SMART RESOURCE ACCESS FOR DECRYPTED INFORMATION
First Claim
Patent Images
1. A method for protecting a resource, the method comprising:
- receiving a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible;
encrypting, by one or more processors, the resource;
associating, by one or more processors, the parameter with decryption information for the encrypted resource;
sending, by one or more processors, the encrypted resource to a computing device;
determining, by one or more processors, that the condition of the parameter has been met based on external information regarding the parameter; and
sending the decryption information to the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for protecting a resource, a processor receives a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible. A processor encrypts the resource. A processor associates the parameter with decryption information for the encrypted resource. A processor sends the encrypted resource to a computing device. A processor determines that the condition of the parameter has been met based on external information regarding the parameter. A processor sends the decryption information to the computing device.
7 Citations
20 Claims
-
1. A method for protecting a resource, the method comprising:
-
receiving a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible; encrypting, by one or more processors, the resource; associating, by one or more processors, the parameter with decryption information for the encrypted resource; sending, by one or more processors, the encrypted resource to a computing device; determining, by one or more processors, that the condition of the parameter has been met based on external information regarding the parameter; and sending the decryption information to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for protecting a resource, the computer program product comprising:
-
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible; program instructions to encrypt the resource; program instructions to associate the parameter with decryption information for the encrypted resource; program instructions to send the encrypted resource to a computing device; program instructions to determine that the condition of the parameter has been met based on external information regarding the parameter; and program instructions to send the decryption information to the computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system for protecting a resource, the computer system comprising:
-
one or more computer processors, one or more computer readable storage media, and program instructions stored on the computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to receive a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible; program instructions to encrypt the resource; program instructions to associate the parameter with decryption information for the encrypted resource; program instructions to send the encrypted resource to a computing device; program instructions to determine that the condition of the parameter has been met based on external information regarding the parameter; and program instructions to send the decryption information to the computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification