×

Decryption of electronic communication in an electronic discovery enterprise system

  • US 8,572,376 B2
  • Filed: 11/13/2009
  • Issued: 10/29/2013
  • Est. Priority Date: 03/27/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for electronic communication decryption in an enterprise-wide electronic discovery system, the method comprising:

  • generating, by a computing device processor, a user identification file database by scanning at least a portion of an enterprise-wide network for user identification files and adding user identification files identified during the scan to the user identification file database;

    identifying, by a computing device processor, a file owner for each of a plurality of user identification files stored in the user identification file database by parsing a name of each of the user identification files and comparing parsed data to data stored in enterprise human resources databases to identify the file owner for each of the user identification files;

    identifying, by a computing device processor, a password for each of the plurality of user identification files stored in the user identification file database by parsing a name of each of the user identification files to deduce the password from within the name of the user identification file;

    verifying, by a computing device processor, the validity of each of the passwords by applying the password to an associated user identification file to determine that the password is successful in rendering one or more decryption keys;

    in response to successful verification of the validity of the password, recording the file owner and the password in an entry of the user identification file in the user identification file database; and

    decrypting, automatically, encrypted electronic communication entries in electronic communication files collected from custodians in the electronic discovery system by;

    automatically generating a client-specific communication session based on an electronic communication file being associated with a user identification file based on a same file owner,accessing the electronic communication file within the client-specific communication session,automatically identifying encrypted electronic communication entries in the electronic communication file,accessing the associated user identification file based on the identified password to provide the decryption key for decrypting the encrypted electronic communication entries, anddecrypting the encrypted electronic communication entries by application of the decryption key,wherein the custodians are limited to individuals or groups of individuals within the enterprise who created or are associated with electronic data required to be collected in an electronic discovery matter and wherein the electronic discovery matter is one of a legal proceeding, audit or forensic investigation in which electronic data is sought, located, secured and searched with the intent of using it as evidence.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×