CRYPTOGRAPHIC MANAGEMENT OF ACCESS TO DOCUMENTS Russian patent published in 2013 - IPC G06F21/10 

Abstract RU 2475839 C2

FIELD: information technology.

SUBSTANCE: device has a data processing unit consisting of a requesting component which requests a first document containing a first identifier which identifies a second document, requests access to the second document containing a second identifier which identifies encrypted security data of the second document containing a second key through which an action is carried out, which is authorised with respect to the second document by that key, document detection means which determines the location of the second document, and a cryptographic component which uses the first key associated with the first document to obtain the second document, and a second key for executing an action with respect to the second document. The method for cryptographic management of access to documents realised by the device and a computer-readable medium, having computer-executable commands for realising the method.

EFFECT: high protection of documents from unauthorised access using encryption.

23 cl, 6 dwg

Similar patents RU2475839C2

Title Year Author Number
CREATING AND VALIDATING CRYPTOGRAPHICALLY SECURED DOCUMENTS 2008
  • Rid Kolin Uilson
RU2500075C2
SAFETY MARKERS, INCLUDING DISPLAYED STATEMENTS 2006
  • Kameron Kim
  • Nanda Arun K.
RU2421789C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
PROOF OF WORK FOR BLOCKCHAIN SYSTEMS 2019
  • Teodor, Roksana Yuliana
  • Eshton, Piter Demian
  • Shakhandashti, Siamak Fajyaz
  • Bankroft, Yan
RU2821336C2
WHITE LISTS OF SMART CONTRACTS 2018
  • Sya, Nin
  • Se, Gujlu
  • Den, Fusi
RU2744827C2
ADVANCE AUTHORIZATION OF DIGITAL REQUESTS 2016
  • Cash, Duane
  • Howard, Kelvan
RU2713703C2
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER 2018
  • Sheets, John F.
  • Wagner, Kim R.
  • Arora, Sunpreet Singh
  • Best-Rowden, Lacey
  • Jiang, Chunxi
RU2776258C2
METHOD AND SYSTEM FOR PROCESSING DATA OF HEALTH CARE 2009
  • Koster Robert P.
  • Petkovich Milan
  • Kunzi Zhjul'En
RU2530303C2
SYSTEMS AND METHODS TO CONTROL ACCESS TO SECURE DATA 2017
  • Wood Gavin
  • Czaban Piotr
  • Nikolsky Svyatoslav
  • Kappler Kenneth
  • Gotchac Nicolas
RU2744970C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2

RU 2 475 839 C2

Authors

Rid Kolin Uilson

Dates

2013-02-20Published

2008-01-22Filed