Access rights management in enterprise digital rights management systems
First Claim
1. A method for obtaining access rights to an encrypted document using an enterprise digital rights management (eDRM) system, the method comprising:
- receiving a request for obtaining the access rights to the encrypted document from a requestor, through an eDRM interface, wherein the request comprises details of the encrypted document and a selection of access rights to the encrypted document;
storing the request in a request database, wherein the request database stores a plurality of requests for obtaining the access rights;
determining the requests pending for authorization corresponding to a granter of the encrypted document amongst the plurality of requests from the request database;
generating a request inbox corresponding to the granter based on the determination, wherein the request inbox contains the requests pending for the authorization;
sending the request inbox to the granter through the eDRM interface;
obtaining from the granter a response to each of the requests pending for the authorization in the request inbox, wherein the response is selected from one of granting the request, denying the request, and granting the request with modification; and
providing a status alert to the requestor corresponding to the request through the eDRM interface, wherein the status alert is indicative of the response; and
monitoring the plurality of requests and the response to each of the plurality of requests corresponding to the requestor;
evaluating a risk factor for the requestor based on the monitoring, wherein the risk factor is associated with a predefined threshold; and
generating a risk alert when the risk factor is above the predefined threshold, wherein the risk alert is indicative of a risk associated with the requestor.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for obtaining access rights to an encrypted document are described. The method comprises receiving a request for obtaining access rights to the encrypted document from a requestor, through an eDRM interface. The method further comprises generating a request inbox corresponding to a granter of the encrypted document. The request inbox contains at least the request received from the requestor. The generated request inbox is sent to the granter through the eDRM interface. The method furthermore comprises obtaining a response to the request from the granter, and providing a status alert indicative of the response to the requestor through the eDRM interface.
-
Citations
12 Claims
-
1. A method for obtaining access rights to an encrypted document using an enterprise digital rights management (eDRM) system, the method comprising:
-
receiving a request for obtaining the access rights to the encrypted document from a requestor, through an eDRM interface, wherein the request comprises details of the encrypted document and a selection of access rights to the encrypted document; storing the request in a request database, wherein the request database stores a plurality of requests for obtaining the access rights; determining the requests pending for authorization corresponding to a granter of the encrypted document amongst the plurality of requests from the request database; generating a request inbox corresponding to the granter based on the determination, wherein the request inbox contains the requests pending for the authorization; sending the request inbox to the granter through the eDRM interface; obtaining from the granter a response to each of the requests pending for the authorization in the request inbox, wherein the response is selected from one of granting the request, denying the request, and granting the request with modification; and providing a status alert to the requestor corresponding to the request through the eDRM interface, wherein the status alert is indicative of the response; and monitoring the plurality of requests and the response to each of the plurality of requests corresponding to the requestor; evaluating a risk factor for the requestor based on the monitoring, wherein the risk factor is associated with a predefined threshold; and generating a risk alert when the risk factor is above the predefined threshold, wherein the risk alert is indicative of a risk associated with the requestor. - View Dependent Claims (2, 3, 4)
-
-
5. An enterprise digital rights management (eDRM) server comprising:
-
a processor; and a memory coupled to the processor, the memory comprising; a rights request module, comprising computer-readable instructions executable by the processor, to; receive a request for obtaining access rights to an encrypted document from a requestor through an eDRM interface, wherein the request comprises details of the encrypted document and a selection of access rights to the encrypted document; store the request in a request database, wherein the request database stores a plurality of requests for obtaining the access rights; determine the requests pending for authorization corresponding to a granter of the encrypted document amongst the plurality of requests from the request database; generate a request inbox corresponding to the granter based on the determination, wherein the request inbox contains the requests pending for the authorization; send the request inbox to the granter through the eDRM interface; obtain from the granter a response to each of the requests pending for the authorization, wherein the response is selected from one of granting the request, denying the request, and granting the request with modification; and provide the response to the requestor corresponding to the request through the eDRM interface; and store the response corresponding to each of the requests in the request database; and a risk evaluation module, comprising the computer-readable instructions executable by the processor, to; monitor the plurality of requests and the response to each of the plurality of requests corresponding to the requestor; evaluate a risk factor for the requestor based on the monitoring, wherein the risk factor is associated with a predefined threshold; and generate a risk alert based on the evaluation, when the risk factor is above the predefined threshold, wherein the risk alert is indicative of the risk associated with the requestor. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable medium having embodied thereon a computer program for executing a method comprising:
-
receiving a request for obtaining access rights to an encrypted document from a requestor, through an enterprise digital rights management (eDRM) interface, wherein the request includes details of the encrypted document and a selection of access rights to the encrypted document; storing the request in a request database, wherein the request database stores a plurality of requests for obtaining the access rights; determining the requests pending for authorization corresponding to a granter of the encrypted document amongst the plurality of requests from the request database; generating a request inbox corresponding to the granter based on the determination, wherein the request inbox contains at least the requests pending for the authorization; sending the request inbox to the granter through the eDRM interface; obtaining a response to each of the requests pending for the authorization from the granter, wherein the response is selected from one of granting the request, denying the request, and granting the request with modification; and providing a status alert to the requestor corresponding to the request through the eDRM interface, wherein the status alert is indicative of the response; and evaluating a risk factor for the requestor based in part on data stored in the request database, wherein the data stored in the request database includes the request and the response; and generating a risk alert based on the evaluating. - View Dependent Claims (10, 11, 12)
-
Specification