Portable authentication and access control involving multiple identities
First Claim
1. A computer-implemented method for protecting a plurality of electronic files, the computer-implemented method comprising using a portable access control lock that is adapted for automatically maintaining an audit trail and allowing for configuring of access control rules for constraining user access based on a mandatory presence of specified users before granting access for each electronic file including any copies of said each electronic file of said plurality of electronic files.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for protecting electronic files by applying a portable access control lock to each electronic file while allowing multi-user access to the protected electronic files across a distributed network is described. The portable access control lock is adapted for implementing a set of complex access control rules that include managing an audit trail for the corresponding protected electronic file.
-
Citations
52 Claims
- 1. A computer-implemented method for protecting a plurality of electronic files, the computer-implemented method comprising using a portable access control lock that is adapted for automatically maintaining an audit trail and allowing for configuring of access control rules for constraining user access based on a mandatory presence of specified users before granting access for each electronic file including any copies of said each electronic file of said plurality of electronic files.
- 16. A file protection system for protecting a plurality of electronic files, said file protection system comprising a portable access control lock corresponding to each protected electronic file of said plurality of electronic files, and an access agent associated with said portable access control lock, and wherein said portable access control lock is adapted for automatically maintaining an audit trail and allowing for configuring of access control rules for constraining user access based on a mandatory presence of specified users before granting access for each protected electronic file.
-
25. A file protection system for protecting a plurality of electronic files, said file protection system comprising:
-
a user-registering means for registering each user of said file protection system;
an authentication means for authenticating said each user; and
an access control means for constraining user access based on a mandatory presence of specified users before granting access for each electronic file including any copies of said each electronic file of said plurality of electronic files. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer-implemented method for protecting a plurality of electronic files, the computer-implemented method comprising:
-
using an access agent to aid an author-user in configuring access control rules for an electronic file created by said author-user;
wrapping a corresponding logical computer-implemented lock around said electronic file to form a protected electronic file, wherein said corresponding logical computer-implemented lock includes allowing for configuring of access control rules for constraining user access based on a mandatory presence of specified users before granting access to said protected electronic file;
registering said protected electronic file at a central server; and
submitting said corresponding logical computer-implemented lock to said central server for auditing said protected electronic file. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A computer-implemented portable access control lock for protecting an electronic file, the computer-implemented portable access control lock comprising:
-
a registered ID information of said electronic file;
encryption keys; and
a set of access control rules, wherein said access control rules is configurable for constraining user access based on a mandatory presence of specified users before granting access to said protected electronic file.
-
Specification