Means for providing protecting for digital assets
1 Assignment
0 Petitions
Accused Products
Abstract
A system for providing protection for identified digital assets, the system including: (1) a central control system (210); (2) a client terminal (220) able to communicate via a computer network (230) with the central control system (210); (3) client software (240) resident on each client terminal (220); (4) a master copy of a digital asset (250) stored on the central control system (210); (5) an encrypted copy of the digital asset (260) stored on the client terminal (220), with an encryption key for the encrypted copy of the digital asset stored on the central control system (210) and the client terminal (220); whereby, the client software (240) resident on the client terminal (220) controls access by a custodian (280) to the copy of the digital asset (260) stored on the client terminal (220), and the custodian'"'"'s level of access to the copy of the digital asset (260) stored on the client terminal (220) can be altered from the central control system (210). A method and computer readable medium of instructions are also disclosed.
-
Citations
105 Claims
-
1-52. -52. (canceled)
-
53. A system for providing protection for identified digital assets, the system including:
-
(1) a central control system;
(2) a client terminal able to communicate via a computer network with the central control system;
(3) client software resident on the client terminal;
(4) a master copy of a digital asset stored on the central control system;
(5) an encrypted copy of the digital asset stored on the client terminal, with an encryption key for the encrypted copy of the digital asset stored on the central control system and the client terminal;
whereby, the client software resident on the client terminal controls access by a custodian to the copy of the digital asset stored on the client terminal, and the custodian'"'"'s level of access to the copy of the digital asset stored on the client terminal can be altered from the central control system. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 98)
-
-
82. A method of providing protection for digital assets, the method including the steps of:
-
(1) storing an encrypted master copy of a digital asset on a central control system;
(2) storing a separate encrypted copy of the digital asset on a client terminal provided with client software, the client terminal able to communicate via a computer network with the central control system;
(3) storing an encryption key for the encrypted copy of the digital asset on the central control system and the client terminal; and
,(4) when access is properly requested by an authorised custodian to the encrypted copy of the digital asset residing on the client terminal, and the client terminal is disconnected from the central control system, the client software controls access to the copy of the digital asset. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97)
-
-
99. A computer readable medium of instructions for providing protection for digital assets in a system including:
-
(1) a central control system;
(2) a client terminal able to communicate via a computer network with the central control system;
(3) a master copy of a digital asset stored on the central control system;
(4) an encrypted copy of the digital asset stored on the client terminal, with the encryption key for the encrypted copy of the digital asset stored on the central control system and the client terminal;
whereby the computer readable medium of instructions is adapted to control access by a custodian to the copy of the digital asset stored on the client terminal, and the custodian'"'"'s level of access to the copy of the digital asset stored on the client terminal can be altered from the central control system. - View Dependent Claims (100, 101, 102, 103, 104, 105)
-
Specification