Method and system for managing a data object so as to comply with predetermined conditions for usage
First Claim
Patent Images
1. A method for managing a data object so as to comply with control conditions for usage of the data object, comprising the steps of:
- storing the data object in a memory device, where it is accessible by means of a data object provider'"'"'s data processor;
providing a variable number of control conditions for usage of the data object;
creating, by said data processor, a general set of control data for the data object based on said variable number of control conditions for usage, said general set of control data comprising at least one or more usage control elements defining usages of the data object which comply with said variable number of control conditions,storing said general set of control data in a memory device, where it is accessible by said data processor;
concatenating the general set of control data with a copy of the data object; and
encrypting at least the copy of the data object and said one or more usage control elements to create a secure data package which is ready for transfer to a user.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for managing a data object so as to comply with predetermined conditions for usage of the data object. To control the usage of the data object, a set of control data, defining uses of the data object, which comply with the predetermined conditions, is created for the data object. The data object is concatenated with the user set of control data, encrypted and transferred to the user. When the user wants to use the data object, a special user program checks whether the usage complies with the control data. If so, the usage is enabled. Otherwise it is disabled.
586 Citations
29 Claims
-
1. A method for managing a data object so as to comply with control conditions for usage of the data object, comprising the steps of:
-
storing the data object in a memory device, where it is accessible by means of a data object provider'"'"'s data processor; providing a variable number of control conditions for usage of the data object; creating, by said data processor, a general set of control data for the data object based on said variable number of control conditions for usage, said general set of control data comprising at least one or more usage control elements defining usages of the data object which comply with said variable number of control conditions, storing said general set of control data in a memory device, where it is accessible by said data processor; concatenating the general set of control data with a copy of the data object; and encrypting at least the copy of the data object and said one or more usage control elements to create a secure data package which is ready for transfer to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for controlling the usage by a user of a data object so as to comply with control conditions for usage of the data object, comprising the steps of:
-
providing a varible number of control conditions for usage of the data object; storing a data package in a memory device, where it is accessible by means of a data processor of the user, said data package comprising the data object and control data, which comprises at least one usage control element defining a usage of the data object which complies with the variable number of control conditions, the data object and said at least one usage control element being encrypted; receiving a request by the user for usage of the data object; decrypting the control data; checking, in response to the request by the user for usage of the data object, whether the requested usage complies with the usage defined by the at least one usage control element of the control data; and decrypting, in response to the requested usage complying with the usage defined by the at least one usage control element of the control data, the data object and enabling the requested usage, otherwise disabling it. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system for managing a data object so as to comply with control conditions for usage of the data object, comprising
means for providing a vanable number of control conditions; -
first means in the data object provider'"'"'s data processor for creating a general set of control data for the data object based on the variable number of control conditions for usage, said general set of control data comprising at least one or more usage control elements defining usages of the data object which comply with the variable number of control conditions; storing means, which are accessible by means of said data processor, for storing the data object and the general set of control data; concatenating means for concatenating the general set of control data with a copy of the data object; and encrypting means for encrypting the copy of the data object and at least said one or more usage control elements to create a secure data package, which is ready for transfer to a user. - View Dependent Claims (17)
-
-
18. A system for controlling the usage by a user of a data object so as to comply with control conditions for usage of the data object, comprising:
-
means for providing variable number of control conditions; storing means for storing a data package which comprises a data object and a control data comprising at least one usage control element defying a usage of the data object which complies with the variable number of control conditions; means for decrypting the at least one usage control element and the data object; checking means for checking whether a usage requested by the user complies with the usage defined by said at least one usage control element; enabling means for enabling the usage requested by the user when the usage complies with the usage defined by said at least one usage control element; and disabling means for disabling the usage requested by the user when the usage does not comply with the usage defined by said at least one usage control element. - View Dependent Claims (19)
-
-
20. A method for controlling the usage by a user of data objects so as to comply with predetermined conditions for usage of the data objects, comprising the steps of:
-
storing at least two data packages in a memory device, where they are accessible by a data processor of the user, each said data package comprising a data object and a user set of control data, which comprises at least one usage control element defining a usage of the data object which complies with the predetermined conditions, the data object and said at least one usage control elements being encrypted; decrypting the usage control elements of the user sets of control data; examining the usage control elements of said at least two data packages to find a match; using, in response to the finding of a match, the data processor to carry out an action, which is specified in the user sets of control data. - View Dependent Claims (21)
-
-
22. A method for managing a data object so as to comply with predetermined conditions for usage of the data object, comprising the steps of:
-
storing the data object in a memory device, where it is accessible by means of a data object provider'"'"'s data processor; providing control conditions for usage of the data object; creating, by said data processor, a general set of control data for the data object based on said control conditions for usage, said general set of control data comprising at least one or more usage control elements defining usages of the data object which comply with said control conditions; storing said general set of control data in a memory device, where it is accessible by said data processor; concatenating the general set of control data with a copy of the data object; encrypting at least the copy of the data object and said one or more usage control elements to create a secure data package which is ready for transfer to a user; creating, in response to a request for authorization for usage of the data object by a user, a user set of control data, which comprises at least a subset of the general set of control data, including at least one of said usage control elements; using the user set of control data instead of the general set of control data in said concatenating step; using the at least one or usage control element of the user set of control data instead of the one or more usage control elements of the general set of control data in the encrypting step; and checking, before allowing transfer of the data package to the user, that said request for authorization for usage of the data object has been granted. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A system for managing a data object so as to comply with control conditions for usage of the data object, comprising:
-
first means in the data object provider'"'"'s data processor for creating a general set of control data for the data object based on the predetermined conditions for usage, said general set of control data comprising at least one or more usage control elements defining usages of the data object which comply with the predetermined conditions; storing means, which are accessible by means of said data processor, for storing the data object and the general set of control data; concatenating means for concatenating the general set of control data with a copy of the data object; encrypting means for encrypting the copy of the data object and at least said one or more usage control elements to create a secure data package, which is ready for transfer to a user; second means in said data processor for creating, in response to a request for authorization for usage of the data object by a user, a user set of control data, which comprises at least a subset of the general set of control data, which subset comprises at least one of said usage control elements; using the user set of control data instead of the general set of control data in the storing means; using the user set of control data instead of the general set of control data in the concatenating means; using the user set of control data instead of the general set of control data in the encrypting means; and checking means in said data processor for checking that said request for authorization for usage of the data object has been granted before allowing transfer of the data package to the user.
-
Specification