System and method for providing manageability to security information for secured items
First Claim
1. A method for accessing a secured file, said method comprising the acts of:
- (a) obtaining the secured file to be accessed, the secured file having a header portion and a data portion;
(b) retrieving a security information pointer from the header portion of the secured file;
(c) obtaining security information for the secured file using the security information pointer; and
(d) permitting access to the secured file to the extent permitted by the security information.
6 Assignments
0 Petitions
Accused Products
Abstract
Improved approaches for accessing secured digital assets (e.g., secured items) are disclosed. In general, digital assets that have been secured (secured digital assets) can only be accessed by authenticated users with appropriate access rights or privileges. Each secured digital asset is provided with a header portion and a data portion, where the header portion includes a pointer to separately stored security information. The separately stored security information is used to determine whether access to associated data portions of secured digital assets is permitted. These improved approaches can facilitate the sharing of security information by various secured digital assets and thus reduce the overall storage space for the secured digital assets. These improved approaches can also facilitate efficient management of security for digital assets.
-
Citations
42 Claims
-
1. A method for accessing a secured file, said method comprising the acts of:
-
(a) obtaining the secured file to be accessed, the secured file having a header portion and a data portion;
(b) retrieving a security information pointer from the header portion of the secured file;
(c) obtaining security information for the secured file using the security information pointer; and
(d) permitting access to the secured file to the extent permitted by the security information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer readable medium including at least computer program code for accessing a secured item, said computer readable medium comprises:
-
computer program code for obtaining the secured item to be accessed, the secured item having a header portion and a data portion;
computer program code for retrieving a security information pointer from the header portion of the secured item;
computer program code for obtaining security information for the secured item using the security information pointer; and
computer program code for permitting access to the secured item to the extent permitted by the security information. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for accessing a secured item, the secured item having a header portion and an encrypted data portion, the header portion including a pointer and an encrypted key, said system comprising:
-
a storage device, said storage device storing security information for a plurality of different secured items, the pointer serving to locate the security information associated with secured item;
a first decryption module, said first decryption module receiving the encrypted key from the header portion of the secured item and decrypting the encrypted key to obtain a key;
an access analyzer operatively connected to said storage device, said access rules analyzer determines whether the encrypted data portion is permitted to be accessed by a requestor based on the security information; and
a second decryption module operatively connected to said access analyzer, said second decryption module decrypting the encrypted data portion using the key to produce an unencrypted data portion that the requestor is able to access, provided said access analyzer determines that the encrypted data portion is permitted to be accessed by the requestor. - View Dependent Claims (38)
-
-
39. A data structure for a secured file, said data structure comprising:
-
a header portion containing at least a pointer to separately stored security information and a key, at least the key portion of said header portion is encrypted; and
a data portion containing at least encrypted data of the secured file. - View Dependent Claims (40, 41, 42)
-
Specification