×

Systems and methods for exception handling

  • US 7,757,270 B2
  • Filed: 10/31/2006
  • Issued: 07/13/2010
  • Est. Priority Date: 11/17/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for overriding a policy associated with a digital asset on a client computer after determining a centralized policy database is inaccessible, the method comprising:

  • (a) selecting, by a management computing device, a first digital asset likely to exist on a client;

    (b) digitally signing, by the management computing device, information corresponding to the first digital asset and information identifying a second digital asset and a policy corresponding to the second digital asset;

    (c) receiving, by the client, the digitally signed information;

    (d) determining, by the client, that the information corresponding to the first digital asset matches information on the client corresponding to the first digital asset, and the digital signature matches the management computing device; and

    (e) implementing, by the client, the policy corresponding to the second digital asset;

    wherein step (a) comprises randomly selecting, by a management computing device, a digital asset from a set of digital assets known to have existed on a client at a given time in the past.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×