Methods and apparatuses for management of entitlement to digital security operations
First Claim
1. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to secure digital content against unauthorized access, the method comprising:
- receiving a request in a security application to invoke an operation on a digital artefact; and
determining an entitlement to the operation in the security application, wherein the entitlement to the operation is not dependent upon entitlement to the digital artefact.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses for management of entitlement to security operations. In one aspect of an embodiment, a method to secure digital content against unauthorized access, includes: receiving a request in a security application to invoke an operation on a digital artefact; and determining an entitlement to the operation in the security application, where the entitlement to the operation is not dependent upon entitlement to the digital artefact. In one embodiment, the entitlement to the operation in the security application is in addition to the entitlement to the digital artefact. In one embodiment, the entitlement to the operation is separate from the entitlement to the digital artefact. In one embodiment, the operation in the security application relates to confidentiality of the digital artefact.
-
Citations
26 Claims
-
1. A machine readable medium containing executable computer program instructions which when executed by a data processing system cause said system to perform a method to secure digital content against unauthorized access, the method comprising:
-
receiving a request in a security application to invoke an operation on a digital artefact; and
determining an entitlement to the operation in the security application, wherein the entitlement to the operation is not dependent upon entitlement to the digital artefact. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method to secure digital content against unauthorized access, the method comprising:
-
receiving a request in a security application to invoke an operation on a digital artefact; and
determining an entitlement to the operation in the security application, where the entitlement to the operation is not dependent upon entitlement to the digital artefact. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A data processing system to secure digital content against unauthorized access, the system comprising:
-
means for receiving a request in a security application to invoke an operation on a digital artefact; and
means for purchasing an entitlement to the operation in the security application, the entitlement to the operation being separate from entitlement to the digital artefact. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification