Claims
- 1. A method for accessing a secured file, said method comprising the acts of:
(a) obtaining the secured file to be accessed, the secured file having a header portion and a data portion; (b) retrieving a security information pointer from the header portion of the secured file; (c) obtaining security information for the secured file using the security information pointer; and (d) permitting access to the secured file to the extent permitted by the security information.
- 2. A method as recited in claim 1, wherein said permitting (d) of access comprises the acts of:
(d1) retrieving a file key from the header portion; and (d2) decrypting the data portion of the secured file using the file key.
- 3. A method as recited in claim 1, wherein a requestor desires to access the secured file, the requestor having requestor characteristics, and
wherein said permitting (d) of access comprises the acts of:
(d1) retrieving at least one access rule from the security information; and (d2) determining whether the requestor is permitted to access the secured file based on the at least one access rule and the requestor characteristics.
- 4. A method as recited in claim 3, wherein the requestor characteristics include at least a group association for the requestor.
- 5. A method as recited in claim 3, wherein the at least one access rule is provided in a markup language format.
- 6. A method as recited in claim 3, wherein when said determining (d2) determines that the requestor is permitted to access the secured file, then said permitting (d) further comprises the acts of:
(d3) retrieving a file key from the header portion; and (d4) decrypting the data portion of the secured file using the file key.
- 7. A method as recited in claim 1, wherein a requestor desires to access the secured file, and wherein said method further comprises the acts of:
(e) decrypting, following said obtaining (c) and before said (d) permitting, the security information.
- 8. A method as recited in claim 7, wherein said decrypting (e) of the security information is performed using a key associated with the requestor.
- 9. A method as recited in claim 8, wherein the key associated with the requestor is a user key.
- 10. A method as recited in claim 7, wherein a requestor desires to access the secured file, the requestor having requestor characteristics, and
wherein said permitting (d) of access comprises the acts of:
(d1) retrieving at least one access rule from the security information; and (d2) determining whether the requestor is permitted to access the secured file based on the at least one access rule and the requestor characteristics.
- 11. A method as recited in claim 10, wherein the requestor characteristics include at least a group association for the requestor.
- 12. A method as recited in claim 10, wherein the at least one access rule is provided in a markup language format.
- 13. A method as recited in claim 10, wherein when said determining (d2) determines that the requestor is permitted to access the secured file, then said permitting (d) further comprises the acts of:
(d3) retrieving a file key from the header portion; and (d4) decrypting the data portion of the secured file using the file key.
- 14. A method as recited in claim 1, wherein the security information includes at least access rules, and the header portion includes at least the security information pointer and an encrypted key.
- 15. A method as recited in claim 14, wherein when said determining (d2) determines that the requestor is permitted to access the secured file, then said permitting (d) further comprises the acts of:
(d1) retrieving the encrypted key from the header portion; (d2) decrypting the encrypted key to produce an unencrypted key; and (d3) decrypting the data portion of the secured file using the unencrypted key.
- 16. A method as recited in claim 15, wherein the encrypted key is an encrypted file key.
- 17. A method as recited in claim 16, wherein a requestor desires to access the secured file, and wherein said decrypting (d2) is performed using a key associated with the requestor.
- 18. A computer readable medium including at least computer program code for accessing a secured item, said computer readable medium comprises:
computer program code for obtaining the secured item to be accessed, the secured item having a header portion and a data portion; computer program code for retrieving a security information pointer from the header portion of the secured item; computer program code for obtaining security information for the secured item using the security information pointer; and computer program code for permitting access to the secured item to the extent permitted by the security information.
- 19. A computer readable medium as recited in claim 18, wherein said computer program code for permitting access comprises:
computer program code for retrieving a file key from the header portion; and computer program code for decrypting the data portion of the secured item using the file key.
- 20. A computer readable medium as recited in claim 18, wherein a requestor desires to access the secured item, the requestor having requestor characteristics, and
wherein said computer program code for permitting comprises:
computer program code for retrieving at least one access rule from the security information; and computer program code for determining whether the requestor is permitted to access the secured item based on the at least one access rule and the requestor characteristics.
- 21. A computer readable medium as recited in claim 20, wherein the requestor characteristics include at least a group association for the requestor.
- 22. A computer readable medium as recited in claim 20, wherein the at least one access rule is provided in a markup language format.
- 23. A computer readable medium as recited in claim 20, wherein when said computer program code for determining determines that the requestor is permitted to access the secured item, then said computer program code for permitting further comprises:
computer program code for retrieving a file key from the header portion; and computer program code for decrypting the data portion of the secured item using the file key.
- 24. A computer readable medium as recited in claim 18, wherein a requestor desires to access the secured item, and wherein said method further comprises:
computer program code for decrypting the security information after being obtained and before being used to determine whether access is permitted.
- 25. A computer readable medium as recited in claim 24, wherein said computer program code for decrypting the security information uses a key associated with the requestor.
- 26. A computer readable medium as recited in claim 25, wherein the key associated with the requestor is a user key.
- 27. A computer readable medium as recited in claim 24, wherein a requestor desires to access the secured item, the requestor having requestor characteristics, and
wherein said computer program code for permitting access comprises:
computer program code for retrieving at least one access rule from the security information; and computer program code for determining whether the requestor is permitted to access the secured item based on the at least one access rule and the requestor characteristics.
- 28. A computer readable medium as recited in claim 27, wherein the requestor characteristics include at least a group association for the requestor.
- 29. A computer readable medium as recited in claim 27, wherein the at least one access rule is provided in a markup language format.
- 30. A computer readable medium as recited in claim 27, wherein when said computer program code for determining determines that the requestor is permitted to access the secured item, then said computer program code for permitting further comprises:
computer program code for retrieving a file key from the header portion; and computer program code for decrypting the data portion of the secured item using the file key.
- 31. A computer readable medium as recited in claim 18, wherein the security information includes at least access rules, and the header portion includes at least the security information pointer and an encrypted key.
- 32. A computer readable medium as recited in claim 31, wherein when said computer program code for determining determines that the requestor is permitted to access the secured file, then said computer program code for permitting further comprises:
computer program code for retrieving the encrypted key from the header portion; computer program code for decrypting the encrypted key to produce an unencrypted key; and computer program code for decrypting the data portion of the secured file using the unencrypted key.
- 33. A computer readable medium as recited in claim 32, wherein the encrypted key is an encrypted file key.
- 34. A computer readable medium as recited in claim 33, wherein a requestor desires to access the secured file, and wherein said computer program code for decrypting the encrypted key is performed using a key associated with the requestor.
- 35. A computer readable medium as recited in claim 18, wherein the secured item is a secured file.
- 36. A computer readable medium as recited in claim 18, wherein the secured file is a secured document.
- 37. A system for accessing a secured item, the secured item having a header portion and an encrypted data portion, the header portion including a pointer and an encrypted key, said system comprising:
a storage device, said storage device storing security information for a plurality of different secured items, the pointer serving to locate the security information associated with secured item; a first decryption module, said first decryption module receiving the encrypted key from the header portion of the secured item and decrypting the encrypted key to obtain a key; an access analyzer operatively connected to said storage device, said access rules analyzer determines whether the encrypted data portion is permitted to be accessed by a requestor based on the security information; and a second decryption module operatively connected to said access analyzer, said second decryption module decrypting the encrypted data portion using the key to produce an unencrypted data portion that the requestor is able to access, provided said access analyzer determines that the encrypted data portion is permitted to be accessed by the requestor.
- 38. A system as recited in claim 37, wherein the security information includes at least an access rule, and wherein the requestor has user privileges associated therewith, and
wherein said access analyzer determines whether the encrypted data portion is permitted to be accessed by the requestor based on the access rule and the user privileges.
- 39. A data structure for a secured file, said data structure comprising:
a header portion containing at least a pointer to separately stored security information and a key, at least the key portion of said header portion is encrypted; and a data portion containing at least encrypted data of the secured file.
- 40. A data structure as recited in claim 39, wherein the pointer is used to access the separately stored security information which is in turn used to determine whether a particular requestor for access to the secured file is permitted, and then when access is permitted, providing the key to the requestor so that the encrypted data in said data portion can thereafter be decrypted and thus accessed.
- 41. A data structure as recited in claim 39, wherein the pointer points to a database that stores the separately stored security information for a plurality of secured files.
- 42. A data structure as recited in claim 39, wherein like separately stored secured information can be shared by a plurality of secured files.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part application of U.S. patent application Ser. No. 10/074,194, filed Feb. 12, 2002, and entitled “SYSTEM AND METHOD FOR PROVIDING MULTI-LOCATION ACCESS MANAGEMENT TO SECURED ITEMS,” which is hereby incorporated by reference for all purposes. This application also claims the benefits of U.S. Provisional Application No. 60/339,634, filed Dec. 12, 2001, and entitled “PERVASIVE SECURITY SYSTEMS,” which is hereby incorporated by reference for all purposes.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60339634 |
Dec 2001 |
US |
Continuations (1)
|
Number |
Date |
Country |
Parent |
10132712 |
Apr 2002 |
US |
Child |
10206486 |
Jul 2002 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10075194 |
Feb 2002 |
US |
Child |
10132712 |
Apr 2002 |
US |