Method for controlling database copyrights
First Claim
Patent Images
1. A digital data management apparatus, comprising:
- an input device configured to receive encrypted digital data and a permit key;
a first means for decrypting the encrypted digital data and for performing a set of functions, wherein the set of functions includes displaying, editing, storing, copying, and transferring said digital data,wherein the first means is configured to authorize a user to display the decrypted digital data in response to the permit key having a value indicating that the user has display authorization,wherein the first means is configured to authorize the user to edit the decrypted digital data in response to the authorize key having a value indicating that the user has edit authorization,wherein the first means is configured to authorize the user to store a re-encrypted version of the decrypted digital data in response to the authorize key having a value indicating that the user has storage authorization,wherein the first means is configured to authorize the user to copy a re-encrypted version of the decrypted digital data in response to the authorize key having a value indicating that the user has copy authorization,wherein the first means is configured to authorize the user to transfer a re-encrypted version of the decrypted digital data in response to the authorize key having a value indicating that the user has transfer authorization.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling digital data management includes encrypting digital data to produce encrypted digital data supplied to a user, and using a utilization permit key pre-defined to permit at least one of displaying, editing, storing, copying, and transferring of said digital data.
197 Citations
50 Claims
-
1. A digital data management apparatus, comprising:
-
an input device configured to receive encrypted digital data and a permit key; a first means for decrypting the encrypted digital data and for performing a set of functions, wherein the set of functions includes displaying, editing, storing, copying, and transferring said digital data, wherein the first means is configured to authorize a user to display the decrypted digital data in response to the permit key having a value indicating that the user has display authorization, wherein the first means is configured to authorize the user to edit the decrypted digital data in response to the authorize key having a value indicating that the user has edit authorization, wherein the first means is configured to authorize the user to store a re-encrypted version of the decrypted digital data in response to the authorize key having a value indicating that the user has storage authorization, wherein the first means is configured to authorize the user to copy a re-encrypted version of the decrypted digital data in response to the authorize key having a value indicating that the user has copy authorization, wherein the first means is configured to authorize the user to transfer a re-encrypted version of the decrypted digital data in response to the authorize key having a value indicating that the user has transfer authorization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer readable storage medium having stored thereon program instructions, wherein the program instructions are executable by a computer system to:
-
receive encrypted digital data and a permit key; decrypt the encrypted digital data; grant a user authorization to display the decrypted digital data in response to the permit key having a value indicating that the user has display authorization; grant the user authorization to edit the decrypted digital data in response to the permit key having a value indicating that the user has edit authorization; grant the user authorization to store re-encrypted version of the decrypted digital data in response to the permit key having a value indicating that the user has storage authorization; grant the user authorization to copy re-encrypted version of the decrypted digital data in response to the permit key having a value indicating that the user has copy authorization; grant the user authorization to transfer a re-encrypted version of the decrypted digital data in response to the permit key having a value indicating that the user has transfer authorization. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus, comprising:
a computing platform, said computing platform adapted to; receive encrypted digital data and a permit key; decrypt the encrypted digital data; grant a user authorization to display the decrypted digital data in response to the permit key having a value indicating that the user has display authorization; grant the user authorization to edit the decrypted digital data in response to the permit key having a value indicating that the user has edit authorization; grant the user authorization to store a re-encrypted version of the decrypted digital data in response to the permit key having a value indicating that the user has storage authorization; grant the user authorization to copy a re-encrypted version of the decrypted digital data in response to the permit key having a value indicating that the user has copy authorization; grant the user authorization to transfer a re-encrypted version of the decrypted digital data in response to the permit key having a value indicating that the user has transfer authorization. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
27. A method for digital data management, the method comprising:
-
receiving a request for digital data, wherein the request is received from a first computer system; in response to the request, providing to the first computer system an encrypted version of the digital data and a permit key, wherein the permit key corresponds to a user of the first computer system and has one a plurality of privilege levels, wherein the plurality of privilege levels includes at least five privilege levels; wherein the permit key is usable on the first computer system to authorize the decryption and display of the digital data if the permit key has a first privilege level; wherein the permit key is usable on the first computer system to authorize decrypting and editing of the digital data if the permit key has a second privilege level; wherein the permit key is usable on the first computer system to authorize storing of an encrypted version of the digital data if the permit key has a third privilege level; wherein the permit key is usable on the first computer system to authorize of an encrypted version of the digital data if the permit key has a fourth privilege level; wherein the permit key is usable on the first computer system to authorize transferring of an encrypted version of the digital data if the permit key has a fifth privilege level. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer system comprising:
-
a processor; and a memory that stores at least program instructions, wherein the program instructions are executable by the processor to; receive a request for digital data, wherein the request is received from a remote computer system; in response to the request, provide to the remote computer system an encrypted version of the digital data and a permit key, wherein the permit key corresponds to a user of the remote computer system and has one a plurality of privilege levels, wherein the plurality of privilege levels includes at least five privilege levels; wherein the permit key is usable on the remote computer system to authorize the decryption and display of the digital data if the permit key has a first privilege level; wherein the permit key is usable on the remote computer system to authorize decrypting and editing of the digital data if the permit key has a second privilege level; wherein the permit key is usable on the remote computer system to authorize storing of an encrypted version of the digital data if the permit key has a third privilege level; wherein the permit key is usable on the remote computer system to authorize copying of an encrypted version of the digital data if the permit key has a fourth privilege level; wherein the permit key is usable on the remote computer system to authorize transferring of an encrypted version of the digital data if the permit key has a fifth privilege level. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42)
-
-
43. A computer-readable memory medium which stores program instructions executable by a computer system to:
-
receive a request for digital data, wherein the request is received from a remote computer system; in response to the request, provide to the remote computer system an encrypted version of the digital data and a permit key, wherein the permit key corresponds to a user of the remote computer system and has one a plurality of privilege levels, wherein the plurality of privilege levels includes at least five privilege levels; wherein the permit key is usable on the remote computer system to authorize the decryption and display of the digital data if the permit key has a first privilege level; wherein the permit key is usable on the remote computer system to authorize decrypting and editing of the digital data if the permit key has a second privilege level; wherein the permit key is usable on the remote computer system to authorize storing of an encrypted version of the digital data if the permit key has a third privilege level; wherein the permit key is usable on the remote computer system to authorize copying of an encrypted version of the digital data of the permit key has a fourth privilege level; wherein the permit key is usable on the remote computer system to authorize transferring of an encrypted version of the digital data if the permit key has a fifth privilege level. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50)
-
Specification