Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

36

Transcript of Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

Page 1: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 2: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 3: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 4: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 5: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 6: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 7: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 8: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 9: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 10: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

a

Rights Info w/ email addresses

Content KeyEncrypted with

the server’s

public key

Publishing

License

The Content of the File

(Text, Pictures, metadata, etc)

End User

Licenses

Content Key(big random number)

Rights for a

particular user

Encrypted

with the user’s

public key

Created when

file is protected

Only added to

the file after the

server licenses a

user to open it

Encrypted with

Content Key, a

cryptographically

secure 128-bit

AES symmetric

encryption key

Encrypted with

the server’s

public key

Encrypted

with the user’s

public key

Page 11: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 12: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

Information Author Information Recipient

Rights

Management

Server

Database Server Directory Server

Page 13: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 14: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 15: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 16: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 17: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 18: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 19: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 20: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

5/03/2007

Page 21: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 22: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 23: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 24: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 25: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 26: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 27: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 28: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 29: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 30: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 31: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 32: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 33: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 34: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 35: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Page 36: Keeping Your Content Secure Everywhere: Even Outside The ECM Repository