METHOD AND APPARATUS FOR PROVIDING RIGHTS MANAGEMENT AT FILE SYSTEM LEVEL
First Claim
Patent Images
1. A method comprising:
- receiving a request at a file system to access a protected file;
binding the access request to the protected file in the file system;
determining credentials associated with the request for accessing the protected file according to the binding;
causing, at least in part, verification of the credentials according to a rights management system associated with the protected file; and
causing, at least in part, decryption of the protected file based, at least in part, on the verification.
0 Assignments
0 Petitions
Accused Products
Abstract
An approach is presented for providing rights management at file system level. A virtual file system rights management application receives a request to access a protected file. The rights management application binds the access request to the protected file in the file system, determines credentials associated with the request for accessing the protected file according to the binding and causes, at least in part, verification of the credentials according to a rights management system associated with the protected file. Based, at least in part, on the determination, the rights management application causes decryption of the protected content.
87 Citations
20 Claims
-
1. A method comprising:
-
receiving a request at a file system to access a protected file; binding the access request to the protected file in the file system; determining credentials associated with the request for accessing the protected file according to the binding; causing, at least in part, verification of the credentials according to a rights management system associated with the protected file; and causing, at least in part, decryption of the protected file based, at least in part, on the verification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, receive a request at a file system to access a protected file; bind the access request to the protected file in the file system; determine credentials associated with the request for accessing the protected file according to the binding; cause, at least in part, verification of the credentials according to a rights management system associated with the protected file; and cause, at least in part, decryption of the protected file based, at least in part, on the verification. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to at least perform the following steps:
-
receive a request at a file system to access a protected file; bind the access request to the protected file in the file system; determine credentials associated with the request for accessing the protected file according to the binding; cause, at least in part, verification of the credentials according to a rights management system associated with the protected file; and cause, at least in part, decryption of the protected file based, at least in part, on the verification. - View Dependent Claims (18, 19, 20)
-
Specification