DECRYPTION OF ELECTRONIC COMMUNICATION IN AN ELECTRONIC DISCOVERY ENTERPRISE SYSTEM
First Claim
1. A method for electronic communication decryption in an enterprise-wide electronic discovery system, the method comprising:
- providing for an electronic communication file and an associated user identification file that includes user identity, a password and one or more decryption keys;
generating, automatically, a client-specific electronic communication session based on the user identification file;
accessing the electronic communication file within the generated electronic communication session;
identifying, automatically, encrypted entries within the electronic communication file;
applying, automatically, the password to the user identification file to provide for the one or more decryption keys; and
decrypting, automatically, the encrypted entries based on the one or more decryption keys.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus, methods and computer program products are described herein for automatically decrypting electronic communication that is harvested from custodians in an enterprise-wide electronic discovery system. Automatic decryption provides for electronic communication that is encrypted to be decrypted, even in instances in which the system is not provided the password and/or decryption key(s) from the encrypting custodian. The automatic decryption process, which ensues prior to delivering data to the third party data analysis provider or the requesting party, allows for data that may otherwise be unavailable or incomprehensible to the third party or requester to be readily accessible. Thus, decryption of such data in a relatively efficient and automated manner is highly beneficial.
78 Citations
48 Claims
-
1. A method for electronic communication decryption in an enterprise-wide electronic discovery system, the method comprising:
-
providing for an electronic communication file and an associated user identification file that includes user identity, a password and one or more decryption keys; generating, automatically, a client-specific electronic communication session based on the user identification file; accessing the electronic communication file within the generated electronic communication session; identifying, automatically, encrypted entries within the electronic communication file; applying, automatically, the password to the user identification file to provide for the one or more decryption keys; and decrypting, automatically, the encrypted entries based on the one or more decryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for decrypting electronic communication in an enterprise-wide electronic discovery system, the system comprising:
-
a computing platform including at least one processor and a memory; and a decryption module stored in the memory, in communication with at least one of the one or more processors and including a decryption application configured to automatically decrypt encrypted entries in an electronic communication file, wherein the application includes, a client-specific electronic communication session generator configured to automatically generate an electronic communication session based on a user identification file and open an electronic communication file associated with the user identification file, an encrypted entry identifier configured to automatically identify one or more encrypted entries in the electronic communication file, and a decryption routine configured to automatically decrypt the one or more encrypted entries based on applying a predetermined password to the user identification file to provide for the one or more decryption keys and decrypting based on the decryption keys. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising:
a computer-readable medium comprising; a first set of codes for causing a computer to provide for an electronic communication file and an associated user identification file that includes user identity, a password and one or more decryption keys; a second set of codes for causing a computer to generate, automatically, a client-specific electronic communication session based on the user identification file; a third set of codes for causing a computer to access the electronic communication file within the generated electronic communication session; a fourth set of codes for causing a computer to identify, automatically, encrypted entries within the electronic communication file; a fifth set of codes for causing a computer to apply, automatically, the password to the user identification file to provide for the one or more decryption keys; and a sixth set of codes for causing a computer to decrypt, automatically, the encrypted entries based on the one or more decryption keys. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
25. A method for electronic communication decryption in an enterprise-wide electronic discovery system, the method comprising:
-
generating a user identification file database; identifying a file owner for a plurality of files in the user identification file database; identifying a password for a plurality of files in the user identification file database; verifying the validity of the password; recording the file owner and the password in an entry of the file in the user identification file database; and decrypting, automatically, electronic communication encrypted entries in electronic communication files based on an associated user identification file. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A system for decrypting electronic communication in an enterprise-wide electronic discovery system, the system comprising:
-
a computing platform including at least one processor and a memory; and a decryption module stored in the memory, in communication with at least one of the one or more processors and configured to automatically decrypt encrypted entries in an electronic communication file, wherein the module includes, a user identification file database generator configured to generate a user identification file database, a user identification file owner identifier configured to identify the owner of a plurality of the files in the user identification file, 2a user identification file password identifier configured to determine an associated password for each of a plurality of the files in the user identification file, a password verifier configured to verify the validity of the determined password, a recorder configured to record the password and owner as an entry in the associated file of the user identification file database, and a decryption application configured to automatically decrypt encrypted entries in electronic communication files based on an associated user identification file. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
-
41. A computer program product comprising:
a computer-readable medium comprising; a first set of codes for causing a computer to generate a user identification file database; a second set of codes for causing a computer to identify a file owner for a plurality of files in the user identification file database; a third set of codes for causing a computer to identify a password for a plurality of files in the user identification file database; a fourth set of codes for causing a computer to verify the validity of the password; a fifth set of codes for causing a computer to record the file owner and the password in an entry of the file in the user identification file database; and a sixth set of codes for causing a computer to decrypt, automatically, electronic communication encrypted entries in electronic communication files based on an associated user identification file. - View Dependent Claims (42, 43, 44, 46, 47, 48)
-
45. The computer program product of 41, wherein the second set of codes is further configured to cause the computer to analyze content of a user identification file and comparing the content to one or more enterprise databases to identify the owner of the files.
Specification