Security containers for document components
First Claim
1. A security container that secures a document component by encapsulating, within the security container, the document component, conditional logic for controlling operations on the document component, and key distribution information usable for controlling access to the document component.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
359 Citations
28 Claims
- 1. A security container that secures a document component by encapsulating, within the security container, the document component, conditional logic for controlling operations on the document component, and key distribution information usable for controlling access to the document component.
- 4. A method of securing document content using security containers, comprising the step of encapsulating, within a security container, a document component, conditional logic for controlling operations on the document component, and key distribution information usable for controlling access to the document component.
-
19. A computer program product for securing document content using security containers, the computer program product embodied on one or more computer-readable media and comprising:
-
computer-readable program code means for receiving, from a requester, a request to access document content, wherein the document content is encapsulated as a document component within a security container along with conditional logic for controlling operations on the document component and key distribution information usable for controlling access to the document component;
computer-readable program code means for programmatically determining, using the key distribution information, whether the requester is authorized to access the document component; and
computer-readable program code means for programmatically evaluating, using the conditional logic, whether the request can be granted, when operation of the computer-readable program code means for programmatically determining yields a positive result, and for rejecting the request when operation of the computer-readable program code means for programmatically determining yields a negative result.
-
-
20. A system for securing document content using security containers, comprising:
-
a security container that encapsulates a document component, conditional logic for controlling operations on the document component, and key distribution information usable for controlling access to the document component;
means for receiving, from a requester, a request to access the document component;
means for programmatically determining, using the key distribution information, whether the requester is authorized to access the document component; and
means for programmatically evaluating, using the conditional logic, whether the request can be granted, when operation of the means for programmatically determining yields a positive result, and for rejecting the request when operation of the means for programmatically determining yields a negative result. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
-
27. A method of securing document content using security containers, comprising steps of:
-
receiving, from a requester, a request to access document content, wherein the document content is encapsulated as a document component within a security container along with conditional logic for controlling operations on the document component and key distribution information usable for controlling access to the document component;
programmatically determining, using the key distribution information, whether the requester is authorized to access the document component;
programmatically evaluating, using the conditional logic, whether the request can be granted, when the programmatically determining step has a positive result, and for rejecting the request when the programmatically determining step has a negative result; and
charging a fee for carrying out one of more of the receiving, programmatically determining, and programmatically evaluating steps.
-
-
28. A method of securing document content using security containers, comprising steps of:
-
receiving, from a requester, a request to access document content, wherein the document content is encapsulated as a document component within a security container along with conditional logic for controlling operations on the document component and key distribution information usable for controlling access to the document component;
programmatically determining, using the key distribution information, whether the requester is authorized to access the document component;
programmatically evaluating, using the conditional logic, whether the request can be granted, when the programmatically determining step has a positive result, and for rejecting the request when the programmatically determining step has a negative result; and
charging a fee to the requester when the programmatically evaluating step determines that the request can be granted.
-
Specification