Systems and methods for risk based information management
First Claim
1. A risk-based computer-implemented method for storing digital assets in a distributed digital asset management environment, the method comprising:
- (a) receiving, by a server from a client, an asset identification tag associated with an original version of a digital asset which is initially created and stored on the client;
(b) identifying, by the server and in response to receiving the asset identification tag, a risk-management policy corresponding to the client and security of the digital asset stored on the client;
(c) executing an action dictated by the risk-management policy;
(d) transmitting, by the server to the client, a transfer command which identifies the digital asset and directs the client to transfer the digital asset from the client to the server; and
(e) obtaining, by the server from the client, a copy of the digital asset while the client concurrently deletes the original version of the digital asset in response to the transfer command;
wherein the client is a portable laptop computer;
wherein the server is a secure datacenter;
wherein the asset identification tag received by the server from the client indicates that the digital asset has a given priority;
wherein identifying the risk-management policy includes;
selecting, as the risk-management policy, a risk-based policy which compares the given priority of the digital asset to a predetermined priority threshold; and
wherein executing the action dictated by the risk-management policy includes;
comparing the given priority of the digital asset to the predetermined priority threshold, andconcluding that the digital asset should be removed from the portable laptop computer to the secure datacenter in response to comparing the given priority of the digital asset to the predetermined priority threshold.
9 Assignments
0 Petitions
Accused Products
Abstract
Techniques involve storing digital assets in a distributed digital asset management environment. The techniques includes (a) receiving, by a server from a client, an asset identification tag associated with an original version of a digital asset which is initially created and stored on the client; (b) identifying, by the server and in response to receiving the asset identification tag, a risk-management policy corresponding to the client and the digital asset; (c) executing an action dictated by the risk-management policy; and (d) transmitting, by the server to the client, a transfer command which identifies the digital asset and directs the client to transfer the digital asset from the client to the server. The techniques further include (e) obtaining, by the server from the client, a copy of the digital asset while the client concurrently deletes the original version of the digital asset in response to the transfer command.
-
Citations
17 Claims
-
1. A risk-based computer-implemented method for storing digital assets in a distributed digital asset management environment, the method comprising:
-
(a) receiving, by a server from a client, an asset identification tag associated with an original version of a digital asset which is initially created and stored on the client; (b) identifying, by the server and in response to receiving the asset identification tag, a risk-management policy corresponding to the client and security of the digital asset stored on the client; (c) executing an action dictated by the risk-management policy; (d) transmitting, by the server to the client, a transfer command which identifies the digital asset and directs the client to transfer the digital asset from the client to the server; and (e) obtaining, by the server from the client, a copy of the digital asset while the client concurrently deletes the original version of the digital asset in response to the transfer command; wherein the client is a portable laptop computer;
wherein the server is a secure datacenter;
wherein the asset identification tag received by the server from the client indicates that the digital asset has a given priority;wherein identifying the risk-management policy includes; selecting, as the risk-management policy, a risk-based policy which compares the given priority of the digital asset to a predetermined priority threshold; and wherein executing the action dictated by the risk-management policy includes; comparing the given priority of the digital asset to the predetermined priority threshold, and concluding that the digital asset should be removed from the portable laptop computer to the secure datacenter in response to comparing the given priority of the digital asset to the predetermined priority threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A risk-based system for storing digital assets in a distributed digital asset management environment, the system comprising:
-
a client which transmits, to a server, an asset identification tag associated with an original version of a digital asset which is initially created and stored on the client; and a server that; stores the asset identification tag, identifies, in response to receiving the asset identification tag, a risk-management policy corresponding to the client and security of the digital assets stored on the client, executes an action dictated by the risk-management policy, transmits, to the client, a transfer command which identifies the digital asset and directs the client to transfer the digital asset from the client to the server, and obtains, from the client, a copy of the digital asset while the client concurrently deletes the original version of the digital asset in response to the transfer command; wherein the client is a portable laptop computer;
wherein the server is a secure datacenter;
wherein the asset identification tag received by the server from the client indicates that the digital asset has a given priority;
wherein the server, when identifying the risk-management policy, is constructed and arranged to;select, as the risk-management policy, a risk-based policy which compares the given priority of the digital asset to a predetermined priority threshold; and wherein the server, when executing the action dictated by the risk-management policy, is constructed and arranged to; compare the given priority of the digital asset to the predetermined priority threshold, and conclude that the digital asset should be removed from the portable laptop computer to the secure datacenter in response to comparing the given priority of the digital asset to the predetermined priority threshold. - View Dependent Claims (9, 10, 11)
-
-
12. A computer readable storage medium having executable instructions thereon to store digital assets in a distributed digital asset management environment based on risk, the computer readable medium comprising:
-
(a) instructions to receive, by a server from a client, an asset identification tag associated with an original version of a digital asset which is initially created and stored on the client; (b) instructions to identify, by the server and in response to receiving the asset identification tag, a risk-management policy corresponding to the client and security of the digital asset stored on the client; (c) instructions to execute an action dictated by the risk-management policy; (d) instructions to transmit, by the server to the client, a transfer command which identifies the digital asset and directs the client to transfer the digital asset to the server; and (e) instructions to obtain, by the server from the client, a copy of the digital asset while the client concurrently deletes the original digital asset in response to the transfer command; wherein the client is a portable laptop computer;
wherein the server is a secure datacenter;
wherein the asset identification tag received by the server from the client indicates that the digital asset has a given priority;wherein identifying the risk-management policy includes; selecting, as the risk-management policy, a risk-based policy which compares the given priority of the digital asset to a predetermined priority threshold; and wherein the instructions to execute the action dictated by the risk-management policy includes; instructions to compare the given priority of the digital asset to the predetermined priority threshold, and instructions to conclude that the digital asset should be removed from the portable laptop computer to the secure datacenter in response to comparing the given priority of the digital asset to the predetermined priority threshold. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification