Method and system for securing digital assets using process-driven security policies
First Claim
1. A method comprising:
- receiving a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy;
decrypting the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users; and
re-encrypting the electronic document with a public state encryption key assigned to the additional state.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy; decrypting the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users; and re-encrypting the electronic document with a public state encryption key assigned to the additional state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable device having computer-executable instructions stored thereon, execution of which, by a computing device, causes the computing device to perform operations comprising:
-
receiving a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy; decrypting the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users; and re-encrypting the electronic document with a public state encryption key assigned to the additional state. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a tangible computer-readable medium configured to store; a receiving module configured to receive a request to transition an electronic document from a state of a process-driven security policy to an additional state of the process-driven security policy, a decrypting module configured to decrypt the electronic document with a private state decryption key assigned to the state of the process-driven security policy, wherein the private state decryption key is accessible by a plurality of authorized users, and an encryption module configured to re-encrypt the electronic document with a public state encryption key assigned to the additional state; and one or more processors configured to process the modules.
-
Specification