Claims
- 1. A method for releasing a document from an internal user to an external user of a document security system, said method comprising:
receiving a request from an internal user of an organization to release a secured document to an external user that is not affiliated with the organization; obtaining a public key associated with the external user; encrypting at least a portion of the secured document using the public key associated with the external user; imposing access control restrictions to limit access rights of the external user with respect to the secured document; and releasing the secured document to the external user.
- 2. A method as recited in claim 1, wherein the document security system restricts access to a plurality of documents, the document security system including a key store that stores at least public keys for external users, and
wherein said obtaining of the public key associated with the external user obtains the public key from the key store.
- 3. A method as recited in claim 1, wherein the at least the portion of the secured document being encrypted pertains to a file key, the file key representing a key that was used to encrypt a data portion of the secured document.
- 4. A method as recited in claim 1, wherein the access control restrictions are imposed by access rules.
- 5. A method as recited in claim 4, wherein the access rules are defined in a markup language.
- 6. A method as recited in claim 1, wherein the secured document includes a security information portion and a data portion.
- 7. A method as recited in claim 6, wherein the at least a portion of the secured document being encrypted by the public key associated with the external user is some or all of the security information portion.
- 8. A method as recited in claim 1, wherein the external user is in a partner relationship with the organization.
- 9. A method as recited in claim 1, wherein said method further comprises:
subsequently receiving the secured document at a computing device associated with the external user; retrieving a private key associated with the external user; decrypting at least a portion of the secured document using the private key associated with the external user; and evaluating document level security imposed by the access control restrictions to determine whether the external user gains access to an unsecured version of the secured document.
- 10. A method as recited in claim 1, wherein said obtaining comprises:
determining whether the internal user is permitted to receive the public key of the external user; and obtaining the public key associated with the external user when said determining determines that the internal user is permitted to receive the public key of the external user.
- 11. A method for releasing a document from an external user to an internal user of a document security system, said method comprising:
identifying a document to be released from the external user to the internal user; receiving a public key associated with the internal user from the document security system over a data network; authenticating that the received public key originated from the document security system over the data network; encrypting, using the received public key, at least a portion of the document to be transmitted from the external user to the internal user; and subsequently releasing the document to the internal user.
- 12. A method as recited in claim 11, wherein said authenticating relies on a certificate received with the received public key.
- 13. A method as recited in claim 12, wherein the document security system pertains to an organization of which the internal user is a member.
- 14. A method as recited in claim 13, wherein the certificate is associated with the organization.
- 15. A method as recited in claim 11, wherein the external user is in a partner relationship with the organization.
- 16. A method as recited in claim 11, wherein said releasing of the document to the internal user is performed by transmitting the document to the internal user via the data network.
- 17. A method as recited in claim 16, wherein the data network includes at least a part of the Internet.
- 18. A method as recited in claim 11, wherein the document is a secured document, and wherein said encrypting operates to encrypt at least a file key provided within the secured document.
- 19. A method as recited in claim 11, wherein the document is a secured document, and wherein the secured document includes a security information portion and a data portion.
- 20. A method as recited in claim 19, wherein the at least a portion of the secured document being encrypted by the public key is some or all of the security information portion.
- 21. A method as recited in claim 11, wherein the document security system includes at least a key store that stores at least public keys for internal users, and
wherein said receiving of the public key associated with the internal user obtains the public key from the key store.
- 22. A method for distributing keys from a file security system to external users, said method comprising:
receiving, from an external user, a request for a public key of an internal user; determining whether the external user is permitted to receive the public key associated with the internal user; retrieving the public key associated with the internal user; preparing a response to the request, the response including at least the public key associated with the internal user when said determining determines that the external user is permitted to receive the public key; and transmitting the response to the external user.
- 23. A method as recited in claim 22, wherein said retrieving operates to retrieve the public key associated with the internal user from a key store within the file security system.
- 24. A method as recited in claim 23, wherein the file security system pertains to an organization of which the internal user is a member.
- 25. A method as recited in claim 24, wherein the external user is not a member of the organization but is in a partner relationship with the organization or the internal user.
- 26. A method as recited in claim 22, wherein said transmitting is over a secure channel.
- 27. A method as recited in claim 22, wherein said transmitting comprises:
signing the response with an authenticating certificate to produce a signed response; and transmitting the signed response to the external user.
- 28. A method as recited in claim 27, wherein said method further comprises:
authenticating the signed response based on the certificate; acquiring the public key provided within the signed response when said authenticating is successful; and encrypting, using the public key that has been acquired, at least a portion of a document to be transmitted from the external user to the internal user.
- 29. A computer readable medium including at least computer program code for releasing a file between an internal user and an external user of a file security system, said computer readable medium comprising:
computer program code for identifying a secured file to be released to a selected user, the selected user being one of the internal user and the external user; computer program code for obtaining a public key associated with the selected user; computer program code for encrypting at least a portion of the secured file using the public key associated with the selected user; and computer program code for releasing the secured file to the selected user.
- 30. A computer readable medium as recited in claim 29, wherein the file security system includes at least a key store that stores at least public keys for internal and external users, and
wherein said computer program code for obtaining the public key obtains the public key from the key store.
- 31. A computer readable medium as recited in claim 29, wherein said computer program code for obtaining the public key obtains the public key associated with the selected user from the file security system over a data network.
- 32. A computer readable medium as recited in claim 31, wherein said computer readable medium further comprises:
computer program code for authenticating that the public key originated from the file security system and was provided to the selected user over the data network.
- 33. A computer readable medium as recited in claim 31, wherein said computer program code for obtaining operates to retrieve the public key associated with the selected user from a key store within the file security system.
- 34. A computer readable medium as recited in claim 29, wherein said computer readable medium further comprises:
computer program code for imposing, prior to said releasing, access control restrictions to limit access rights of the selected user with respect to the secured file.
- 35. A computer readable medium as recited in claim 29, wherein said computer program code for encrypting operates to encrypt at least a file key provided within the secured file.
- 36. A computer readable medium as recited in claim 29, wherein the secured document includes a security information portion and a data portion, and wherein the at least a portion of the secured document being encrypted by the public key is some or all of the security information portion.
- 37. A system for restricting access to files, said system comprising:
a server, said server having an access manager that restricts access to files of an organization and maintains at least encryption keys for a plurality of internal users and a plurality of external users; and an external access server operatively connected to said server, said external access server permits file exchange between the internal users and the external users via said server in limited circumstances, wherein said external access server is coupled between said server and a data network, and wherein the external users couple to the data network to interact with said external access server.
- 38. A system as recited in claim 37, wherein exchanging of a file by internal and external users is permitted only when they are members of a common group.
- 39. A system as recited in claim 37, wherein the encryption keys are public-private keys.
- 40. A system as recited in claim 39, wherein said server comprises:
a central server; at least one local server operatively connected to said central server; and a database operatively connected to said central server, said database serving at least as a key store for storage of the public-private keys.
- 41. A system as recited in claim 37, wherein the data network includes at least a part of the Internet.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is related to U.S. patent application Ser. No. 10/075,194, filed Feb. 12, 2002, and entitled “SYSTEM AND METHOD FOR PROVIDING MULTI-LOCATION ACCESS MANAGEMENT TO SECURED ITEMS,” which is hereby incorporated by reference for all purposes.