Method and system for securing digital assets using process-driven security policies
First Claim
1. A method for limiting access to electronic documents, said method comprising:
- creating a process-driven security policy having a plurality of states, with each of the states having a different set of access restrictions;
associating an identifier to the process-driven security policy; and
making the identifier available to certain of users or groups of users.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques for dynamically altering security criteria used in a file security system are disclosed. The security criteria pertains to keys (or ciphers) used by the file security system to encrypt electronic files to be secured or to decrypt electronic files already secured. The security criteria can, among other things, include keys that are required to gain access to electronic files. Here, the keys can be changed automatically as electronic files transition between different states of a process-driven security policy. The dynamic alteration of security criteria enhances the flexibility and robustness of the security system. In other words, access restrictions on electronic files can be dependent on the state of the process-driven security policy.
-
Citations
19 Claims
-
1. A method for limiting access to electronic documents, said method comprising:
-
creating a process-driven security policy having a plurality of states, with each of the states having a different set of access restrictions;
associating an identifier to the process-driven security policy; and
making the identifier available to certain of users or groups of users. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for imposing access restrictions on electronic documents, said method comprising:
-
providing at least one process-driven security policy from a server machine to a client machine, the process-driven security policy having a plurality of states associated therewith; and
associating the electronic document with at least one of the states of the process-driven security policy to impose access restrictions on an electronic document, the access restrictions being dependent on the at least one of the states of the process-driven security policy. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A computer readable medium including at least computer program code for imposing access restrictions on electronic documents, said computer readable medium comprising:
-
computer program code for providing at least one process-driven security policy from a server machine to a client machine, the process-driven security policy having a plurality of states associated therewith; and
computer program code for associating the electronic document with at least one of the states of the process-driven security policy to impose access restrictions on an electronic document, the access restrictions being dependent on the at least one of the states of the process-driven security policy. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification