Abstract: A method for protecting documents includes assigning electronic marks to a document. The electronic marks include a symmetric encryption key and a symmetric encryption algorithm. Access activity with respect to the document is monitored continuously and in real-time. In response to receiving a request from a user to access the document, validity of a digital certificate of the user is checked. Access to the document is denied and a notification is sent to a server indicating an attempted unauthorized access to the document, in response to determining that the digital certificate of the user is not valid. Attributes of the electronic marks are analyzed, in response to that the digital certificate of the user is valid. The document is automatically decrypted, if an attribute of encryption is indicated in the electronic marks, based on the symmetric encryption key and the symmetric encryption algorithm is included in the electronic marks.
Abstract: A method for protecting documents includes assigning electronic marks to a document. The marks are assigned based on a context of the document. Access activity with respect to the document is monitored continuously. In response to receiving a request from a user to access the document, permissions to access the document are checked by analyzing metadata of the document and access rules are analyzed. In response to determining that the marks are not included in the list of permitted marks for the user requesting the access to the document, access to the document is denied and a notification to a server is sent indicating an attempted unauthorized access to the document. Attributes of the marks are analyzed, in response to determining that the marks are included in the list of permitted marks. Access to the document is provided in accordance with the attributes of the marks.