The present invention relates to various methods, software programs, and
systems for electronic information security. More particularly, these
various methods, software programs, and systems may serve to protect
information security by providing an integrated system that helps ensure
confidentiality, integrity, accountability, and ease of use. Certain
embodiments of the present invention relate to methods, software
programs, and systems for electronic information security utilizing a
file container for storing: (a) a data file, which data file is encrypted
with a one-time random encryption key; (b) the one-time random encryption
key, which one-time random encryption key is encrypted with a public key
portion of a public key/private key pair associated with an owner of the
file container; (c) an audit trail log of the history of the file
container, which audit trail log is encrypted with the one-time random
encryption key with which the data file is encrypted; (d) a digital
signature based upon a hash of the combined data file and the audit trail
log, which hash is encrypted with a private key portion of a public
key/private key associated with a writer/creator of the file container;
and (e) a profile associated with the file container. Additional
embodiments of the present invention relate to methods, software
programs, and systems for electronic information security utilizing a
fully integrated system for user authentication, virus scanning,
time/date certification, encryption/decryption, digital signatures,
stored document protection, transmitted document protection, and delivery
verification.