The present invention relates to various methods,
software programs, and systems for
electronic information security. More particularly, these various methods,
software programs, and systems may serve to protect
information security by providing an integrated
system that helps ensure
confidentiality, integrity, accountability, and ease of use. Certain embodiments of the present invention relate to methods,
software programs, and systems for
electronic information security utilizing a file container for storing: (a) a
data file, which
data file is encrypted with a one-time random
encryption key; (b) the one-time random
encryption key, which one-time random
encryption key is encrypted with a public key portion of a public key / private key pair associated with an owner of the file container; (c) an audit trail log of the history of the file container, which audit trail log is encrypted with the one-time random encryption key with which the
data file is encrypted; (d) a
digital signature based upon a hash of the combined data file and the audit trail log, which hash is encrypted with a private key portion of a public key / private key associated with a writer / creator of the file container; and (e) a profile associated with the file container. Additional embodiments of the present invention relate to methods, software programs, and systems for
electronic information security utilizing a fully integrated
system for
user authentication,
virus scanning, time / date certification, encryption / decryption, digital signatures, stored document protection, transmitted document protection, and delivery
verification.