Systems and methods for controlling electronic document use
First Claim
1. A computer-implemented method comprising:
- sending, by a server, a plurality of documents to one or more client devices;
receiving, at the server, a request for a document key for accessing a document of the plurality of documents on a client device, wherein the request comprises;
a user identity identifying a requester requesting access to the document; and
information about the document;
determining, at the server, whether access to the document is permitted or revoked;
based on determining that access to the document is permitted and is not revoked;
computing, at the server, the document key using the user identity and using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the server, wherein computing the document key comprises using a function that takes as input;
a first value comprising a user key hashed a number of times, a document identifier, and a second value identifying the number of times; and
responding to the request by providing the document key for use in accessing the document on the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
One exemplary embodiment involves receiving a request for a document key for accessing a document on a client device. The request comprises a user identity identifying a requester requesting access to the document. The request also comprises information about the document. The exemplary embodiment further involves determining, at the server, whether access to the document by the requester is permitted. And, the exemplary embodiment further involves, if access to the document is permitted computing, at the server, the document key using the user identity and using the information about the document. The document key is document specific and, prior to the computing of the document key, the document key is not stored for access by the server. The exemplary embodiment further involves responding to the request by providing the document key for use in accessing the document on the client device.
46 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
sending, by a server, a plurality of documents to one or more client devices; receiving, at the server, a request for a document key for accessing a document of the plurality of documents on a client device, wherein the request comprises; a user identity identifying a requester requesting access to the document; and information about the document; determining, at the server, whether access to the document is permitted or revoked; based on determining that access to the document is permitted and is not revoked; computing, at the server, the document key using the user identity and using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the server, wherein computing the document key comprises using a function that takes as input;
a first value comprising a user key hashed a number of times, a document identifier, and a second value identifying the number of times; andresponding to the request by providing the document key for use in accessing the document on the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a memory that stores computer-executable instructions; and a processor configured to access the memory and to execute the computer-executable instructions to; send a plurality of documents to one or more client devices; receive a request for a document key for accessing a document of the plurality of documents on a client device, wherein the request comprises; a user identity identifying a requester requesting access to the document; and information about the document; determine whether access to the document is permitted or revoked; compute the document key using the user identity and using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access, wherein computing the document key comprises using a function that takes as input;
a first value comprising a user key hashed a number of times, a document identifier, and a second value identifying the number of times; andrespond to the request, if access to the document is permitted and not revoked, by providing the document key for use in accessing the document on the client device. - View Dependent Claims (17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising computer-readable instructions that, when executed on a computing device, cause the computing device to perform operations comprising:
-
sending, by the computing device, a plurality of documents to one or more client devices; receiving, at the computing device, a request for a document key for accessing a document of the plurality of documents on a client device, wherein the request comprises; a user identity identifying a requester requesting access to the document; and information about the document; determining, at the computing device, whether access to the document is permitted or revoked; and based on determining that access to the document is permitted and not revoked; computing, at the computing device, the document key using the user identity and using the information about the document, wherein the document key is document specific, wherein, prior to the computing of the document key, the document key is not stored for access by the computing device, wherein computing the document key comprises using a function that takes as input;
a first value comprising a user key hashed a number of times, a document identifier, and a second value identifying the number of times; andresponding to the request by providing the document key for use in accessing the document on the client device.
-
Specification