LIGHTWEIGHT DOCUMENT ACCESS CONTROL USING ACCESS CONTROL LISTS IN THE CLOUD STORAGE OR ON THE LOCAL FILE SYSTEM
First Claim
1. A method for controlling access to an encrypted document, the method comprising the steps of:
- a computer receiving a request to access the encrypted document, wherein the access request comprises a user ID and a user password;
the computer performing a one-way hash function on the user password to generate a hash value;
the computer searching an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password;
the computer decrypting the document password using the user password; and
the computer decrypting the encrypted document using the decrypted document password.
4 Assignments
0 Petitions
Accused Products
Abstract
In a method for controlling access to an encrypted document, a computer receives a request to access the encrypted document, the access request comprising a user ID and a user password. The computer performs a one-way hash function on the user password to generate a hash value. The computer searches an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password. The computer decrypts the document password using the user password. The computer decrypts the encrypted document using the decrypted document password.
-
Citations
24 Claims
-
1. A method for controlling access to an encrypted document, the method comprising the steps of:
-
a computer receiving a request to access the encrypted document, wherein the access request comprises a user ID and a user password; the computer performing a one-way hash function on the user password to generate a hash value; the computer searching an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password; the computer decrypting the document password using the user password; and the computer decrypting the encrypted document using the decrypted document password. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for controlling access to an encrypted document, the computer program product comprising one or more computer-readable tangible storage devices and program instructions stored on at least one of the one or more computer-readable tangible storage devices, the program instructions comprising:
-
program instructions to receive a request to access the encrypted document, wherein the access request comprises a user ID and a user password; program instructions to perform a one-way hash function on the user password to generate a hash value; program instructions to search an access control table for the hash value which indicates an authorization for the user to access the encrypted document and corresponds to a document password encrypted with the user password; program instructions to decrypt the document password using the user password; and program instructions to decrypt the encrypted document using the decrypted document password. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for controlling access to an encrypted web page, the method comprising the steps of:
-
a computer receiving an email message, wherein the email message comprises a hyperlink to the encrypted web page and wherein a markup language document for the encrypted web page includes program code to request a user ID and password from a user of the computer and to determine whether the user is authorized to access the web page, and if so, to decrypt the web page; and the computer invoking the program code, in response to a user request to display the encrypted web page, and in response to the determination of authorization of the user to access the web page, the computer decrypting the web page and displaying the web page at the computer. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer program product for controlling access to an encrypted web page, the computer program product comprising one or more computer-readable tangible storage devices and program instructions stored on at least one of the one or more computer-readable tangible storage devices, the program instructions comprising:
-
program instructions to receive an email message, wherein the email message comprises a hyperlink to the encrypted web page and wherein a markup language document for the encrypted web page includes program code to request a user ID and password from a user of the computer and to determine whether the user is authorized to access the web page, and if so, to decrypt the web page; and program instructions to invoke the program code, in response to a user request to display the encrypted web page, and in response to the determination of authorization of the user to access the web page, program instructions to decrypt the web page and to display the web page at the computer. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification