WO2000064095A1 - Electronic document protection system - Google Patents

Electronic document protection system Download PDF

Info

Publication number
WO2000064095A1
WO2000064095A1 PCT/US2000/009645 US0009645W WO0064095A1 WO 2000064095 A1 WO2000064095 A1 WO 2000064095A1 US 0009645 W US0009645 W US 0009645W WO 0064095 A1 WO0064095 A1 WO 0064095A1
Authority
WO
WIPO (PCT)
Prior art keywords
protection
file
operating system
application program
flag
Prior art date
Application number
PCT/US2000/009645
Other languages
French (fr)
Inventor
Sivakumar Muthuswamy
Anupama Ramamurthy
Original Assignee
Motorola Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc. filed Critical Motorola Inc.
Priority to AU43396/00A priority Critical patent/AU4339600A/en
Publication of WO2000064095A1 publication Critical patent/WO2000064095A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Definitions

  • TECHNICAL FIELD This invention relates in general to document security, and in particular to a system for protecting electronic documents.
  • Computer networks are being used extensively to enable groups of two or more people to communicate. For example, many offices utilize local area networks that enable employees to communicate with each other via electronic mail (e-mail). In addition, individual computers or local area networks may be linked to form a broad-based network to facilitate communications between remote persons. The Internet is but one example of such a broad-based network.
  • One effect of the increasing use of computer networks for communication is that electronic documents are fast replacing paper documents in both business and non-business environments. For example, letters, specifications, control drawings, spreadsheets, artwork, blueprints, video images, output from electronic scanners and routine business forms can be represented in electronic form and transferred as electronic documents using computers. Moreover, electronic representation of documents will increase as automated equipment becomes more prevalent in offices and homes.
  • document configuration management systems which provide security by using a software-implemented locking mechanism that locks documents into a software library.
  • a document is "signed" by checking it out of the library, modifying it if desired, then checking it back into the software library with appropriate comments.
  • the party that checked out and returned the document may be considered to have "approved” it.
  • the returned document can then be viewed by other users with confidence that it has not been modified since it was last replaced.
  • document configuration management systems suffer from numerous disadvantages. For example, they require a central configuration management server that must be available to all users. Linking all users to the central configuration management server is impractical for loosely coupled systems, such as the Internet.
  • document configuration management systems are ill-suited for widespread use by unaffiliated or loosely affiliated users.
  • a second generally known technique for providing electronic document security is referred to as public key encryption.
  • public key encryption techniques Many specific types are known. For example, the National Institute of Science and Technology (NIST) has adopted a Digital Signature Standard based on public key encryption. The electronic information is encrypted using the signator's private key within a public key encryption technique. Subsequent successful decryption and hash confirmation by the recipient verifies the integrity of the document and identity of the signator.
  • NIST National Institute of Science and Technology
  • private key encryption techniques In private key encryption techniques, the private key is not mathematically related to any other key. Accordingly, the private key is required for decryption.
  • public key encryption techniques use a public key and a private key that are mathematically related. However, it is practically impossible to derive the private key from the public key. As the name suggests, the public key can be known by anyone and the private key is secret and should be protected from modification and disclosure.
  • FIG. 1 is a schematic chart depicting an electronic document protection system in accordance with the invention.
  • FIG. 2 is a schematic chart depicting an alternate embodiment of an electronic document protection system in accordance with the invention.
  • FIG. 3 is a schematic chart depicting a third embodiment of an electronic document protection system in accordance with the invention.
  • a protection flag is associated with a source file by a protection component in order to define a level of protection for the file.
  • another protection component reads the protection flag and communicates it to the operating system and/or the application program.
  • the security of the file is controlled by enabling or disabling selected operational functionalities of the operating system and/or the application program at the destination in response to the communication from the protection component.
  • a preferred embodiment of the electronic document protection system contains a source 100 that has an electronic document or file 120 and a protection component 140.
  • the file 120 is the 'electronic document' that is desired to be protected from alteration, printing, forwarding, etc.
  • the destination 1 10 typically contains a second protection component 150, an operating system (OS) 160 and one or more application programs 170.
  • OS operating system
  • the first protection component 140 and the second protection component 150 are the first step in the protection process.
  • the first step in the protection process is for the first protection component 140 to associate a protection flag 130 with the file 120.
  • the values of the flag components set by the protection component 140 are based on the level of security desired by the owner of the file. In a typical situation, the protection flag is invisible and/or inaccessible to the user.
  • the flags associated with the file are binary flags which have a number of bits in the flag. Each bit corresponds to one aspect of the level or type of protection that is desired to be achieved. For example, the value of a bit is set to 'one 7 when a user of the file is to be prevented from gaining access to specific functionality associated with that bit (such as, but not limited to, saving files, saving the file with a different name, saving the file in a different format, creating a duplicate copy of the file, export, insert, clipboard, printing or forwarding).
  • the value of the bit by default is zero which means the user of the file will have access to functionality associated with the bit.
  • the bits in the flag can be grouped together by their functionality such as operating system functions, application program functions and graphical user interface functions.
  • the protection flags are described here as binary flags, many other schemes that are well known in the software art can be used to represent the flag.
  • the value of the flags can be encrypted using well-known algorithms of the prior art and embedded in a pre-specified location inside the file.
  • the embedded flag is an integral part of the file content and hence is copied or moved with the file. Embedding the flag within the file is one way of associating the protection flag 130 with the file 120.
  • An alternate method is to store a list of file names and associated protection flags in the protection component 140 and send them over the communication link 180 on demand by elements of destination 1 10.
  • the second protection component 150 reads the value of the bits in the embedded flag and communicates the relevant values to the operating system 160 and/or the application program 170.
  • the operating system and/or the application program in turn enables or disables their specific functions in response to the communication from the protection component 150.
  • Some common access, operation and manipulation functions of operating systems that are relevant to this invention are copying files, renaming files, moving files and duplicating files. In essence, all of these functionalities are related to accessing and creating a duplicate of the original file at the operating system level.
  • Some application program-level file operation functions that are widely known in the art and are relevant to this invention are saving files, saving file with a different name, saving file in a different format and creating a duplicate copy of the file.
  • Other functions of the application program that can be controlled through the flag include export, insert, clipboard and printing.
  • export, insert, clipboard and printing In a typical environment, when a computer user accesses the protected file through the application program, the view of the file provided to the user has all the protection levels enforced, thus preventing the user from creating duplicate copies of the original content in whole or in parts.
  • Both the first and the protection component can be implemented using standard software techniques well known in the art. Though the source and destination are shown as separate elements in FIG. 1 , they can reside in the same physical device. Optionally, a communication link 180 is used to transfer the file 120 from the source 100 to the destination 1 10 if the source and destination are not the same physical device.
  • a graphical user interface (GUI) 190 is present in the destination in addition to the operating system and the application program.
  • the protection component 1 50 communicates the flag values to the graphical user interface as well as to the operating system and the application program.
  • the typical graphical user interface level functions that will be controlled through the flag bits include clipboard, screen capture and screen dumps.
  • the source 300 contains a computer 305 which has a file system 325 and source software protection component 340.
  • the file system 325 contains a file 320 and a fiag 330 is associated with the file.
  • the first step in the protection process is for the protection component 340 to associate the protection flag 330 with the file 320.
  • the values of the flag components set by the protection component 340 are based on the level of security desired by the owner of the file.
  • Some of the common forms of communication link 380 are the Internet, intranets established within a company, local area networks which are geographically located in close proximity and wide-area networks that are dispersed over long- distances.
  • the mechanism of transfer over the communication link can be any of the industry standard methods such as hypertext transfer protocol (HTTP), electronic mail in various forms (e-mail) and file transfer protocol (FTP).
  • HTTP hypertext transfer protocol
  • e-mail electronic mail in various forms
  • FTP file transfer protocol
  • the second protection component 350 reads the value of the bits either in the embedded flag or the flag transferred over the communication link and communicates the relevant values to the operating system 360, the application program 370 and the graphical user interface.
  • the operating system 360, the application program 370 and the graphical user interface 390 enable or disable their specific functions in response to the communication from the protection component 350.
  • Some common access, operation and manipulation functions of operating system that are relevant to this invention are copying files, renaming files, moving files and duplicating files. In essence, all of these functionalities are related to accessing and creating a duplicate of the original file at the operating system level.
  • the application program level file operation functions that are widely known in the art and relevant to this invention are saving files, saving file with a different name, saving file in a different format and creating a duplicate copy of the file.
  • Other functions of the application program that will be controlled through the flag bits include export, insert, clipboard and printing.
  • Security information is embedded in a document by a flag in a predetermined format, and the flag is read by the OS or an application program to invoke predetermined restrictions on the operations that can be performed on that document.

Abstract

An electronic document protection system consists of a source (100) in which a protection flag (130) is associated with a file (120) by a first protection component (140) to define a level of protection for the file. The electronic documentation system also has a destination which includes an operating system (160), an application program (170) and a second protection component (150) that interfaces with the operating system. At the destination, the second protection component reads the protection flag and communicates it to the operating system and the application program. Selected functionalities of the operating system and the application program at the destination are enabled or disabled in response to the communication from the second protection component.

Description

ELECTRONIC DOCUMENT PROTECTION SYSTEM
TECHNICAL FIELD This invention relates in general to document security, and in particular to a system for protecting electronic documents.
BACKGROUND Computer networks are being used extensively to enable groups of two or more people to communicate. For example, many offices utilize local area networks that enable employees to communicate with each other via electronic mail (e-mail). In addition, individual computers or local area networks may be linked to form a broad-based network to facilitate communications between remote persons. The Internet is but one example of such a broad-based network. One effect of the increasing use of computer networks for communication is that electronic documents are fast replacing paper documents in both business and non-business environments. For example, letters, specifications, control drawings, spreadsheets, artwork, blueprints, video images, output from electronic scanners and routine business forms can be represented in electronic form and transferred as electronic documents using computers. Moreover, electronic representation of documents will increase as automated equipment becomes more prevalent in offices and homes.
Like paper documents, many electronic documents are routinely circulated among several persons, and consequently, it is often desirable to control the distribution or alteration of the document to ensure that the electronic document was not altered after origination. However, without some form of protection, electronic documents are easily forwarded, printed, copied or otherwise altered in a manner that may escape detection.
One solution to this problem is embodied in document configuration management systems, which provide security by using a software-implemented locking mechanism that locks documents into a software library. A document is "signed" by checking it out of the library, modifying it if desired, then checking it back into the software library with appropriate comments. The party that checked out and returned the document may be considered to have "approved" it. The returned document can then be viewed by other users with confidence that it has not been modified since it was last replaced. However, document configuration management systems suffer from numerous disadvantages. For example, they require a central configuration management server that must be available to all users. Linking all users to the central configuration management server is impractical for loosely coupled systems, such as the Internet.
Accordingly, document configuration management systems are ill-suited for widespread use by unaffiliated or loosely affiliated users.
A second generally known technique for providing electronic document security is referred to as public key encryption. Many specific types of public key encryption techniques are known. For example, the National Institute of Science and Technology (NIST) has adopted a Digital Signature Standard based on public key encryption. The electronic information is encrypted using the signator's private key within a public key encryption technique. Subsequent successful decryption and hash confirmation by the recipient verifies the integrity of the document and identity of the signator.
In private key encryption techniques, the private key is not mathematically related to any other key. Accordingly, the private key is required for decryption. In general, public key encryption techniques use a public key and a private key that are mathematically related. However, it is practically impossible to derive the private key from the public key. As the name suggests, the public key can be known by anyone and the private key is secret and should be protected from modification and disclosure.
However, electronic signature and document configuration management systems which provide document security do not currently work within the structure of today's highly integrated electronic office tool sets, and are not easy to use, particularly for computer novices. Little effort has been expended to make such techniques accessible to the average computer user, who has a relatively low level of computer expertise. Accordingly, there is a need for electronic data security techniques that are transparent, user-friendly, that provide a sufficient degree of security that will deter forgery and alterations, and that can be used in a wide variety of computer systems.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic chart depicting an electronic document protection system in accordance with the invention.
FIG. 2 is a schematic chart depicting an alternate embodiment of an electronic document protection system in accordance with the invention.
FIG. 3 is a schematic chart depicting a third embodiment of an electronic document protection system in accordance with the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT In an electronic document protection system, a protection flag is associated with a source file by a protection component in order to define a level of protection for the file. At the destination, another protection component reads the protection flag and communicates it to the operating system and/or the application program. The security of the file is controlled by enabling or disabling selected operational functionalities of the operating system and/or the application program at the destination in response to the communication from the protection component.
While the specification concludes with claims defining the features of the invention that are regarded as novel, it is believed that the invention will be better understood from a consideration of the following description in conjunction with the drawing figures. Referring now to FIG. 1, a preferred embodiment of the electronic document protection system according to the present invention contains a source 100 that has an electronic document or file 120 and a protection component 140. The file 120 is the 'electronic document' that is desired to be protected from alteration, printing, forwarding, etc. The destination 1 10 typically contains a second protection component 150, an operating system (OS) 160 and one or more application programs 170. At the heart of the system are the first protection component 140 and the second protection component 150. The first step in the protection process is for the first protection component 140 to associate a protection flag 130 with the file 120. The values of the flag components set by the protection component 140 are based on the level of security desired by the owner of the file. In a typical situation, the protection flag is invisible and/or inaccessible to the user. In one embodiment, the flags associated with the file are binary flags which have a number of bits in the flag. Each bit corresponds to one aspect of the level or type of protection that is desired to be achieved. For example, the value of a bit is set to 'one7 when a user of the file is to be prevented from gaining access to specific functionality associated with that bit (such as, but not limited to, saving files, saving the file with a different name, saving the file in a different format, creating a duplicate copy of the file, export, insert, clipboard, printing or forwarding). The value of the bit by default is zero which means the user of the file will have access to functionality associated with the bit. The bits in the flag can be grouped together by their functionality such as operating system functions, application program functions and graphical user interface functions. Although the protection flags are described here as binary flags, many other schemes that are well known in the software art can be used to represent the flag. The value of the flags can be encrypted using well-known algorithms of the prior art and embedded in a pre-specified location inside the file. The embedded flag is an integral part of the file content and hence is copied or moved with the file. Embedding the flag within the file is one way of associating the protection flag 130 with the file 120. An alternate method is to store a list of file names and associated protection flags in the protection component 140 and send them over the communication link 180 on demand by elements of destination 1 10.
At the destination, whenever the file is accessed for any operation either by the operating system or by the application program, the second protection component 150 reads the value of the bits in the embedded flag and communicates the relevant values to the operating system 160 and/or the application program 170. The operating system and/or the application program in turn enables or disables their specific functions in response to the communication from the protection component 150. Some common access, operation and manipulation functions of operating systems that are relevant to this invention are copying files, renaming files, moving files and duplicating files. In essence, all of these functionalities are related to accessing and creating a duplicate of the original file at the operating system level. Some application program-level file operation functions that are widely known in the art and are relevant to this invention are saving files, saving file with a different name, saving file in a different format and creating a duplicate copy of the file. Other functions of the application program that can be controlled through the flag include export, insert, clipboard and printing. In a typical environment, when a computer user accesses the protected file through the application program, the view of the file provided to the user has all the protection levels enforced, thus preventing the user from creating duplicate copies of the original content in whole or in parts.
Both the first and the protection component can be implemented using standard software techniques well known in the art. Though the source and destination are shown as separate elements in FIG. 1 , they can reside in the same physical device. Optionally, a communication link 180 is used to transfer the file 120 from the source 100 to the destination 1 10 if the source and destination are not the same physical device. Referring now to FIG 2, an alternate embodiment of the invention is depicted. In this embodiment a graphical user interface (GUI) 190 is present in the destination in addition to the operating system and the application program. The protection component 1 50 communicates the flag values to the graphical user interface as well as to the operating system and the application program. The typical graphical user interface level functions that will be controlled through the flag bits include clipboard, screen capture and screen dumps.
In yet another embodiment shown in FIG. 3, the source 300 contains a computer 305 which has a file system 325 and source software protection component 340. The file system 325 contains a file 320 and a fiag 330 is associated with the file. The first step in the protection process is for the protection component 340 to associate the protection flag 330 with the file 320. The values of the flag components set by the protection component 340 are based on the level of security desired by the owner of the file. When a user at the destination requests to use or see the file 320, the file with the embedded flags is transferred over the communication link 380 to the computer 306. Some of the common forms of communication link 380 are the Internet, intranets established within a company, local area networks which are geographically located in close proximity and wide-area networks that are dispersed over long- distances. The mechanism of transfer over the communication link can be any of the industry standard methods such as hypertext transfer protocol (HTTP), electronic mail in various forms (e-mail) and file transfer protocol (FTP). At the destination, whenever the file is accessed for any operation the second protection component 350 reads the value of the bits either in the embedded flag or the flag transferred over the communication link and communicates the relevant values to the operating system 360, the application program 370 and the graphical user interface. The operating system 360, the application program 370 and the graphical user interface 390 enable or disable their specific functions in response to the communication from the protection component 350. Some common access, operation and manipulation functions of operating system that are relevant to this invention are copying files, renaming files, moving files and duplicating files. In essence, all of these functionalities are related to accessing and creating a duplicate of the original file at the operating system level. The application program level file operation functions that are widely known in the art and relevant to this invention are saving files, saving file with a different name, saving file in a different format and creating a duplicate copy of the file. Other functions of the application program that will be controlled through the flag bits include export, insert, clipboard and printing. In summary, our invention overcomes the deficiencies in the prior art by providing an electronic document protection method and system. Security information is embedded in a document by a flag in a predetermined format, and the flag is read by the OS or an application program to invoke predetermined restrictions on the operations that can be performed on that document. While the preferred embodiments of the invention have been illustrated and described, it will be clear that the invention is not so limited. Numerous modifications, changes, variations, substitutions and equivalents will occur to those skilled in the art without departing from the spirit and scope of the present invention as defined by the appended claims.
What is claimed is:

Claims

1. An electronic document protection system, comprising: a source which comprises: a file; a protection flag associated with the file; and a first protection component that sets the protection flag to define a level of protection for the file; a destination which comprises: an operating system; an application program that interfaces with the operating system; and a second protection component that reads the protection flag and communicates it to the operating system and the application program; and wherein selected operations on the file by the operating system or the application program are enabled or disabled in response to the communication from the second protection component.
2. The electronic document protection system of claim 1, further comprising a communication link for transferring the file and the protection flag from the source to the destination.
3. The electronic document protection system of claim 1, wherein said selected operations are selected from the group consisting of file access, file operations, file manipulation, export, insert, clipboard and printing.
4. The electronic document protection system of claim 1, wherein the source and destination are contained in the same physical device.
5. The electronic document protection system of claim 1 , wherein the protection flag is encrypted.
6. The electronic document protection system of claim 1 , wherein the protection flag is maintained by the first protection component and transmitted to the second protection component over the communication link on demand by the second protection component.
7. The electronic document protection system of claim 1 , wherein the protection flag is embedded within the file.
8. A system for preventing unauthorized reuse of content in an electronic document, comprising: a source which comprises: a file; a protection flag associated with the file; and a first protection component that sets the protection flag to define a level of protection for the file; a destination which comprises: an operating system; an application program that interfaces with the operating system; a graphical user interface that interacts with the operating system and the application program; and a second protection component that reads the protection flag and communicates it to the operating system, the application program and the graphical user interface; and wherein selected operations on the file by the operating system, the application program, or the graphical user interface are enabled or disabled in response to the communication from the second protection component.
9. A system for preventing unauthorized reuse of content in an electronic document distributed over a communication network, comprising: a source which comprises: a computer having a file system and a software protection component; a file stored in the file system; a protection flag associated with the file; the software protection component setting the protection flag to define a level of protection for the file; and a communication link for transferring the file from the source to a destination; a destination which comprises: a computer having an operating system; an application program that operates on the transferred file; a graphical user interface that interacts with the destination operating system and the application program; and a software protection component that reads the protection flag and communicates it to the destination operating system, the application program and the graphical user interface; wherein selected operations on the file by the operating system, the application program, or the graphical user interface are enabled or disabled in response to the communication from the destination protection component.
PCT/US2000/009645 1999-04-15 2000-04-11 Electronic document protection system WO2000064095A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU43396/00A AU4339600A (en) 1999-04-15 2000-04-11 Electronic document protection system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US29220799A 1999-04-15 1999-04-15
US09/292,207 1999-04-15

Publications (1)

Publication Number Publication Date
WO2000064095A1 true WO2000064095A1 (en) 2000-10-26

Family

ID=23123685

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/009645 WO2000064095A1 (en) 1999-04-15 2000-04-11 Electronic document protection system

Country Status (2)

Country Link
AU (1) AU4339600A (en)
WO (1) WO2000064095A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6829592B1 (en) * 1997-06-11 2004-12-07 Fujitsu Limited Data protection system, data preparation device, and data working device
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5673316A (en) * 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US5905505A (en) * 1996-05-13 1999-05-18 Bell Communications Research, Inc. Method and system for copy protection of on-screen display of text
US5933498A (en) * 1996-01-11 1999-08-03 Mrj, Inc. System for controlling access and distribution of digital property
US6002772A (en) * 1995-09-29 1999-12-14 Mitsubishi Corporation Data management system
US6044469A (en) * 1997-08-29 2000-03-28 Preview Software Software publisher or distributor configurable software security mechanism
US6047242A (en) * 1997-05-28 2000-04-04 Siemens Aktiengesellschaft Computer system for protecting software and a method for protecting software
US6049789A (en) * 1998-06-24 2000-04-11 Mentor Graphics Corporation Software pay per use licensing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5809144A (en) * 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US6002772A (en) * 1995-09-29 1999-12-14 Mitsubishi Corporation Data management system
US5765152A (en) * 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5933498A (en) * 1996-01-11 1999-08-03 Mrj, Inc. System for controlling access and distribution of digital property
US5673316A (en) * 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US5905505A (en) * 1996-05-13 1999-05-18 Bell Communications Research, Inc. Method and system for copy protection of on-screen display of text
US6047242A (en) * 1997-05-28 2000-04-04 Siemens Aktiengesellschaft Computer system for protecting software and a method for protecting software
US6044469A (en) * 1997-08-29 2000-03-28 Preview Software Software publisher or distributor configurable software security mechanism
US6049789A (en) * 1998-06-24 2000-04-11 Mentor Graphics Corporation Software pay per use licensing system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6829592B1 (en) * 1997-06-11 2004-12-07 Fujitsu Limited Data protection system, data preparation device, and data working device
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system

Also Published As

Publication number Publication date
AU4339600A (en) 2000-11-02

Similar Documents

Publication Publication Date Title
US8769492B2 (en) Method for updating data in accordance with rights management policy
US20200028827A1 (en) Method and system for digital rights management of documents
US7515717B2 (en) Security containers for document components
US7430754B2 (en) Method for dynamic application of rights management policy
US7757162B2 (en) Document collection manipulation
US6976165B1 (en) System and method for secure storage, transfer and retrieval of content addressable information
CN1756147B (en) Enforcing rights management through edge email servers
US8040541B2 (en) Secure document printing
US20090292930A1 (en) System, method and apparatus for assuring authenticity and permissible use of electronic documents
US20120030187A1 (en) System, method and apparatus for tracking digital content objects
US20110219424A1 (en) Information protection using zones
IL128576A (en) Self-destructing document and e-mail messaging system
WO2000008794A2 (en) Systems and methods for securing electronic message
JP2005141483A (en) Document providing server
WO2000064095A1 (en) Electronic document protection system
KR20160059001A (en) Electronic Document Management System for Trade Secret based on Document Controll Module and Method thereof
JP4526058B2 (en) Electronic seal system
CN117176408A (en) Method, system and storage medium for preventing data file from leakage
AU761129B2 (en) Self-destructing document and E-mail messaging system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP