×

Information security systems and methods

  • US 10,009,384 B2
  • Filed: 02/14/2017
  • Issued: 06/26/2018
  • Est. Priority Date: 04/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for governing the use of a digital resource, the method comprising:

  • receiving one or more programs associated with at least one user, wherein the one or more programs are configured to operate upon the digital resource when executed to generate a derived digital resource;

    associating one or more rules with the digital resource, wherein the rules correspond to one or more conditions for accessing the digital resource;

    associating the one or more programs with the digital resource; and

    receiving a request to generate the derived digital resource from a system associated with the at least one user;

    executing the one or more programs to generate the derived digital resource by performing at least one computation on information contained in the digital resource, wherein the at least one computation comprises a mathematical transformation performed on at least a portion of the digital resource, which transformation comprises calculating an average of the at least a portion of the digital resource and which obscures the at least a portion of the digital resource and the digital resource contains information that is not included in the generated derived digital resource, and wherein executing the one or more programs comprises enforcing the one or more conditions for accessing the digital resource in connection with execution of the one or more programs; and

    transmitting the derived digital resource to the system associated with the at least one user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×