Updating and Validating Documents Secured Cryptographically
First Claim
1. A computer-readable medium having computer-executable instructions, which when executed perform actions, comprising:
- obtaining a document that includes encrypted data, the document including an identifier that identifies security data associated with the document, the security data including an encrypted field relating to an entity that is authorized to create a new version of the document;
creating a new version of the document; and
using the security data to indicate that the new version was created by the entity.
3 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the subject matter described herein relate to updating and validating documents secured cryptographically. In aspects, documents are encrypted to protect them from unauthorized access. An entity having write access to a document may create a new version of the document and sign the new version with a private key. Other entities may validate that the new version of the document was created by an authorized entity by using a public key available in security data associated with the version. The entities that are authorized to create a new version may change which security principals are allowed to create subsequent versions.
-
Citations
20 Claims
-
1. A computer-readable medium having computer-executable instructions, which when executed perform actions, comprising:
-
obtaining a document that includes encrypted data, the document including an identifier that identifies security data associated with the document, the security data including an encrypted field relating to an entity that is authorized to create a new version of the document; creating a new version of the document; and using the security data to indicate that the new version was created by the entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method implemented at least in part by a computer, the method comprising:
-
obtaining a document that identifies security data associated with the document, the document being an updated version of a previous version of the document, the security data including a field usable to determine whether the document was updated by an authorized entity; obtaining data from the field; and using at least the data to determine whether the document was updated by the authorized entity. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. In a computing environment, an apparatus, comprising:
-
a document locator operable to determine a location of a document that includes encrypted data, the document including data that identifies security data associated with the document, the security data including an encrypted field relating to an entity that is authorized to create a new version of the document; a cryptographic component operable to perform cryptographic operations; and an updating component operable to use the cryptographic component and the encrypted field to create a new version of the document. - View Dependent Claims (19, 20)
-
Specification