Method and apparatus for collaborative document control

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 3, 380 23, H04L 900

Patent

active

057871752

ABSTRACT:
A method and apparatus are disclosed for controlling collaborative access to a work group document by the users of a computer system. A combination of public-key cryptographic methods, symmetric cryptographic methods, and message digest generation methods are used. The document has a data portion and a prefix portion. A computer-implemented collaborative encryption method uses structures in the prefix portion to restrict access to the information stored in the data portion. Users who are currently members of a collaborative group can readily access the information, while users who are not currently members of the group cannot. Other structures in the prefix portion support collaborative signatures, such that members of the group can digitally sign a particular version of the data portion. These collaborative signatures can then be used to identify the signing member and to determine if changes in the data portion were made after the collaborative signature was linked to the document.

REFERENCES:
patent: 4864494 (1989-09-01), Kobus Jr.
patent: 5018096 (1991-05-01), Aoyama
patent: 5073933 (1991-12-01), Rosenthal
patent: 5224067 (1993-06-01), Harada
patent: 5231666 (1993-07-01), Matyas
patent: 5263158 (1993-11-01), Janis
patent: 5265221 (1993-11-01), Miller
patent: 5274824 (1993-12-01), Howarth
patent: 5276901 (1994-01-01), Howell et al.
patent: 5305456 (1994-04-01), Boitana
patent: 5309516 (1994-05-01), Takaragi et al.
patent: 5311591 (1994-05-01), Fischer
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5319705 (1994-06-01), Halter et al.
patent: 5325434 (1994-06-01), Spaanderman et al.
patent: 5343527 (1994-08-01), Moore
patent: 5355474 (1994-10-01), Thuraisngham et al.
patent: 5369702 (1994-11-01), Shanton
patent: 5369707 (1994-11-01), Follendore III
patent: 5373558 (1994-12-01), Chaum
patent: 5406628 (1995-04-01), Beller et al.
patent: 5465299 (1995-11-01), Matsumoto et al.
patent: 5659616 (1997-08-01), Sudia
"Going With the Flow", L. Radosevich, Computerworld, Apr. 10, 1995 pp. 87-97.
"The Lotus Notes.TM. Storage System", K. Moore, ACM SIGMOD Record, 1995, pp. 427-428.
"Electronic Document Distribution", N. Maxemchuk, AT&T Technical Journal, Sep./Oct. 1994, pp. 73-80.
Note regarding "Security in the Client/Server Environment (Document Authentication in Groupware and Workflow)", A. Bestougeff, Proceedings SECURICOM 94 12th Worldwide Congress on Computer and Communications Security and Protection, Jun. 1994, pp. 273-283, 348.
Note regarding "Information Systems Security and Fraud Prevention in Office Automation Systems", P. Stanley, IFIP Transactions, 1993, vol. A37, pp. 375-383.
"Interconnecting Domains with Heterogenous Key Distribution and Authentication Protocols", F. Piessens et al., 1993 IEEE Symposium on Research in Security and Privacy, pp. 66-79.
"A Logical Analysis of Authorized and Prohibited Information Flows", F. Cuppens, 1993 IEEE Symposium on Research in Security and Privacy, pp. 100-109.
"Internet Privacy Enhanced Mail", S. Kent, Communications of the ACM, Aug. 1993, vol. 36, No. 8, pp. 48-59.
"Lattice-Based Access Control Models", R. Sandhu et al., Computer, Nov. 1993, pp. 9-19.
"Authentication for Distributed Systems", T. Woo et al., Computer, Jan. 1992, pp. 39-51.
"Evolution of a Trusted B3 Window System Prototype", J. Epstein et al., 1992 IEEE Symposium on Research in Security and Privacy, pp. 226-239.
"An Optimal Solution to the Secure Reader-Writer Problem", G. Benson, 1992 IEEE Symposium on Research in Security and Privacy, pp. 251-258.
"A Case Study of CES: A Distributed Collaborative Editing System Implemented in Argus", I. Greif et al., IEEE Transaction on Software Engineering, Sep. 1992, vol. 18, No. 9, pp. 827-839.
"Common Crytographic Architecture Crytographic Application Programming Interface", D. Johnson et al., IBM Systems Journal, 1991, vol. 30, No. 2, pp. 130-149.
"Password Management", M. Bishop, 1991 IEEE Spring Compcon, pp. 167-169.
Note regarding "Towards Trusted Cut and Past in the X Window System", J. Picciotto, 1991 Proceedings Seventh Annual Computer Security Applications Conference, pp. 34-43.
"Naming and Grouping Privileges to Simplify Security Management in Large Databases", R. Baldwin, 1990 IEEE Symposium on Research in Security and Privacy, pp. 116-132.
"Encrypted Database Design: Specialized Approaches", N. Wagner et al., 1986 IEEE Symposium on Security and Privacy, pp. 148-153.
"A Randomized Protocol for Signing Contracts", S. Even et al., Communications of the ACM, Jun. 1995, vol. 28 , No. 6, pp. 637-647.
"XCP: An Experimental Tool for Managing Cooperative Activity", S. Sluizer et al., 1985 ACM Computer Science Conference, pp. 251-258.
"Design of a Relational Schema for Database Dynamic Authorization Management", Fugini, Computer Security, 1985, pp. 17-25.
"Pass-Algorithms: A User Validation Scheme Based in Knowledge of Secret Algorithms", J. Haskett, Computing Practices, Aug. 1984, vol. 27, No. 8, pp. 777-781.
"Combatting Software Piracy by Encryption and Key Management", D. Albert et al., Computer, Apr. 1984, pp. 68-73.
"Security Management in Office Information Systems", M. Fugini et al., Computer Security: A Global Challenge, 1984, pp. 487-498.
"Access Control Models and Office Structures", G. Montini et al., Computer Security: A Global Challenge, 1984, pp. 473-485.
"Incorporating Access Control in Forms Systems", G. Yeo, Computer Security: A Global Challenge, 1984, pp. 169-188.
"On Authorization Systems with Grantor-Controlled Propagation of Privileges", E. Leiss, 1983 IEEE Spring Compcon, pp. 499-502.
"Crytographic Sealing for Information Secrecy and Authentication ", D. Gifford, Communications of the ACM, Apr. 1982, vol. 25, No. 4, pp. 274-286.
"The Design of a Crytography Based Secure File System", E. Gudes, IEEE Transactions on Software Engineering, Sep. 1980, vol. SE-6, No. 5, pp. 411-420.
"On and Authorization Mechanism", R. Fagin, ACM Transactions on Database Systems, Sep. 1978, vol. 3, No. 3, pp. 310-319.
NetVoyage.RTM. Corporation, "NetEnvelope.TM. Pushing the envelope on the net.TM.", Jan. 1997, pp. 1-17.
"DCE web and Security Domains", no later than May 16, 1997.
Steve Lewontin, "The DCE-Web: Securing the Enterprise Web", Nov. 1995.
"Secure Web -- Architecture", no later than May 16, 1997.
"Secure Web Architecture -- Scalability", no later than May 16, 1997.
"DCE Web Security", no later than May 16, 1997.
"Distributed Component Object Model (DCOM) Binary Protocol", May 1996, Microsoft Corporation (1997).
"The search for DCOM", Microsoft Site Search Results, Microsoft Corporation (1997), no later than May 13, 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for collaborative document control does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for collaborative document control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for collaborative document control will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-29429

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.