PASSWORD-LESS SECURITY AND PROTECTION OF ONLINE DIGITAL ASSETS
First Claim
1. A computer-implemented method for protecting a digital asset, comprising:
- substantially functionally handicapping the digital asset with digital data to prevent normal use;
sending a portion of the digital data to an enabling device, wherein the enabling device substantially functionally handicaps the digital data portion;
discarding the digital data portion from the asset server;
receiving the digital data portion from the enabling device responsive to a request to access the digital asset; and
reconstituting the digital asset using at least the digital data portion to functionally enable the digital asset for normal use.
0 Assignments
0 Petitions
Accused Products
Abstract
Digital assets stored on an asset server by an asset owner are protected without a password. Instead, the digital assets are functionally handicapped by removing at least a portion of digital data (or a key) associated with the digital asset and discarding the key after being sent to an enabling device. The portion of digital data (or a key) is then handicapped by the enabling device by a cryptographic key which is formed from a human gesture and subsequently discarded. When access to the digital asset is requested, an asset owner is notified by the enabling device for approval. A human gesture from the asset owner first provides a key to reconstitute the digital data portion which is transmitted to the asset server to reconstitute the digital asset upon which the access is granted and logged.
76 Citations
19 Claims
-
1. A computer-implemented method for protecting a digital asset, comprising:
-
substantially functionally handicapping the digital asset with digital data to prevent normal use; sending a portion of the digital data to an enabling device, wherein the enabling device substantially functionally handicaps the digital data portion; discarding the digital data portion from the asset server; receiving the digital data portion from the enabling device responsive to a request to access the digital asset; and reconstituting the digital asset using at least the digital data portion to functionally enable the digital asset for normal use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method for protecting a digital asset, comprising:
-
receiving at least a portion of digital data associated with the digital asset that has been substantially functionally handicapped by removal of the digital data portion, from an asset server; receiving a unique human input from an owner of the digital asset; substantially functionally handicapping the digital data portion with data from the unique human input; responsive to receiving a notification for a request for access to the digital asset, requesting the unique human input from the owner of the digital asset; reconstituting the digital data portion with the unique human input; and sending the digital data portion to the asset server to reconstitute the digital asset for normal use.
-
-
18. A non-transitory computer-readable medium storing source code that, when executed by a processor, performs a method for protecting a digital asset, comprising:
-
substantially functionally handicapping the digital asset with digital data to prevent normal use; sending a portion of the digital data to an enabling device, wherein the enabling device substantially functionally handicaps the digital data portion; discarding the digital data portion from the server; receiving the digital data portion from the enabling device responsive to a request to access the digital asset; and reconstituting the digital asset using at least the digital data portion to functionally enable the digital asset for normal use.
-
-
19. A system to protect a digital asset, comprising:
-
a processor; and a memory, comprising; a handicapping module to substantially functionally handicap the digital asset with digital data to prevent normal use, to send a portion of the digital data to an enabling device, wherein the enabling device substantially functionally handicaps the digital data portion, and discard the portion of digital data; and a reconstitution module to receive the portion of digital data from the enabling device, and reconstitute the digital asset using the digital data portion to functionally enable the digital asset for normal use.
-
Specification