WO2007000761A3 - Method and apparatus for protecting files from none authorized access - Google Patents

Method and apparatus for protecting files from none authorized access Download PDF

Info

Publication number
WO2007000761A3
WO2007000761A3 PCT/IL2006/000743 IL2006000743W WO2007000761A3 WO 2007000761 A3 WO2007000761 A3 WO 2007000761A3 IL 2006000743 W IL2006000743 W IL 2006000743W WO 2007000761 A3 WO2007000761 A3 WO 2007000761A3
Authority
WO
WIPO (PCT)
Prior art keywords
data
server
domains
time
protecting
Prior art date
Application number
PCT/IL2006/000743
Other languages
French (fr)
Other versions
WO2007000761A2 (en
Inventor
Selavan Adi Lev
Original Assignee
De-Picciotto, Ofer
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by De-Picciotto, Ofer filed Critical De-Picciotto, Ofer
Publication of WO2007000761A2 publication Critical patent/WO2007000761A2/en
Publication of WO2007000761A3 publication Critical patent/WO2007000761A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

The patent shows a way to protect your intellectual assets using distributed data and encryption keys across multiple domains, with session based token, as for protecting schema while been place on a portable or unprotected wide access network; While trying to remove one of the need domains or removing the protecting process assets it will be not fully readable, as it simply does not contains the plain data, neither the full encrypted data or the fully set of encrypted keys. While of server a drm like behavior is used. Security session time is pre set and if no communication is establish with the server within this maximum time, file is unreadable. Usage: to protect intellectual assets as: documents, drawing, strategic plains, music, images and movies will be call general name: document The domains can be: server, workstation, portable, network and removable media like smart disk on key, smart cards, phone, any network token, and possibly also a bio information sources like: eyes, finger, heart peace and egg. The document is encrypted on the fly using any technique of encryption process If killing the protecting skill, the data is meaningless Some of the time one of the domain may be missing, e.g the server like in the case of taking portable to a business trip. In this case you get a time constrain on the third removable media, which is store separately and when is missing not all data as well as the public or private key is fully exists on the one of the remaining domains. Also when the time constrain is false no data can be retrieve. This can be good for access only on working hour or for a duration of the travel. Also for Video on demand application this can prevent watching by unauthorized unpaid movie where either the Lan or the card is used as the missing bits parts.
PCT/IL2006/000743 2005-06-27 2006-06-26 Method and apparatus for protecting files from none authorized access WO2007000761A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL16943105 2005-06-27
IL169431 2005-06-27

Publications (2)

Publication Number Publication Date
WO2007000761A2 WO2007000761A2 (en) 2007-01-04
WO2007000761A3 true WO2007000761A3 (en) 2011-05-19

Family

ID=37595523

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2006/000743 WO2007000761A2 (en) 2005-06-27 2006-06-26 Method and apparatus for protecting files from none authorized access

Country Status (1)

Country Link
WO (1) WO2007000761A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4740926B2 (en) * 2007-11-27 2011-08-03 フェリカネットワークス株式会社 Service providing system, service providing server, and information terminal device
FR2949032B1 (en) * 2009-08-04 2012-03-30 Thales Sa METHOD FOR GENERATING CRYPTOGRAPHIC SEMI-KEYS AND ASSOCIATED SYSTEM
DE102010006432A1 (en) * 2009-12-29 2011-06-30 Siemens Aktiengesellschaft, 80333 Method and system for providing EDRM-protected data objects
US8874909B2 (en) * 2012-02-03 2014-10-28 Daniel Joseph Lutz System and method of storing data
CN104992212B (en) * 2015-07-24 2017-10-03 大连大学 Tourism smart card system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper

Also Published As

Publication number Publication date
WO2007000761A2 (en) 2007-01-04

Similar Documents

Publication Publication Date Title
US20220043890A1 (en) Method and apparatus of drm systems for protecting enterprise confidentiality
Kumar et al. Steganography-A data hiding technique
US8839003B2 (en) Information management system, information management method and apparatus, and encryption method and program
Pretschner et al. Usage control enforcement: Present and future
ES2426256T3 (en) System and procedure for the protection of digital works
US20090268906A1 (en) Method and System for Authorized Decryption of Encrypted Data
WO2006073784A3 (en) System, apparatuses, and method for linking and advising of network events related to resource access
WO2004040410A3 (en) Password encryption key
US9608811B2 (en) Managing access to a secure digital document
Marshall Digital forensics: digital evidence in criminal investigations
US20130262864A1 (en) Method and system for supporting secure documents
WO2007000761A3 (en) Method and apparatus for protecting files from none authorized access
Singh et al. Digital image watermarking: concepts and applications
JP4939247B2 (en) Method, computer program, and content management system for managing digital content in a content management system
Warkentin et al. Steganography: Forensic, security, and legal issues
Frith Steganography approaches, options, and implications
Pope et al. Digital Steganography—An Introduction to Techniques and Tools
Henson et al. End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk
Mazhar et al. ‘Survey on relational database watermarking employing evolutionary methods
Pianykh et al. DICOM Security
Tripathee In Indian context: Cyber law Implementation &its Hurdles
Pares-Pulido et al. Lockpic: Privacy preserving photo sharing in social networks
Nieman Cyberforensics: bridging the law/technology divide
Reddy et al. Anti-forensics
Spilman Takeaways from the sony pictures entertainment hack

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06745182

Country of ref document: EP

Kind code of ref document: A2