Systems and methods for controlling electronic document use
First Claim
1. A computer-implemented method comprising:
- receiving, at a server, a request for a document key for accessing a document on a client device, wherein the request comprises;
an identity of an access policy; and
information about the document;
determining, at the server, whether access to the document is permitted according to the access policy by identifying the access policy in a stored record using the identity of the access policy that was received, the access policy specifying access privileges applicable to one or more documents without specifying access privileges specific to individually-identified documents; and
upon determining that access to the document is permitted;
computing, at the server, the document key using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the server; and
responding to the request by providing the document key for use in accessing the document on the client device.
2 Assignments
0 Petitions
Accused Products
Abstract
One exemplary embodiment involves receiving, at a server, a request for a document key for accessing a document on a client device, wherein the request comprises an identity of an access policy and information about the document. The exemplary method further comprises determining, at the server, whether access to the document is permitted according to the access policy. If access to the document is permitted, the exemplary method involves computing, at the server, the document key using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the server. The exemplary method further involves responding to the request by providing the document key for use in accessing the document on the client device.
-
Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a server, a request for a document key for accessing a document on a client device, wherein the request comprises; an identity of an access policy; and information about the document; determining, at the server, whether access to the document is permitted according to the access policy by identifying the access policy in a stored record using the identity of the access policy that was received, the access policy specifying access privileges applicable to one or more documents without specifying access privileges specific to individually-identified documents; and upon determining that access to the document is permitted; computing, at the server, the document key using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the server; and responding to the request by providing the document key for use in accessing the document on the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a processor; and a non-transitory computer-readable medium communicatively coupled to the processor, wherein the processor is configured to execute program modules tangibly embodied in the non-transitory computer-readable medium to perform operations, the modules comprising; a module for receiving a request for a document key for accessing a document on a client device, wherein the request comprises; an identity of an access policy; and information about the document; a module for determining whether access to the document is permitted according to the access policy by identifying the access policy in a stored record using the identity of the access policy that was received, the access policy specifying access privileges applicable to one or more documents without specifying access privileges specific to individually-identified documents; and a module for computing the document key using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access; and a module for responding to the request, if access to the document is permitted, by providing the document key for use in accessing the document on the client device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method comprising:
-
receiving, at a server, a request for a document key for accessing a document on a client device, wherein the request comprises; a user identity identifying a requester requesting access to the document; an identity of an access policy; and information about the document; determining, at the server, whether access to the document is permitted according to the access policy by identifying the access policy in a stored record using the identity of the access policy that was received, the access policy specifying access privileges applicable to one or more documents without specifying access privileges specific to individually-identified documents; and upon determining that access to the document is permitted; computing, at the server, the document key using the information about the document and using the user identity, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the server; and responding to the request by providing the document key for use in accessing the document on the client device.
-
Specification