COMPOSITE DOCUMENT ACCESS
First Claim
Patent Images
1. A method of accessing a composite document, comprising:
- receiving a request to access a composite document;
fetching a key associated with a group;
using the key to decrypt a part of the composite document comprising an attribute; and
verifying the attribute,wherein, in the event that the attribute is verified, providing access to the composite document.
1 Assignment
0 Petitions
Accused Products
Abstract
According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided.
-
Citations
15 Claims
-
1. A method of accessing a composite document, comprising:
-
receiving a request to access a composite document; fetching a key associated with a group; using the key to decrypt a part of the composite document comprising an attribute; and verifying the attribute, wherein, in the event that the attribute is verified, providing access to the composite document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system comprising:
-
a composite document; an attribute verification service; and at least one processor to implement the attribute verification service, wherein the attribute verification service is to receive a request to access the composite document, fetch a private key associated with a group stored on the attribute verification service, use the key to decrypt a part of the composite document comprising an attribute, verify the attribute, and provide access to the composite document using a symmetric key. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium on which is embedded a computer program, said computer program to manage access to a composite document, said computer program comprising a set of instructions to:
-
receive a request to access the composite document; fetch a key associated with a group; use the key to decrypt an entry table row in the composite document; and verify an attribute stored in the entry table, wherein, in the event that the attribute is verified, provide access to the composite document using at least one symmetric key.
-
Specification