Information security architecture for encrypting documents for remote access while maintaining access control
First Claim
1. A method of controlling distribution of a segment of encrypted electronic information, comprising:
- receiving, from a key server, a protected decryption key associated with the segment;
retrieving, at a user location, the segment;
obtaining an unprotected copy of the decryption key from the protected decryption key;
decrypting, in response to said obtaining, the segment using the unprotected copy of the decryption key;
destroying the unprotected copy of the decryption key at the user location in response to said decrypting;
displaying the decrypted segment in response to said decrypting; and
destroying the decrypted segment in response to said displaying.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling distribution of a segment of encrypted electronic information is presented. A key server receives a protected copy of a decryption key for the segment The segment is retrieved at a user location. The protected copy of the decryption key is accessed. In response to the accessing, the segment is decrypted using the accessed copy of the decryption key at the user location. The accessed copy of the decryption key is destroyed at the user location in response to the decrypting. The decrypted segment is displayed in response to the decrypting. The decrypted segment is destroyed in response to the displaying.
-
Citations
27 Claims
-
1. A method of controlling distribution of a segment of encrypted electronic information, comprising:
-
receiving, from a key server, a protected decryption key associated with the segment;
retrieving, at a user location, the segment;
obtaining an unprotected copy of the decryption key from the protected decryption key;
decrypting, in response to said obtaining, the segment using the unprotected copy of the decryption key;
destroying the unprotected copy of the decryption key at the user location in response to said decrypting;
displaying the decrypted segment in response to said decrypting; and
destroying the decrypted segment in response to said displaying. - View Dependent Claims (2, 3, 4)
-
-
5. A method for issuing a key lease, comprising:
-
receiving, at a remote server, a request to lease a decryption key for an encrypted electronic segment;
determining whether a key lease can be issued for the encrypted electronic information based on at least one of a remote server restriction, an information restriction, and a user restriction;
creating a voucher in response to a determination that the key lease can be issued, said voucher including at least the decryption key, and at least one time limitation associated with the decryption key;
encrypting at least the decryption key of the voucher; and
sending the voucher to the user location. - View Dependent Claims (6, 7, 8, 9, 10, 11, 13, 14, 16, 18, 19, 20, 21)
-
-
12. A method of controlling distribution of electronic information, comprising:
-
sending, from a user location to a key server, a request to access a protected segment, and a first information;
receiving, at the user location from the key server, an encrypted voucher and a second information, said voucher including at least a decryption key associated with the segment;
retrieving, at a user location, the segment;
obtaining a decrypted copy of the decryption key using the first and second information;
accessing, in response to said decrypting, the segment using the at least a portion of the voucher;
destroying, in response to said accessing, the decrypted copy of the decryption key.
-
-
15. A method for controlling distribution of electronic information, comprising:
-
retrieving, at a user location, a segment of encrypted electronic information;
receiving, from a key server, an encrypted decryption key for the segment;
saving said encrypted decryption key in a memory;
obtaining a decrypted copy of the decryption key in response to an authorized user request to access the segment;
accessing the segment using the decrypted copy of the decryption key at the user location for the segment; and
destroying the decrypted copy of the decryption key at the user location in response to said accessing without destroying the encrypted decryption key in memory.
-
-
17. A method of accessing a protected segment of electronic information, the segment having an associated key, comprising:
-
retrieving, at the user location, the segment;
receiving, at the user location from the remote server, the key;
accessing the segment, in response to said receiving, using the key;
displaying the segment as accessed;
destroying the key in response to one of said displaying and said accessing, wherein the key is never stored in memory at a user location between said receiving and said destroying;
receiving, at the user location from the remote server, an encrypted key lease including the key;
saving the encrypted key lease in a memory;
breaking a connection between the user location and the remote server; and
during a period of the broken connection;
retrieving, at the user location, the segment;
obtaining a decrypted copy of the key from the key lease;
accessing the segment in response to said obtaining;
displaying the segment as accessed; and
destroying the decrypted copy of the key in response to one of said displaying and said accessing.
-
-
22. A method of viewing a segment of encrypted electronic information on a display, comprising:
-
receiving, from a remote server, an encrypted decryption key for the segment;
retrieving, at a user location, a segment of encrypted electronic information;
first decrypting the encrypted decryption key in response to the presence of authorized conditions;
second decrypting the segment using the decrypted decryption key;
destroying, at the user location, all copies of the decrypted decryption key in response to said second decrypting, without destroying the encrypted decryption key;
displaying the segment as decrypted on the display; and
destroying, at the user location, the segment as decrypted in response to said displaying. - View Dependent Claims (25, 27)
-
-
23. A method of controlling distribution of a segment of encrypted electronic information, the segment having a first and second portion, the method comprising:
-
receiving, from a key server, an encrypted voucher, the voucher including first and second decryption keys associated with the first and second portions, respectively, retrieving, at a user location, the segment;
accessing the protected copy of the first decryption key;
decrypting, in response to said accessing, the first portion of the segment using the accessed copy of the first decryption key;
destroying the accessed copy of the first decryption key at the user location in response to said decrypting;
displaying the decrypted segment in response to one of said decrypting and said destroying;
destroying the decrypted first portion in response to said displaying;
accessing the protected copy of the second decryption key after said destroying the first decrypted segment; and
decrypting, in response to said accessing the protected copy of the second decryption key, the second portion of the segment using the accessed copy of the second decryption key.
-
-
24. A method of limiting access to a segment of encrypted information, comprising:
-
saving, at a remote server, a decryption key for the segment, the segment being at a location other than the remote server;
receiving a request from an authorized user for the decryption key;
sending a copy of the decryption key from the remote server to a source of the request;
destroying the decryption key at the remote server in response to the elapse of a predetermined period of time.
-
-
26. A system for accessing a protected segment of electronic information, comprising:
-
means for receiving, from a key server, a protected decryption key associated with said segment;
means for retrieving, at a user location, said segment;
means for obtaining an unprotected copy of said decryption key from said protected decryption key;
means for decrypting, in response to said obtaining, said segment using said unprotected copy of said decryption key;
means for destroying said unprotected copy of said decryption key at said user location in response to said decrypting;
means for displaying said decrypted segment in response to said decrypting; and
means for destroying said decrypted segment in response to said displaying.
-
Specification