摘要:
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who have access rights to that data object. The approach advantageously combines group key-based client-side encryption to secure the data object as it travels from a user's computer, to the cloud, and to a chosen collaborator's computer, together with a digital rights management (DRM) layer that provides permission management that associates a set of permission rights that travel with the data object.
摘要:
Method and system for handling group sharing in distributed data storage environment, to utilize online unexploited storage space and bandwidth of users. Files of a user are cut into pieces which are then distributed among other online users. The original files are stored retrievably. Key Lock Boxes (KLB) are used for storing keys encrypted. With an authentication and key exchange protocol a common group key is generated for encrypting a Master Key Lock Box. The Master KLB represents the root of an oriented tree graph, the nodes of the graph represent KLBs. There is an oriented edge between two nodes when a source KLB (17) contains the key of a target KLB (19). The KLBs (13, 14, 17, 19) contain keys (18, 20) to a subset of files. Starting from said Master Key Lock Box by using the common group key the KLBs (13, 14, 17, 19) are opened until the requested file is reached.
摘要:
A screen capture prevention method includes serving a single-color, DRM-protected video clip for display as a background for a document on a web browser. The document is processed to render its background color as transparent. Content of the document is viewable over the contrasting video clip background. When a screen capture event is detected, the video clip is changed to a same color as the content of the processed document, rendering the content indistinguishable from the background while the screen capture event is active.
摘要:
A technique for extending security to a data object (e.g., a document, a file, a message, etc.) once it has been shared and during collaboration with others who have access rights to that data object. The approach advantageously combines group key-based client-side encryption to secure the data object as it travels from a user's computer, to the cloud, and to a chosen collaborator's computer, together with a digital rights management (DRM) layer that provides permission management that associates a set of permission rights that travel with the data object.