Systems and methods for expiring digital assets using encryption key
First Claim
Patent Images
1. A method of preventing access to an expired digital asset, the method comprising:
- (a) encrypting a digital asset using an encryption key, the digital asset associated with a tag specifying a time after which the digital asset should be unavailable, the encryption key having a predetermined expiration time; and
(b) destroying the encryption key after the predetermined time.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing digital assets in a distributed computing environment are described. Meta-data for the digital assets is stored separately from the digital assets. Meta-data for some of the digital assets is copied and stored at a central location. Meta-data for the digital assets is generated by clients of the system.
-
Citations
21 Claims
-
1. A method of preventing access to an expired digital asset, the method comprising:
-
(a) encrypting a digital asset using an encryption key, the digital asset associated with a tag specifying a time after which the digital asset should be unavailable, the encryption key having a predetermined expiration time; and
(b) destroying the encryption key after the predetermined time. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for preventing access to an expired digital asset, the system comprising:
a computing device having an application thereon that encrypts a digital asset using an encryption key, the digital asset associated with a tag specifying a time after which the digital asset should be unavailable, the encryption key having a predetermined expiration time, and destroys the encryption key after the predetermined time. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer readable medium having executable instructions thereon to prevent access to an expired digital asset, the computer readable medium comprising:
-
(a) instructions to encrypt a digital asset using an encryption key, the digital asset associated with a tag specifying a time after which the digital asset should be unavailable, the encryption key having a predetermined expiration time; and
(b) destroying the encryption key after the predetermined time. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification