Information Rights Management
First Claim
1. A method for providing information rights management, comprising:
- receiving, from a user having an associated security access profile, a request to access an object, the object having;
a corresponding information rights management (IRM) wrapper stored with the object both when the object is stored in a document management system (DMS) database and when the document is stored external to the DMS database, the IRM wrapper comprising;
an IRM profile; and
one or more IRM permission sets; and
encrypted data;
determining whether the user is authorized to access the object based on a comparison of the security access profile of the user and the IRM profile of the IRM wrapper corresponding to the object; and
communicating to the user, in response to a determination that the user is authorized to access the object, a decryption key associated with object.
1 Assignment
0 Petitions
Accused Products
Abstract
In certain embodiments, a method for providing information rights management (IRM) includes receiving, from a user having an associated security access profile, a request to access an object. The object has a corresponding IRM wrapper stored with the object both when the object is stored in a document management system (DMS) database and external to the DMS database, the IRM wrapper including an IRM profile and one or more IRM permission sets. The object also has encrypted data. The method further includes determining whether the user is authorized to access the object based on a comparison of the security access profile of the user and the IRM profile of the IRM wrapper corresponding to the object and communicating to the user, in response to a determination that the user is authorized to access the object, a decryption key associated with object.
-
Citations
20 Claims
-
1. A method for providing information rights management, comprising:
-
receiving, from a user having an associated security access profile, a request to access an object, the object having; a corresponding information rights management (IRM) wrapper stored with the object both when the object is stored in a document management system (DMS) database and when the document is stored external to the DMS database, the IRM wrapper comprising; an IRM profile; and one or more IRM permission sets; and encrypted data; determining whether the user is authorized to access the object based on a comparison of the security access profile of the user and the IRM profile of the IRM wrapper corresponding to the object; and communicating to the user, in response to a determination that the user is authorized to access the object, a decryption key associated with object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing information rights management, comprising:
one or more processing units operable to; receive, from a user having an associated security access profile, a request to access an object, the object having; a corresponding information rights management (IRM) wrapper stored with the object both when the object is stored in a document management system (DMS) database and when the document is stored external to the DMS database, the IRM wrapper comprising; an IRM profile; and one or more IRM permission sets; and encrypted data; determine whether the user is authorized to access the object based on a comparison of the security access profile of the user and the IRM profile of the IRM wrapper corresponding to the object; and communicate to the user, in response to a determination that the user is authorized to access the object, a decryption key associated with object. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
20. Software for providing information rights management, the software embodied in a computer-readable medium and operable when executed to perform operations comprising:
-
receiving, from a user having an associated security access profile, a request to access an object, the object having; a corresponding information rights management (IRM) wrapper stored with the object both when the object is stored in a document management system (DMS) database and when the document is stored external to the DMS database, the IRM wrapper comprising; an IRM profile; and one or more IRM permission sets; and encrypted data; determining whether the user is authorized to access the object based on a comparison of the security access profile of the user and the IRM profile of the IRM wrapper corresponding to the object; and communicating to the user, in response to a determination that the user is authorized to access the object, a decryption key associated with object.
-
Specification