Claims
- 1. A method of controlling access to a file, comprising:
receiving designated rights to the file for an intended recipient; encrypting the designated rights with a master password; encrypting the master password using a public key of the intended recipient; storing the encrypted rights and master password in a designated area of the file; and encrypting the file with the master password.
- 2. The method of claim 1, wherein the designated rights include at least one of the right to view, edit, export and print the file.
- 3. The method of claim 1, further comprising:
specifying an expiration time for access to the file; encrypting the expiration time with the master password; and storing the encrypted expiration time in the designated area.
- 4. The method of claim 1, further comprising:
specifying a URL; encrypting the URL with the master password; and storing the encrypted URL in the designated area.
- 5. The method of claim 1, further comprising:
digitally signing an application to certify the application as compliant; encrypting the certificate used to sign the compliant application; and storing the encrypted certificate in the designated area.
- 6. The method of claim 1, further comprising:
displaying digital certificates of at least one intended recipient; receiving a selected digital certificate from among those displayed; and obtaining the public key for the intended recipient from the selected digital certificate.
- 7. The method of claim 1, further comprising receiving the master password from a user.
- 8. The method of claim 7, further comprising creating a password license for the master password.
- 9. The method of claim 1, further comprising setting a flag in a header of the file indicating encryption.
- 10. The method of claim 1, further comprising creating a password license.
- 11. The method of claim 1, further comprising:
receiving authorization certificates for compliant applications; encrypting the authorization certificates; and storing the encrypted authorization certificates in the designated area of the file.
- 12. The method of claim 1, further comprising:
identifying reference files for the selected file; receiving designated rights to the reference file for the intended recipient; encrypting the designated rights with a password; encrypting the password using a public key of the intended recipient; storing the encrypted rights and password in a designated area of the file; encrypting the reference file with the password.
- 13. A method for accessing files received by a recipient, comprising:
identifying an encrypted file; using a private key of the recipient to decrypt a master password stored in the file; using the master password to decrypt pre-defined rights stored in a designated area of the file; and using the pre-defined rights to control access of the recipient to the file.
- 14. The method of claim 13, wherein the identifying step comprises:
examining a header of the file; locating an encryption flag; and locating an appropriate private key to decrypt the master password if the encryption flag is set.
- 15. The method of claim 13, further comprising:
decrypting a URL stored in the designated area; attempting to access the URL; and denying access to the file if the URL cannot be accessed.
- 16. The method of claim 15, wherein the URL identifies a file that includes the predefined rights.
- 17. The method of claim 13, further comprising:
decrypting only data in the file that is necessary to perform a selected operation.
- 18. The method of claim 17, wherein the decrypted data is stored in memory.
- 19. The method of claim 18, wherein data of the file stored on a storage medium is not decrypted.
- 20. The method of claim 13, further comprising:
receiving a request to load an application; identifying a digital signature for the requested application; determining if the digital signature was created using an authorized certificate; loading the requested application if the digital signature was created using an authorized certificate; and preventing the requested application from operating if the digital signature was not created using an authorized certificate.
- 21. A method for creating a digital signature, comprising
receiving a digital certificate identifying a signer; receiving an identification of an item to be signed; and creating a hash value for the item; encrypting the hash value using a private key specified by the digital certificate; and securing the encrypted hash value to the item.
- 22. The method of claim 21 wherein the item is a design file.
- 23. The method of claim 21 wherein the item is a model.
- 24. The method of claim 23, further comprising:
determining the type of item being signed; and when the item is a model, the creating step comprises:
a) creating a model hash for model level information; b) adding all elements in the model, except for a signature element, to the model hash; c) adding contents of the signature element to the model hash, excluding the signature itself; and d) adding the signature to the hash, excluding the hash value.
- 25. The method of claim 24, further comprising repeating steps a)-d) for each reference model.
- 26. The method of claim 22, wherein the encrypting step comprises:
creating a file hash for file-level information; computing a model hash for each model in the file; adding the model hash for each model in the file to the file hash; adding the signature element to the file hash, excluding the signature itself; and adding the signature to the file hash, excluding the file hash value.
- 27. The method of claim 26, further comprising creating a model hash for each reference and adding the model hash to the file hash.
- 28. The method of claim 26, further comprising using an existing model hash in creating the file hash if the model hash for a model exists.
- 29. The method of claim 27, further comprising using an existing model hash in creating the file hash if the model hash for a model exists.
- 30. The method of claim 21, further comprising representing the signature as a text element.
- 31. The method of claim 21, further comprising representing the signature as a cell.
- 32. The method of claim 31, wherein the cell includes a logical name for the signature, a graphic to represent to signature graphically, and a copy of the digital certificate.
- 33. The method of claim 21, further comprising:
displaying available digital certificates to a signer; and receiving a selected digital certificate from the display to be used in creating the signature.
- 34. The method of claim 21, further comprising displaying items available for signature to a signer; and
receiving a selected item for signature from the signer.
- 35. The method of claim 24, further comprising creating a data linkage to identify the signature element.
- 36. The method of claim 21, further comprising specifying the signature is dependent on later added signatures.
- 37. The method of claim 21, further comprising the signature is dependent on previously added signatures.
- 38. A method for verifying a digital signature, comprising:
receiving a document including an encrypted digital signature with a hash value; extracting a public key from the digital signature; decrypting the hash value using the public key; creating a comparison hash value for the document; comparing the comparison hash value with the decrypted hash value; and determining the document has been altered when the new hash value and the decrypted hash value do not match.
- 39. The method of claim 38, further comprising displaying a graphical representation of the status of the signature.
- 40. The method of claim 38, further comprising:
identifying a pre-existing signature; including the pre-existing signature in the hash, whereby invalidating the pre-existing signature also invalidates the signature.
- 41. The method of claim 38, further comprising:
searching the document for valid signatures; and uniquely indicating valid signatures in the document.
- 42. The method of claim 38, further comprising:
displaying all signatures in the document; displaying a verified, trusted, or expired statuses of the signatures; and displaying annotation data for the signatures.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority from U.S. Provisional Application Serial Nos. 60/377,652, 60/377,648, and 60/394,652, each of which is incorporated by reference.
Provisional Applications (3)
|
Number |
Date |
Country |
|
60377652 |
May 2002 |
US |
|
60377648 |
May 2002 |
US |
|
60394652 |
Jul 2002 |
US |