Method and system for providing cryptographic document retention with off-line access
First Claim
1. A method of providing automated document retention for electronic documents, said method comprising:
- obtaining an electronic document;
assigning a document retention policy to the electronic document, the document retention policy being based on a recurring cut-off retention schedule; and
cryptographically imposing the document retention policy on the electronic document.
13 Assignments
0 Petitions
Accused Products
Abstract
Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained.
-
Citations
25 Claims
-
1. A method of providing automated document retention for electronic documents, said method comprising:
-
obtaining an electronic document;
assigning a document retention policy to the electronic document, the document retention policy being based on a recurring cut-off retention schedule; and
cryptographically imposing the document retention policy on the electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for periodically providing document retention keys to clients of a document retention system via a network, said method comprising:
-
determining whether a cut-off period for a current or prior document retention key has been reached;
generating a next document retention key to be used to encrypt electronic documents during a next cut-off period, the next document retention key having a document retention period associated therewith; and
notifying any of the clients that are connected to the network of the next document retention key. - View Dependent Claims (11, 12)
-
-
13. A method for restricting access to an electronic document, said method comprising:
-
identifying an electronic document to be secured, the electronic document having at least a data portion that contains data;
obtaining a document key;
encrypting the data portion of the electronic document using the document key to produce an encrypted data portion;
obtaining a retention access key, the retention access key being used to enforce a document retention policy on the electronic document;
encrypting the document key using the retention access key to produce an encrypted document key, the retention access key only being usable for said encrypting during a cut-off period;
forming a secured electronic document from at least the encrypted data portion and the encrypted document key; and
storing the secured electronic document. - View Dependent Claims (14, 15)
-
-
16. A method for accessing a secured electronic document by a requestor, the secured electronic document having at least a header portion and a data portion, said method comprising:
-
obtaining a retention access key, the retention access key being used to enforce a document retention period of a document retention policy on the electronic document, the retention access key being usable only during the document retention period following a cut-off period;
obtaining an encrypted document key from the header portion of the secured electronic document;
decrypting the encrypted document key using the retention access key to produce a document key;
decrypting an encrypted data portion of the secured electronic document using the document key to produce a data portion; and
supplying the data portion to the requestor. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer readable medium including at least computer program code for providing automated document retention for electronic documents, said computer readable medium comprising:
-
computer program code for obtaining an electronic document;
computer program code for assigning a document retention policy to the electronic document, the document retention policy being based on a recurring cut-off retention schedule; and
computer program code for cryptographically imposing the document retention policy on the electronic document. - View Dependent Claims (22, 23, 24)
-
-
25. A file security system for restricting access to electronic files, said file security system comprising:
-
a key store that stores a plurality of cryptographic key pairs, each of the cryptographic key pairs including a public key and a private key, at least one of the cryptographic key pairs pertaining to a retention policy, the retention policy having a document retention period and a cut-off period; and
an access manager operatively connected to said key store, said access manager makes available, for each of the cut-off periods, a different one of the public keys of the at least one of the cryptographic key pairs, and said access manager determines whether the private key of the at least one of the cryptographic key pairs pertaining to the retention policy is permitted to be provided to a requestor based on whether the document retention period following the cut-off period has expired, wherein the requestor requires the private key of the at least one of the cryptographic key pairs pertaining to the retention policy to access a secured electronic file, and wherein the secured electronic file was previously secured using the public key of the at least one of the cryptographic key pairs pertaining to the retention policy, and at the time the electronic file was so secured, the public key was within the cut-off period and available for use.
-
Specification