System and method for managing cross-certificates copyright notice
First Claim
Patent Images
1. A method for managing cryptographically generated data tokens, the method comprising:
- decoding a data file to retrieve a first cryptographically generated data token;
identifying a second cryptographically generated data token associated with the first data token; and
updating the second data token according to a security preference related to a characteristic of the first or the second data token.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method for managing cryptographically generated data tokens, the method comprising: decoding a data file to retrieve a first cryptographically generated data token, identifying a second cryptographically generated data token associated with the first data token, and updating the second data token according to a security preference related to a characteristic of the first or the second data token.
66 Citations
36 Claims
-
1. A method for managing cryptographically generated data tokens, the method comprising:
-
decoding a data file to retrieve a first cryptographically generated data token;
identifying a second cryptographically generated data token associated with the first data token; and
updating the second data token according to a security preference related to a characteristic of the first or the second data token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for managing cryptographically generated data tokens, the system comprising:
-
a data file containing a first cryptographically generated data token;
a data store; and
a processor communicatively coupled to the data store;
wherein the processor is programmed to;
decode the data file to retrieve the first cryptographically generated data token;
identify, in the data store, a second cryptographically generated data token associated with the first data token; and
update the second data token according to a security preference related to a characteristic of the first or second data token. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer usable medium or media storing program code which, when executed on a computerized device, causes the computerized device to execute a method for managing cryptographically generated data tokens, the method comprising:
-
decoding a data file to retrieve a first cryptographically generated data token;
identifying a second cryptographically generated data token associated with the first data token; and
updating the second data token according to a security preference related to a characteristic of the first or the second data token. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification