Systems and methods for secure sharing of information
First Claim
1. A method for providing secure restricted access to a digital asset, the method comprising:
- (a) encrypting, by a first computing device, a digital asset;
(b) creating, by the first computing device, an executable file, the executable file comprising the encrypted digital asset, permission information associated with the digital asset, and executable code for decrypting and viewing the digital asset;
(c) creating, by the first computing device, a digital signature corresponding to the executable file; and
(d) transmitting, to a second computing device, the executable file and the digital signature.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing digital assets in a distributed computing environment are described. Meta-data for the digital assets is stored separately from the digital assets. Meta-data for some of the digital assets is copied and stored at a central location. Meta-data for the digital assets is generated by clients of the system. A method for providing secure restricted access to a digital asset includes: encrypting, by a first computing device, a digital asset; creating, by the first computing device, an executable file, the executable file comprising the encrypted digital asset, permission information associated with the digital asset, and executable code for decrypting and viewing the digital asset; creating, by the first computing device, a digital signature corresponding to the executable file; and transmitting, to a second computing device, the executable file and the digital signature. Corresponding systems and computer readable media with executable instructions are also described.
-
Citations
27 Claims
-
1. A method for providing secure restricted access to a digital asset, the method comprising:
-
(a) encrypting, by a first computing device, a digital asset;
(b) creating, by the first computing device, an executable file, the executable file comprising the encrypted digital asset, permission information associated with the digital asset, and executable code for decrypting and viewing the digital asset;
(c) creating, by the first computing device, a digital signature corresponding to the executable file; and
(d) transmitting, to a second computing device, the executable file and the digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing secure restricted access to a digital asset, the system comprising:
-
a processor which encrypts a digital asset;
creates an executable file, the executable file comprising the encrypted digital asset, permission information associated with the digital asset, and executable code for decrypting and viewing the digital asset; and
creates a digital signature corresponding to the executable file; and
a file system driver in communication with the processor which writes the executable file and the digital signature to a memory element. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable medium having executable instructions thereon to provide secure restricted access to a digital asset, the computer readable medium comprising:
-
(a) instructions to encrypt, by a first computing device, a digital asset;
(b) instructions to create, by the first computing device, an executable file, the executable file comprising the encrypted digital asset, permission information associated with the digital asset, and executable code for decrypting and viewing the digital asset;
(c) instructions to create, by the first computing device, a digital signature corresponding to the executable file; and
(d) instructions to transmit, to a second computing device, the executable file and the digital signature. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification