Data rights management of digital information in a portable software permission wrapper
First Claim
1. A system for sharing with multiple users and protecting content in the form of digital information from unauthorized access and/or use comprising:
- a) content to be shared and protected; and
b) a permission wrapper having the ability to independently change the level of access to the content.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. The invention is a software permission control wrapper that is used to encrypt and encapsulate digital information for the purpose of enforcing discretionary access control rights to the data contained in the wrapper. The permission control wrapper enforces rules associated with users, and their rights to access the data. Those rights are based on deterministic security behavior of the permission wrapper based on embedded security policies and rules contained therein and that are based, in part, on the user type, network connectivity state, and the user environment in which the data is accessed.
-
Citations
56 Claims
-
1. A system for sharing with multiple users and protecting content in the form of digital information from unauthorized access and/or use comprising:
-
a) content to be shared and protected; and
b) a permission wrapper having the ability to independently change the level of access to the content. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
2. A server-less system for sharing and protecting content in the form of digital information from unauthorized access and/use comprising:
-
a. content to be shared and protected; and
b. a permission wrapper having the ability to independently change the level of access to the content.
-
-
14. A digital information security system for creating, archiving, transmitting and controlling archive content comprising:
-
a. a first system on which content is created;
b. an archive including a permission wrapper having access controls and the content stored therein;
c. means for transmitting the archive to a second system; and
d. means for controlling the access and/or use of the content independent of the means for transmitting.
-
-
15. A method for controlling the access to and/or use of content in the form of digital information comprising the steps of:
-
a. creating content;
b. creating a permission wrapper which controls access to and/or use of the content;
c. placing the content and the permission wrapper into an archive;
d. sending, by an original content provider, the archive to a first receiver;
e. controlling, by the original content provider, the first receiver'"'"'s access to and/or use of the permission wrapped content;
f. sending, by the first receiver, the archive to a second receiver;
g. controlling, by the original content provider, the second receiver'"'"'s access to and/or use of the permission wrapped content, wherein the control to the access and/or use by the second receiver is determined at the time the permission wrapper is created.
-
-
16. A server-less method for controlling the access to and/or use of content in the form of digital information comprising the steps of:
-
a. creating content;
b. transferring the content into an archive;
c. establishing varying levels of permission with respect to access to the content.
-
-
17. A secure container comprising content in the form of digital information and a permission wrapper having the ability to independently recognize threat levels.
-
18. A content protected permission wrapper comprising a variable portion which can adjust the permissions based on inputs from within the permission wrapper itself.
-
19. A secure content container including:
- content to be access and shared based on a content provider'"'"'s permissions;
an application capable of rendering the content; and
a permission wrapper which can change its level of access based on input from outside the container.
- content to be access and shared based on a content provider'"'"'s permissions;
-
20. A permission control wrapper which is used to protect digital information comprising:
-
a. a means for creating an archive on any type of digital medium;
b. a means for assigning digital content to said archive;
c. a means for assigning users their rights and access control permissions to said archive; and
d. a means for controlling user operations on said archive based on a license key that controls user accessible features of the permission wrapper. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
- 48. A permission control wrapper within an archive having protected content therein comprising a means for providing user access to the content in the archive based on embedded security policies.
-
50. A permission control wrapper which is used to protect digital information contained comprising:
-
a. a means for creating an archive on any type of digital medium;
b. a means for placing digital content into said archive;
c. a means for assigning users their rights and access control permissions to said archive;
d. a means for controlling user operations on said archive based on a license key that controls user accessible features of the permission wrapper; and
e. a means for securely sharing content maintained in the archive with other users through a removable storage or digital media.
-
-
51. A permission control wrapper associated with an archive having protected content therein comprising a means of accessing the protected content through multiple access methods including a graphical user interface, a batch or command line interface, and an application programming interface.
-
52. A permission control wrapper associated with an archive having protected content therein comprising means for hiding from a user at least a portion of the content inside the archive, such portions cannot be directly executable upon by the direct operating system and application commands.
-
53. A permission control wrapper which is used to protect digital information comprising:
- a means for creating an archive on any type of digital medium including PD hard drives, file server drives, disk arrays, Personal Digital Assistants (PDAs), recordable and rewritable CD and DVDs, Zip drives, tape storage devices, and all other types of computer medium that can be written to;
a means for assigning digital content to said archive;
a means for assigning users their rights and access control permissions to said archive; and
a means for controlling user operations on said archive based on a license key that controls user accessible features of the permission wrapper.
- a means for creating an archive on any type of digital medium including PD hard drives, file server drives, disk arrays, Personal Digital Assistants (PDAs), recordable and rewritable CD and DVDs, Zip drives, tape storage devices, and all other types of computer medium that can be written to;
- 54. A system for controlling the access and/or use of protected content comprising a permission control wrapper including embedded security control policies, which policies are the rules by which the permission controls are enforced through the permission control wrapper, said policies describe the allowable set of permissions that a user is granted based on an embedded table that defines the policies for users.
-
56. A system for controlling the access and use of protected content comprising a permission control wrapper that has the ability to understand the current state of user network access and automatically modifies the permission controls to be either more or less restricted based on the recognition of whether or not the user is locally connected to the network, remotely connected to the network, or disconnected from the network.
Specification