User authentication system and method for encryption and decryption
DCFirst Claim
1. A system comprising:
- an authentication module authenticating a user; and
a crypto module encrypting an electronic document generated by an application program using at least one encryption key to generate an encrypted document in response to a command related to the electronic document received by the application program if the user has been authenticated by the authentication module and at least one encryption criteria is met,wherein the crypto module communicates with an electronic document management system to permit execution of the command by the electronic document management system on the encrypted document.
4 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.
3 Citations
27 Claims
-
1. A system comprising:
-
an authentication module authenticating a user; and a crypto module encrypting an electronic document generated by an application program using at least one encryption key to generate an encrypted document in response to a command related to the electronic document received by the application program if the user has been authenticated by the authentication module and at least one encryption criteria is met, wherein the crypto module communicates with an electronic document management system to permit execution of the command by the electronic document management system on the encrypted document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system configured to authenticate a user for encryption or decryption, the system comprising:
-
a bio-metric user authentication apparatus; a storage device storing bio-metric user identifying information and encryption and decryption data; and an encryption and decryption computer communicating with the bio-metric user authentication apparatus and configured to; communicate with an application interfacing with the bio-metric user authentication apparatus; receive from the storage device via the application the bio-metric user identifying information; authenticate a user based on the bio-metric user identifying information; and read, via the application, the encryption and decryption data once the user is authenticated. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification