TRUSTED INTERNET IDENTITY
First Claim
Patent Images
1. A method of securing data using an Internet identity, the method comprising:
- assigning file access rights to a file for the Internet identity;
receiving a request to access the file, the request including the Internet identity;
confirming the Internet identity;
determining if the Internet identity has access rights to the file; and
allowing access to the file when the Internet identity is confirmed and has access rights to the file.
2 Assignments
0 Petitions
Accused Products
Abstract
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requester by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.
-
Citations
20 Claims
-
1. A method of securing data using an Internet identity, the method comprising:
-
assigning file access rights to a file for the Internet identity; receiving a request to access the file, the request including the Internet identity; confirming the Internet identity; determining if the Internet identity has access rights to the file; and allowing access to the file when the Internet identity is confirmed and has access rights to the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A removable storage token supporting file access control, comprising:
-
a processor; a secure memory storing private keys and executable code for use by the processor; a general-use memory; a first bus coupling the processor, secure memory, and the general-use memory; a second bus for removably coupling the removable storage token to a computing device; a storage management module executable by the processor for assigning access control rights to data stored in the general-use memory; a communication module for execution by the processor for parsing a request for access to the general-use memory into a file identifier and a credential; a request module executable by the processor for determining when the credential includes a valid Internet identifier corresponding to an assigned access control right. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of performing file access control comprising:
-
acquiring an Internet identity at a third-party provider; accessing the Internet identity; setting an access right to the file using the Internet identity; requesting access to the file by supplying a request and a credential verifying the Internet identity; determining if the credential matches the Internet identity; and providing access to the file when the credential matches the Internet identity. - View Dependent Claims (18, 19, 20)
-
Specification