Controlling database copyrights
First Claim
Patent Images
1. A method, comprising:
- a computing device receiving a utilization permit key usable to decrypt information, the utilization permit key indicating a first set of permitted operations for decrypted information;
the computing device decrypting encrypted data using the utilization permit key to produce decrypted data;
after decrypting the encrypted data, the computing device determining that at least one user-requested operation that uses the decrypted data or a re-encrypted version of the decrypted data is not within the first set of permitted operations indicated by the utilization permit key; and
the computing device preventing, based at least in part on said determining, performance of the at least one user-requested operation.
6 Assignments
0 Petitions
Accused Products
Abstract
Briefly, in accordance with one or more embodiments, a utilization permit key may be pre-defined to permit at least one of displaying, editing, storing, copying, and/or transferring of digital data.
-
Citations
63 Claims
-
1. A method, comprising:
-
a computing device receiving a utilization permit key usable to decrypt information, the utilization permit key indicating a first set of permitted operations for decrypted information; the computing device decrypting encrypted data using the utilization permit key to produce decrypted data; after decrypting the encrypted data, the computing device determining that at least one user-requested operation that uses the decrypted data or a re-encrypted version of the decrypted data is not within the first set of permitted operations indicated by the utilization permit key; and the computing device preventing, based at least in part on said determining, performance of the at least one user-requested operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 35, 36, 37, 38, 39, 40, 41, 44)
-
-
16. An apparatus, comprising:
-
a processor; memory, coupled to the processor, having stored thereon program instructions executable to cause the apparatus to ; receive a utilization permit key usable to decrypt information, the utilization permit key indicating a first set of permitted operations for decrypted information; decrypt encrypted data using the utilization permit key to produce decrypted data; after decrypting the encrypted data, determine that at least one user-requested operation that uses the decrypted data or a re-encrypted version of the decrypted data is not within the first set of permitted operations indicated by the utilization permit key; and prevent performance of the at least one user-requested operation determined to be not within the first set of permitted operations. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 42, 45)
-
-
24. An article of manufacture including a non-transitory computer-readable memory medium having program instructions stored thereon that, responsive to execution by a computer system, cause the computer system to perform operations comprising:
-
receiving a utilization permit key usable to decrypt information, the utilization permit key indicating a first set of permitted operations for decrypted information; decrypting encrypted data using the utilization permit key to produce decrypted data; after decrypting the encrypted data, determining that at least one user-requested operation that uses the decrypted data or a re-encrypted version of the decrypted data is not within the first set of permitted operations indicated by the utilization permit key; and preventing performance of the at least one user-re uested o eration determined to be not within the first set of permitted operations. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 46)
-
-
43. An apparatus, comprising:
-
first means for interfacing with a communications network to receive a utilization permit key usable to decrypt information, the utilization permit key indicating a first set of permitted operations for decrypted information; second means for; decrypting encrypted data using the utilization permit key to produce decrypted data after decrypting the encrypted data, determining that at least one user-requested operation that uses the decrypted data or a re-encrypted version of the decrypted data is not within the first set of permitted operations by the utilization permit key; and preventing the performing of the at least one user-requested operation determined to be not within the first set of permitted operations.
-
-
47. A method, comprising:
-
receiving at a user device one or more of a plurality of utilization permit keys associated with a set of data, wherein each of the plurality of utilization permit keys is usable to perform cryptographic operations on the set of data and is configured to permit a corresponding further use of the set of data, wherein the plurality of utilization permit keys are arranged in a hierarchy in which a given one of the plurality of utilization permit keys also permits uses of the set of data that are permitted by any utilization permit keys within the plurality of utilization permit keys that are lower in the hierarchy than the given utilization permit key; the user device decrypting an encrypted version of the set of data using a first of the received one or more utilization permit keys, wherein the decrypting is performed only when the first utilization permit key permits the displaying and/or editing of the set of data; and the user device using the set of data according to the use or uses permitted by the first utilization permit key. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. An apparatus, comprising:
-
a processor; memory having stored therein program instructions executable by the apparatus to; receive one or more of a plurality of utilization permit keys associated with a set of data, wherein each of the plurality of utilization permit keys is usable to perform cryptographic operations on the set of data and is configured to permit a corresponding further use of the set of data, wherein the plurality of utilization permit keys are arranged in a hierarchy in which a given one of the plurality of utilization permit keys also permits uses of the set of data that are permitted by any utilization permit keys within the plurality of utilization permit keys that are lower in the hierarchy than the given utilization permit key; decrypt an encrypted version of the set of data using a first of the received one or more utilization permit keys, wherein the decrypting is performed only when the first utilization permit key permits the displaying and/or editing of the set of data; and use the set of data according to the use or uses permitted by the first utilization permit key.
-
Specification