Systems and methods for exception handling
First Claim
1. A method for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the method comprising:
- (a) selecting, by a management computing device, a first digital asset likely to exist on a client;
(b) digitally signing, by the management computing device, information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset;
(c) receiving, by the client, the digitally signed information;
(d) determining, by the client, that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and
(e) implementing, by the client, the policy corresponding to the second digital asset;
wherein step (a) comprises randomly selecting, by a management computing device, a digital asset from a set of digital assets known to have existed on a client at a given time in the past.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing digital assets in a distributed computing environment are described. Meta-data for the digital assets is stored separately from the digital assets. Meta-data for some of the digital assets is copied and stored at a central location. Meta-data for the digital assets is generated by clients of the system. A method for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible includes: selecting, by a management computing device, a first digital asset likely to exist on a client; digitally signing, by the management computing device information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset; receiving, by the client, the digitally signed information; and implementing, by the client, the policy corresponding to the second digital asset.
-
Citations
30 Claims
-
1. A method for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the method comprising:
-
(a) selecting, by a management computing device, a first digital asset likely to exist on a client; (b) digitally signing, by the management computing device, information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset; (c) receiving, by the client, the digitally signed information; (d) determining, by the client, that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and (e) implementing, by the client, the policy corresponding to the second digital asset; wherein step (a) comprises randomly selecting, by a management computing device, a digital asset from a set of digital assets known to have existed on a client at a given time in the past. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implemented system for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the system comprising:
-
a management computing device which selects a first digital asset likely to exist on a client; and
digitally signs information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset;a client which receives the digitally signed information;
determines that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and
implements, by the client, the policy corresponding to the second digital asset;wherein the management computing device randomly selects a digital asset from a set of digital assets known to have existed on a client at a given time in the past. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer storage readable medium having executable instructions thereon to override a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the computer readable medium comprising:
-
(a) instructions to select, by a management computing device, a first digital asset likely to exist on a client; (b) instructions to digitally sign, by the management computing device, information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset; (c) instructions to receive, by the client, the digitally signed information; (d) instructions to determine, by the client, that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and (e) instructions to implement, by the client, the policy corresponding to the second digital asset; wherein the instructions to select comprise instructions to randomly select, by a management computing device, a digital asset from a set of digital assets known to have existed on a client at a given time in the past. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the method comprising:
-
(a) selecting, by a management computing device, a first digital asset likely to exist on a client; (b) digitally signing, by the management computing device, information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset; (c) receiving, by the client, the digitally signed information; (d) determining, by the client, that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and (e) implementing, by the client, the policy corresponding to the second digital asset; wherein the policy corresponding to the second digital asset is configured to expire after the client reconnects to a designated network. - View Dependent Claims (26)
-
-
27. A computer implemented system for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the system comprising:
-
a management computing device which selects a first digital asset likely to exist on a client; and
digitally signs information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset;a client which receives the digitally signed information;
determines that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and
implements, by the client, the policy corresponding to the second digital asset;wherein the policy corresponding to the second digital asset is configured to expire after the client reconnects to a designated network. - View Dependent Claims (28)
-
-
29. A non-transitory computer readable storage medium having executable instructions thereon to override a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the computer readable medium comprising:
-
(a) instructions to select, by a management computing device, a first digital asset likely to exist on a client; (b) instructions to digitally sign, by the management computing device, information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset; (c) instructions to receive, by the client, the digitally signed information; (d) instructions to determine, by the client, that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and (e) instructions to implement, by the client, the policy corresponding to the second digital asset; wherein the policy corresponding to the second digital asset is configured to expire after the client reconnects to a designated network. - View Dependent Claims (30)
-
Specification