Secure content objects
First Claim
1. A method for protecting an electronic document, comprising:
- encrypting the electronic document using a document encryption key;
generating a multi-key encryption table for use in a multi-key encryption method, the table comprising at least one multi-key component;
generating an encrypted header comprising information pertaining to the electronic document;
associating a user interface device with the encrypted header, the multi-key encryption table and the encrypted electronic document, wherein the user interface device comprises unencrypted information for identifying the electronic document and an interactive element for enabling a user to input a user authorization for access to at least a portion of the encrypted electronic document;
combining the user authorization with each of the stored multi-key components in the multi-key encryption key table to decrypt the encrypted header; and
upon a valid decryption of the encrypted header, decrypting the portion of the encrypted electronic document.
8 Assignments
0 Petitions
Accused Products
Abstract
A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.
-
Citations
42 Claims
-
1. A method for protecting an electronic document, comprising:
-
encrypting the electronic document using a document encryption key;
generating a multi-key encryption table for use in a multi-key encryption method, the table comprising at least one multi-key component;
generating an encrypted header comprising information pertaining to the electronic document;
associating a user interface device with the encrypted header, the multi-key encryption table and the encrypted electronic document, wherein the user interface device comprises unencrypted information for identifying the electronic document and an interactive element for enabling a user to input a user authorization for access to at least a portion of the encrypted electronic document;
combining the user authorization with each of the stored multi-key components in the multi-key encryption key table to decrypt the encrypted header; and
upon a valid decryption of the encrypted header, decrypting the portion of the encrypted electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
15. A secure content object, comprising:
-
an encrypted electronic document having been encrypted with a document encryption key;
an encrypted header comprising information pertaining to the electronic document;
a multi-key encryption table for use in a multi-key encryption method, the table comprising at least one multi-key component;
a user interface device comprising unencrypted information for identifying the electronic document and an interactive element for enabling a user to input a user authorization for access to at least a portion of the encrypted electronic document, for inputting the user authorization to a decryption engine using the multi-key encryption method for combining the user authorization with each of the multi-key components in the multi-key encryption key table to decrypt the encrypted header, and upon a valid decryption of the encrypted header, for enabling decryption of the portion of the encrypted electronic document.
-
-
31. A system for protecting an electronic document, comprising:
-
a memory storing a secure content object and a multi-key encryption key table for use in a multi-key encryption method, the table comprising at least one multi-key component;
wherein the secure content object comprises an encrypted electronic document having been encrypted with a document encryption key and an encrypted header, wherein the encrypted header comprises information pertaining to the electronic document, and a user interface device comprising unencrypted information for identifying the electronic document and an interactive element for enabling a user to input a user authorization for access to at least a portion of the encrypted electronic document and, upon a valid decryption of the encrypted header, for enabling decryption of the portion of the encrypted electronic document;
a decryption engine which uses a multi-key encryption method; and
a processor for executing the interactive element and for inputting the user authorization to the decryption engine;
wherein the decryption engine combines the user authorization with each of the multi-key components in the multi-key table to decrypt the encrypted header, wherein a valid decryption of the encrypted header indicates the document encryption key has been found. - View Dependent Claims (32, 33, 36, 37, 38, 39, 40, 41, 42)
-
-
34. A method for creating a document with secure annotations, comprising:
-
providing an electronic document;
providing an annotation pertaining to the electronic document;
encrypting the annotation using an encryption key associated with a user generating the annotation, wherein access to the encrypted annotation is available to users having access to the annotation encryption key;
associating the encrypted annotation with the electronic document such that access to electronic document is provided to at least one user and access to the encrypted annotation is provided only to users having the annotation encryption key.
-
-
35. A method for creating a document with secure annotations, comprising:
-
providing an electronic document, wherein access to the electronic document is available to a first set of users;
generating a plurality of annotations pertaining to the electronic document using the document language;
encrypting each annotation using an annotation encryption key associated with a user generating the particular annotation, wherein access to an encrypted annotation is available to users having access to the respective annotation encryption key;
concatenating the plurality of encrypted annotations in a second electronic document; and
associating the second electronic document with the electronic document such that access to the electronic document is available to the first set of users and access to the encrypted annotations in the separate file is provided only to users having the required encryption keys.
-
Specification