Document Security in Enterprise Content Management Systems
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus, including computer program products, implementing and using techniques for enhancing the security of content in a records management system. A document is received to be stored as a record in the records management system. A unique combination of an encryption key and encryption parameters is selected for the document. The encryption key and encryption parameters are stored on a server that is different from a server upon which the document is to be stored in the records management system. The document is encrypted using the selected unique combination of encryption key and encryption parameters. The encrypted document is stored in the records management system.
8 Citations
19 Claims
-
1-7. -7. (canceled)
-
8. A computer program product for enhancing the security of content in a records management system, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code being executable by a processor to perform a method comprising:
-
receiving a document to be stored as a record in the records management system; selecting a unique combination of an encryption key and encryption parameters for the document, the encryption key and encryption parameters being stored on a server that is different from a server upon which the document is to be stored in the records management system; encrypting the document using the selected unique combination of encryption key and encryption parameters; and storing the encrypted document in the records management system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A records management system, comprising:
-
a first server, the first server including one or more documents and a record corresponding to each document; a second server, the second server including one or more encryption keys and one or more encryption parameters for the one or more documents that are stored on the first server; a processor; and a memory storing instructions that when executed by the processor causes the processor to; receive a document to be stored as a record in the records management system; select a unique combination of an encryption key and encryption parameters for the document from the second server; encrypt the document using the selected unique combination of encryption key and encryption parameters; and store the encrypted document on the first server. - View Dependent Claims (16, 17, 18, 19)
-
Specification