Created when                                                        Only added to
                                        ...
Database Server                  Directory Server

                       Rights
                     Management
         ...
5/03/2007
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Keeping Your Content Secure Everywhere: Even Outside The ECM Repository
Upcoming SlideShare
Loading in...5
×

Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

4,056

Published on

Organizations implement records management to ensure their records are well organized, accurate, and retained securely through their lifecycle. What happens when documents are removed from the system? This session will discuss adding information rights management to ECM solutions to extend the effective management of those records outside of the repository. Presented at AIIMexpo 2007 in Boston.

Published in: Technology
9 Comments
2 Likes
Statistics
Notes
  • Rights Management Technology Can:

    Securely share information with executives and external board members

    Protect intellectual property

    Prevent unauthorized access to information relating to corporate transactions (purchase orders, partner agreements, etc.)

     Share but protect and eventually revoke third-party access to corporate information



       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Authors receive a client licensor certificate from the RMS server

    An author creates a file and defines a set of rights and rules.

    The author can distribute the file in any preferred manner.

    The recipient clicks the file to open it.

    The application renders the file and enforces the rights defined in the use license.



       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • One the user who is trying to view the rights protected content is authenticated and treated as a trusted entity, a key is provided from the RMS server that will allow the content to be unencrypted.

       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • This is an abstract representation of the compound document format in which are stored all the pieces necessary to protect a rights-protected document, and to grant protected access to the content of that document.

       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • By applying rights management technology, the binary file content is encrypted. When it has been encrypted a user is unable to view the content without being authenticated and the permissions validated.

       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
4,056
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
321
Comments
9
Likes
2
Embeds 0
No embeds

No notes for slide

Keeping Your Content Secure Everywhere: Even Outside The ECM Repository

  1. 1. Created when Only added to End User Publishing file is protected the file after the Licenses License server licenses a user to open it Rights for a Content Key Encrypted with particular user the server’s Encrypted public key with the user’s Rights Info Content Key public key w/ email addresses (big random number) Encrypted with the server’s a Encrypted public key with the user’s The Content of the File public key Encrypted with (Text, Pictures, metadata, etc) Content Key, a cryptographically secure 128-bit AES symmetric encryption key
  2. 2. Database Server Directory Server Rights Management Server Information Recipient Information Author
  3. 3. 5/03/2007
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×