Abstract:
A digital rights management (DRM) method for protecting digital documents, implemented in a DRM system. When an operator (document publisher) scans a document on a scanner to generates a digital document and specifies a list of users who will be granted access rights to the document, the DRM system applies digital rights protection to the document according to the specified access rights, and distributes the document to the specified users; the system also sends a confirmation notification such as an email to the document publisher, which contains a list of the receiving users, a copy of the protected digital document, and a link to a web-based tool that will allow the publisher to modify the access rights granted to the users. In addition, when applying digital rights protection, the DRM system specifies the publisher as a user who will have access rights to the document.
Abstract:
A digital rights management system includes two digital rights management servers (RMS servers) connected to a client computer. The two RMS servers implement different but related digital rights management (DRM) policies, with the first RMS server implementing conventional DRM policies and the second RMS server implementing extended DRM policies. An application program on the client computer interacts with a document on the client computer, and communicates with the first RMS server to obtain access authorization for the document. A plug-in program in the client computer cooperates with the application program, and communicates with the second RMS server to obtain additional access authorization for the document. Access to the document is granted when both RMS servers grant access to the document. This achieves extended digital rights management control which can provide a more flexible access control than that provided by existing DRM systems.
Abstract:
A digital rights management (DRM) method for protecting emails can apply different protection policies to different components of an email such as the message body and the attached digital files. While an email application of the client encrypts the entire email document including both the message and the attachments, a plugin module on the client obtains user input regarding the DRM policies to be applied to individual attachments and then transmits the encrypted email along with the information about the DRM policies for the individual attachments to a digital rights management server. The server first decrypts the entire email document, then applies the user-specified DRM policies to the attachments individually. The server re-composes an email and attaches the individually protected attachments, and transmits the email to the exchange server.
Abstract:
A digital rights management system includes two digital rights management servers (RMS servers) connected to a client computer. The two RMS servers implement different but related digital rights management (DRM) policies, with the first RMS server implementing conventional DRM policies and the second RMS server implementing extended DRM policies. An application program on the client computer interacts with a document on the client computer, and communicates with the first RMS server to obtain access authorization for the document. A plug-in program in the client computer cooperates with the application program, and communicates with the second RMS server to obtain additional access authorization for the document. Access to the document is granted when both RMS servers grant access to the document. This achieves extended digital rights management control which can provide a more flexible access control than that provided by existing DRM systems.
Abstract:
A method for automatically applying digital rights management (DRM) to outgoing emails based on a color category of the email set by the sending user. A plugin module on the user's computer interacts with the email application to extract the color category setting for the email and converts it to a category ID recognized by the digital rights management (RMS) server. The RMS server determines the DRM policy corresponding to the category ID using an association table, and applies that DRM policy to protect the email before sending the email to an exchange server. When a recipient receives the email, the application program on the recipient's computer cooperates with the RMS server to determine whether the recipient is allowed to access the email based on the DRM policy that has been applied to the email.
Abstract:
In a digital rights management system, layers are defined for each document and user permissions are specified for each layer, to control user access at the layer-level. The layers are ordered by depth, where a layer completely contained inside another layer is deemed deeper than the other layer. The layers are encrypted in a deep-to-shallow order, each by its own encryption key. The entire document is then encrypted. When a user requests access to a document, the system generates an ordered sequence of encryption keys based on the user's access rights for each layer. The document open program on the user's client computer attempts to decrypt the various layers using the ordered sequence of keys. The client program and the system's key sequence generating algorithm are designed to give the result that only layers that the user has access to are successfully decrypted and displayed at document open time.
Abstract:
A hybrid digital rights management (DRM) system includes a hybrid digital rights management server (RMS server) connected to first and second RMS servers and a client computer. The hybrid RMS server stores a policy mapping table that maps its DRM policies to remote DRM policies on the first or second RMS servers, and can also create policies that satisfy the schema requirements of the first or second RMS server using policies stored in the hybrid RMS server. When the hybrid RMS server receives a document protection request from the client computer, it extracts the filename extension for the document to be protected, and uses the filename extension to select one of the first and second RMS servers as a target RMS server. The document is protected by the target RMS server, and also added to a protected document database on the hybrid RMS server.
Abstract:
A digital rights management (DRM) method for protecting digital documents, implemented in a DRM system. When an operator (document publisher) scans a document on a scanner to generates a digital document and specifies a list of users who will be granted access rights to the document, the DRM system applies digital rights protection to the document according to the specified access rights, and distributes the document to the specified users; the system also sends a confirmation notification such as an email to the document publisher, which contains a list of the receiving users, a copy of the protected digital document, and a link to a web-based tool that will allow the publisher to modify the access rights granted to the users. In addition, when applying digital rights protection, the DRM system specifies the publisher as a user who will have access rights to the document.
Abstract:
In a digital rights management system, layers are defined for each document and user permissions are specified for each layer, to control user access at the layer-level. The layers are ordered by depth, where a layer completely contained inside another layer is deemed deeper than the other layer. The layers are encrypted in a deep-to-shallow order, each by its own encryption key. The entire document is then encrypted. When a user requests access to a document, the system generates an ordered sequence of encryption keys based on the user's access rights for each layer. The document open program on the user's client computer attempts to decrypt the various layers using the ordered sequence of keys. The client program and the system's key sequence generating algorithm are designed to give the result that only layers that the user has access to are successfully decrypted and displayed at document open time.
Abstract:
A digital rights management system includes two digital rights management servers (RMS servers) connected to a client computer. The two RMS servers implement different but related digital rights management (DRM) policies, with the first RMS server implementing conventional DRM policies and the second RMS server implementing extended DRM policies. An application program on the client computer interacts with a document on the client computer, and communicates with the first RMS server to obtain access authorization for the document. A plug-in program in the client computer cooperates with the application program, and communicates with the second RMS server to obtain additional access authorization for the document. Access to the document is granted when both RMS servers grant access to the document. This achieves extended digital rights management control which can provide a more flexible access control than that provided by existing DRM systems.