multimedia notes 120 & 130 can be indexed and stored in a secure database. Indexing may involve the process of scanning the original content, discarding content that carries little contextual information, and retaining the remaining content for scanning in searches. Indexed content, if available, is used to complement and speed up searches in step 522. Next, the process advances to step 540 in which computer files 110 associated with multimedia notes 120 & 130 which have contents sufficiently close to said search criteria are identified and listed in appropriate area of said graphical user interface 480. Moreover, the as- sociated file-level and group-level multimedia notes 120 &
130 are displayed in appropriate areas of said graphical user interface 410, 420, 430, 440, 450 & 460. Should the search (530) fail to identify any computer file, all prior search results displayed are cleared in step 550.
Temporarily decrypted information is contained within the secure environment of said secure file management system 100 against unauthorized access. In one embodiment of implementing said secure environment, all temporarily decrypted files and multimedia notes, and all other non-permanent data are stored in volatile memory which loses all its stored data upon removal of power supply.
In summary, the present invention provides a method and sys- tern for searchable and secure file management and storage 100 having high level of usability. Computer files 110 in a desktop, portable or mobile environment are associated with file- level and group-level notes 120 & 130 of text and non-text multimedia formats. The multimedia notes 120 & 130 serve to augment the content and enhance ease of handling and search of the computer files 110. All computer files and multimedia notes are cryptographically protected against unauthorized access. Text sub-notes 122 & 132 support a plurality of searchable features including font characteristics, bookmarks, hyperlinks and highlights. Non-text multimedia sub- notes 124 & 134 comprise files of any multimedia formats. A computer application 400 with dedicated graphical interface may be used for users to create, edit, browse and search said file-level and group-level multimedia notes 120 & 130, and display search results based upon user-specified search criteria, which comprise text segments associated with note sub- jects, note categories, bookmarks, hyperlinks, text highlights and text content of said file-level and group-level multimedia notes 120 & 130. Search criteria further comprises non-text information including image, audio and video samples for use to identify the intended objects, persons, spoken texts or speakers.
Although the above description contains much specificity, these should not be construed as limiting the scope of the embodiments but merely providing illustration of the foresee- able embodiments. Especially the above stated advantages of the embodiments should not be construed as limiting the scope of the embodiments but merely to explain possible achievements if the described embodiments are put into practise. Thus, the scope of the embodiments should be determined by the claims and their equivalents, rather than by the examples given .

Claims

1. A method of secure computer file management and storage, wherein
a computer file of digital content is managed in a computing environment for accomplishing data security against unauthorized access, for ensuring efficient and ease of search by users of said computing environment, and for attaining high level of usability, and
the method comprising the steps of
associating at least one file-level multimedia note with said computer file for providing descriptive information, supplementing the content and enhancing ease of handling and search of said computer file, and
associating at least one group-level multimedia note with said computer file for providing descriptive information, supplementing the content and enhancing ease of handling and search of said computer file together with a plurality of other computer files grouped together by said users, and
protecting cryptographically said computer file, said file-level and group-level multimedia notes against unauthorized access.
2. The method of claim 1, wherein
said users comprising human individuals, computer tools and applications in communication and interfaced with said secure computer file management and storage.
3. The method of claims 1 or 2, wherein
said computing environment being any computer operating systems capable of executing the tasks and activi- ties performed by said users, and said computer operating systems being installed and executing on any fixed and mobile devices including desktop computers, portable computers, tablet computers and mobile smart phones.
4. The method of claim 1, wherein
said computer file is of any formats supported by said computing environment, and said any formats comprising content-specific and application-specific formats compliant to any open and proprietary standards.
5. The method of claim 1, wherein
said cryptographically protected computer file being assigned a file name different from its original file name such that deriving the original file name from the assigned file name is impossible.
6. The method of claim 5, wherein
said assigned file name comprising at least one randomly generated alphanumeric string.
The method of claims 1 or 5, wherein
the original file name and attributes of said computer file, together with the names, storage locations, time stamps and other attributes of said cryptographically protected computer file, said file-level multimedia notes and said group-level multimedia notes being cross-referenced, and the cross-reference information being cryptographically protected and stored in suitable means including computer registers, files and database records .
8. The method of claim 1, wherein
said file-level and group-level multimedia notes supporting sub-notes of any multimedia formats including text, audio, image and video.
9. The method of claim 8, wherein
each of the non-text multimedia sub-notes of said file-level and group-level multimedia notes comprising at least one multimedia file of any non-text format.
10. The method of claim 8, wherein
the text sub-notes of said file-level and group level multimedia notes comprising a combination of contents created by users, information extracted from file attributes of said computer file and information generated automatically based upon time, date, location and any information deemed suitable.
11. The method of claim 10, wherein
said text sub-notes supporting hyperlinks which point to any of said file-level and group-level multimedia notes, and external locations including directories and folders in said computing environment, website addresses and Internet Protocol addresses.
12. The method of claims 8 or 10, wherein
said text sub-notes supporting the use of all available character sets, font sizes, font types, font colours, bookmarks, highlights and other features typically performed by document editors, and said text sub- notes having no limitation in the number of characters used .
The method of claims 1 or 2 wherein
the text and non-text information in said file- level and group-level multimedia notes being searched and compared against search criteria specified by said users, and the search results deemed sufficiently close and related to the search criteria being outputted to said computing environment in data files or interfaced to applicable computer applications.
The method of claims 5, 10, 11, 12 or 13, wherein
said text information searched comprising said user created content, said extracted file attributes, said automatically generated information, said original file name, said bookmarks, hyperlinks, font characteristics, highlights, note subjects and categories.
The method of claims 13 wherein
said search of non-text information comprising techniques employed for image and facial recognition applicable to files storing image and video data, speech recognition and voice recognition applicable to files storing audio data.
The method of claim 13 wherein
said search results comprising names, attributes and content of the identified files and said associated file-level and group-level multimedia notes.
The method of claims 1, 10, 13, 14, 15 or 16 wherein a dedicated graphical user interface being used to create, edit, browse and search said file-level multime- dia notes and group-level multimedia notes, and display said search results based upon said user-specified search criteria.
18. The method of claim 1, wherein
said cryptographically protected computer file, file-level and group-level multimedia notes being stored in permanent memory, whereas temporarily decrypted files, associated multimedia notes, and other non- permanent data being stored in volatile memory which erases its stored data upon removal of power supply.
19. A system for secure computer file management and storage comprising
a computer application being executed in a computing environment for managing computer files to accomplish data security against unauthorized access, ensure efficient and ease of search by users, and attain high level of usability, wherein
each of said computer files being associated with at least one file-level multimedia note for providing descriptive information, supplementing the content and enhancing ease of handling and search of said computer file,
each of said computer files being associated with at least one group-level multimedia note for providing descriptive information, supplementing the content and enhancing ease of handling and search of said computer file and a plurality of other computer files grouped together by said users, and said computer files, said file-level and group- level multimedia notes being cryptographically protected against unauthorized access.
The system of claim 19, wherein
said file-level and group-level multimedia notes supporting sub-notes of any multimedia formats including text, audio, image and voice formats, with
text sub-notes comprising a combination of contents created by users, information extracted from file attributes of said computer files and information generated automatically based upon time, date, location and any information deemed suitable, and said text sub-notes supporting hyperlinks, bookmarks, highlights and all the available font sizes, font types, font colours and character sets, and
non-text multimedia sub-notes comprising multimedia files of any non-text format.
The system of claim 20, wherein
said text and non-text information in said file- level and group-level multimedia notes being searchable against user-specified criteria, which comprise text segments, file names, hyperlinks, font characteristics, highlights and bookmarks, and said search criteria further comprising parameters associated with image, speech and voice recognition.
The system of claims 19, 20 or 21, wherein
said computer application comprising a dedicated graphical user interface for users to create, edit, browse and search said file-level multimedia notes and group-level multimedia notes, and display search results based upon said user-specified search criteria.
The system of claim 19, wherein
said cryptographically protected computer files, file-level and group-level multimedia notes being stored in permanent memory, and other non-permanent data being stored in volatile memory which erases its stored data upon removal of power supply.
PCT/IB2012/055990 2012-10-30 2012-10-30 Method and system for secure computer file management and storage having high level of usability WO2014068362A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/IB2012/055990 WO2014068362A1 (en) 2012-10-30 2012-10-30 Method and system for secure computer file management and storage having high level of usability
SG11201501347TA SG11201501347TA (en) 2012-10-30 2012-10-30 Method and system for secure computer file management and storage having high level of usability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2012/055990 WO2014068362A1 (en) 2012-10-30 2012-10-30 Method and system for secure computer file management and storage having high level of usability

Publications (1)

Publication Number Publication Date
WO2014068362A1 true WO2014068362A1 (en) 2014-05-08

Family

ID=50626560

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2012/055990 WO2014068362A1 (en) 2012-10-30 2012-10-30 Method and system for secure computer file management and storage having high level of usability

Country Status (2)

Country Link
SG (1) SG11201501347TA (en)
WO (1) WO2014068362A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002078238A2 (en) * 2001-03-27 2002-10-03 Microsoft Corporation Distributed, scalable cryptographic acces control
US20050223224A1 (en) * 1999-09-07 2005-10-06 Emc Corporation System and method for secure storage, transfer and retrieval of content addressable information
US20100306552A1 (en) * 2000-09-22 2010-12-02 Sca Ipla Holdings Inc. Systems and methods for preventing unauthorized use of digital content
US20100332479A1 (en) * 2009-06-30 2010-12-30 Anand Prahlad Performing data storage operations in a cloud storage environment, including searching, encryption and indexing
EP2320373A2 (en) * 2000-04-14 2011-05-11 Accenture LLP Insurance file note generation method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050223224A1 (en) * 1999-09-07 2005-10-06 Emc Corporation System and method for secure storage, transfer and retrieval of content addressable information
EP2320373A2 (en) * 2000-04-14 2011-05-11 Accenture LLP Insurance file note generation method and system
US20100306552A1 (en) * 2000-09-22 2010-12-02 Sca Ipla Holdings Inc. Systems and methods for preventing unauthorized use of digital content
WO2002078238A2 (en) * 2001-03-27 2002-10-03 Microsoft Corporation Distributed, scalable cryptographic acces control
US20100332479A1 (en) * 2009-06-30 2010-12-30 Anand Prahlad Performing data storage operations in a cloud storage environment, including searching, encryption and indexing

Also Published As

Publication number Publication date
SG11201501347TA (en) 2015-03-30

Similar Documents

Publication Publication Date Title
US10839104B2 (en) Obfuscating information related to personally identifiable information (PII)
US9058505B2 (en) Providing access control for public and private document fields
CN101436175B (en) System and method for controlling comments in a collaborative document
US8392706B2 (en) Method and system for searching for, and collecting, electronically-stored information
KR101597930B1 (en) A video file encryption and decryption method, device, and mobile terminal
KR101033511B1 (en) Method for protecting private information and computer readable recording medium therefor
JP3457184B2 (en) Search device and medium storing control program therefor
US9639708B2 (en) Methods and systems of encrypting file system directories
CN109547215B (en) Document information protection method based on mobile terminal fingerprint
EP2778953A1 (en) Encoded-search database device, method for adding and deleting data for encoded search, and addition/deletion program
US8972747B2 (en) Managing information in a document serialization
CN113836558A (en) File encryption method, device and file decryption method
Park et al. Research on Note-Taking Apps with Security Features.
JP4992109B2 (en) File protection system, file protection method, and computer program
WO2004001561A2 (en) Computer encryption systems
JP2008527518A (en) Portable data carrier with digital watermark function
WO2014068362A1 (en) Method and system for secure computer file management and storage having high level of usability
CN113326526A (en) Data access method, device, equipment and storage medium
JP4338185B2 (en) How to encrypt / decrypt files
JP2011100334A (en) Document file retrieval system, document file registration method, document file retrieval method, program, and recording medium
US20130036474A1 (en) Method and Apparatus for Secure Data Representation Allowing Efficient Collection, Search and Retrieval
KR102417811B1 (en) Document translation service server which provides document translation services with personal information protection function and the operating method thereof
KR102417814B1 (en) Electronic document management server that supports security settings for some content embedded in electronic documents based on member identification information and operating method thereof
CN113360859B (en) Python interpreter-based encrypted file security control method and device
CN112214778A (en) Method and system for realizing discrete encryption of local file through virtual file

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12887627

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12887627

Country of ref document: EP

Kind code of ref document: A1