• Like
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

  • 3,985 views
Published

Organizations implement records management to ensure their records are well organized, accurate, and retained securely through their lifecycle. What happens when documents are removed from the system? …

Organizations implement records management to ensure their records are well organized, accurate, and retained securely through their lifecycle. What happens when documents are removed from the system? This session will discuss adding information rights management to ECM solutions to extend the effective management of those records outside of the repository. Presented at AIIMexpo 2007 in Boston.

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • Rights Management Technology Can:

    Securely share information with executives and external board members

    Protect intellectual property

    Prevent unauthorized access to information relating to corporate transactions (purchase orders, partner agreements, etc.)

     Share but protect and eventually revoke third-party access to corporate information



    Are you sure you want to
    Your message goes here
  • Authors receive a client licensor certificate from the RMS server

    An author creates a file and defines a set of rights and rules.

    The author can distribute the file in any preferred manner.

    The recipient clicks the file to open it.

    The application renders the file and enforces the rights defined in the use license.



    Are you sure you want to
    Your message goes here
  • One the user who is trying to view the rights protected content is authenticated and treated as a trusted entity, a key is provided from the RMS server that will allow the content to be unencrypted.

    Are you sure you want to
    Your message goes here
  • This is an abstract representation of the compound document format in which are stored all the pieces necessary to protect a rights-protected document, and to grant protected access to the content of that document.

    Are you sure you want to
    Your message goes here
  • By applying rights management technology, the binary file content is encrypted. When it has been encrypted a user is unable to view the content without being authenticated and the permissions validated.

    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
3,985
On SlideShare
0
From Embeds
0
Number of Embeds
4

Actions

Shares
Downloads
320
Comments
9
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Created when Only added to End User Publishing file is protected the file after the Licenses License server licenses a user to open it Rights for a Content Key Encrypted with particular user the server’s Encrypted public key with the user’s Rights Info Content Key public key w/ email addresses (big random number) Encrypted with the server’s a Encrypted public key with the user’s The Content of the File public key Encrypted with (Text, Pictures, metadata, etc) Content Key, a cryptographically secure 128-bit AES symmetric encryption key
  • 2. Database Server Directory Server Rights Management Server Information Recipient Information Author
  • 3. 5/03/2007