Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Wireless security system for classified documentation in presentation

IP.com Disclosure Number: IPCOM000201027D
Publication Date: 2010-Nov-04
Document File: 2 page(s) / 242K

Publishing Venue

The IP.com Prior Art Database

Abstract

Access control for databases and documents is often not rich enough to reflect real user needs regarding timeliness and restrictions imposed by present company. For example, giving UserX to confidential material may not be safe if UserX is reading the material in a public space. This article aims to provide a solution for this problem.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Wireless security system for classified documentation in presentation

Access control for databases and documents is often not rich enough to reflect real user needs regarding timeliness and restrictions imposed by present company. For example, giving UserX to confidential material may not be safe if UserX is reading the material in a public space. This article aims to provide a solution for this problem.

Here is an example of a use case is the following.

A highly confidential security document has been created in the White House. This security document is only available to certain members of the board but the president has advised that he wants someone to go to Ireland and England to present this document to a group of people. As this document is highly classified, the creator of the document does not want this document leaked outside of the 2 meetings (Ireland 3rd June 16:00 - 17:30 and England 4th June 16:00 - 17:30). This will be a highly classified presentation so there will be various security personnel available at the meeting. The creator of the document has added an extra layer of security to the presentation document. This is so that between the hours of 16:00-17:30 on the 3rd of June the document can only be opened when a certain security persons network interface card number is on the same given Wifi hub as the presenters. Of course then on the 4th another NIC card number is available on the Wifi* hub at a give time.

As an overview this is how it works:
- An affinity is created between a document and one or more network devices (this may be a computer, iPhone** or some wireless device)
- The network devices and document create a...