WO2007000761A3 - Method and apparatus for protecting files from none authorized access - Google Patents
Method and apparatus for protecting files from none authorized access Download PDFInfo
- Publication number
- WO2007000761A3 WO2007000761A3 PCT/IL2006/000743 IL2006000743W WO2007000761A3 WO 2007000761 A3 WO2007000761 A3 WO 2007000761A3 IL 2006000743 W IL2006000743 W IL 2006000743W WO 2007000761 A3 WO2007000761 A3 WO 2007000761A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- server
- domains
- time
- protecting
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Abstract
The patent shows a way to protect your intellectual assets using distributed data and encryption keys across multiple domains, with session based token, as for protecting schema while been place on a portable or unprotected wide access network; While trying to remove one of the need domains or removing the protecting process assets it will be not fully readable, as it simply does not contains the plain data, neither the full encrypted data or the fully set of encrypted keys. While of server a drm like behavior is used. Security session time is pre set and if no communication is establish with the server within this maximum time, file is unreadable. Usage: to protect intellectual assets as: documents, drawing, strategic plains, music, images and movies will be call general name: document The domains can be: server, workstation, portable, network and removable media like smart disk on key, smart cards, phone, any network token, and possibly also a bio information sources like: eyes, finger, heart peace and egg. The document is encrypted on the fly using any technique of encryption process If killing the protecting skill, the data is meaningless Some of the time one of the domain may be missing, e.g the server like in the case of taking portable to a business trip. In this case you get a time constrain on the third removable media, which is store separately and when is missing not all data as well as the public or private key is fully exists on the one of the remaining domains. Also when the time constrain is false no data can be retrieve. This can be good for access only on working hour or for a duration of the travel. Also for Video on demand application this can prevent watching by unauthorized unpaid movie where either the Lan or the card is used as the missing bits parts.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL16943105 | 2005-06-27 | ||
IL169431 | 2005-06-27 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007000761A2 WO2007000761A2 (en) | 2007-01-04 |
WO2007000761A3 true WO2007000761A3 (en) | 2011-05-19 |
Family
ID=37595523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2006/000743 WO2007000761A2 (en) | 2005-06-27 | 2006-06-26 | Method and apparatus for protecting files from none authorized access |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2007000761A2 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4740926B2 (en) * | 2007-11-27 | 2011-08-03 | フェリカネットワークス株式会社 | Service providing system, service providing server, and information terminal device |
FR2949032B1 (en) * | 2009-08-04 | 2012-03-30 | Thales Sa | METHOD FOR GENERATING CRYPTOGRAPHIC SEMI-KEYS AND ASSOCIATED SYSTEM |
DE102010006432A1 (en) * | 2009-12-29 | 2011-06-30 | Siemens Aktiengesellschaft, 80333 | Method and system for providing EDRM-protected data objects |
US8874909B2 (en) * | 2012-02-03 | 2014-10-28 | Daniel Joseph Lutz | System and method of storing data |
CN104992212B (en) * | 2015-07-24 | 2017-10-03 | 大连大学 | Tourism smart card system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114672A1 (en) * | 2003-11-20 | 2005-05-26 | Encryptx Corporation | Data rights management of digital information in a portable software permission wrapper |
-
2006
- 2006-06-26 WO PCT/IL2006/000743 patent/WO2007000761A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114672A1 (en) * | 2003-11-20 | 2005-05-26 | Encryptx Corporation | Data rights management of digital information in a portable software permission wrapper |
Also Published As
Publication number | Publication date |
---|---|
WO2007000761A2 (en) | 2007-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220043890A1 (en) | Method and apparatus of drm systems for protecting enterprise confidentiality | |
Kumar et al. | Steganography-A data hiding technique | |
US8839003B2 (en) | Information management system, information management method and apparatus, and encryption method and program | |
Pretschner et al. | Usage control enforcement: Present and future | |
ES2426256T3 (en) | System and procedure for the protection of digital works | |
US20090268906A1 (en) | Method and System for Authorized Decryption of Encrypted Data | |
WO2006073784A3 (en) | System, apparatuses, and method for linking and advising of network events related to resource access | |
WO2004040410A3 (en) | Password encryption key | |
US9608811B2 (en) | Managing access to a secure digital document | |
Marshall | Digital forensics: digital evidence in criminal investigations | |
US20130262864A1 (en) | Method and system for supporting secure documents | |
WO2007000761A3 (en) | Method and apparatus for protecting files from none authorized access | |
Singh et al. | Digital image watermarking: concepts and applications | |
JP4939247B2 (en) | Method, computer program, and content management system for managing digital content in a content management system | |
Warkentin et al. | Steganography: Forensic, security, and legal issues | |
Frith | Steganography approaches, options, and implications | |
Pope et al. | Digital Steganography—An Introduction to Techniques and Tools | |
Henson et al. | End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk | |
Mazhar et al. | ‘Survey on relational database watermarking employing evolutionary methods | |
Pianykh et al. | DICOM Security | |
Tripathee | In Indian context: Cyber law Implementation &its Hurdles | |
Pares-Pulido et al. | Lockpic: Privacy preserving photo sharing in social networks | |
Nieman | Cyberforensics: bridging the law/technology divide | |
Reddy et al. | Anti-forensics | |
Spilman | Takeaways from the sony pictures entertainment hack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06745182 Country of ref document: EP Kind code of ref document: A2 |