Data management
First Claim
Patent Images
1. A method, comprising:
- a first computer system receiving an encrypted version of data;
the first computer system decrypting the encrypted version of the data using a first crypt key to produce decrypted data;
the first computer system editing the decrypted data to produce edited decrypted data;
the first computer system re-encrypting the edited decrypted data using a second crypt key to produce a re-encrypted version of the data, wherein the second crypt key is different from the first crypt key, and wherein one or both of the first crypt key and the second crypt key is a utilization permit key usable to authorize at least one, but not all, of a plurality of types of usages of data;
the first computer system attaching identification information to the re-encrypted version of the data, wherein the identification information is associated with a user identifier that is authorized to decrypt the re-encrypted version of the data; and
after the attaching the identification information, the first computer system transmitting the re-encrypted version of the data and the attached identification information to a second computer system via a communication network, wherein the identification information is usable to request a key to decrypt the re-encrypted version of the data.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of methods, apparatuses, devices, and/or systems for data copyright management are described.
-
Citations
24 Claims
-
1. A method, comprising:
-
a first computer system receiving an encrypted version of data; the first computer system decrypting the encrypted version of the data using a first crypt key to produce decrypted data; the first computer system editing the decrypted data to produce edited decrypted data; the first computer system re-encrypting the edited decrypted data using a second crypt key to produce a re-encrypted version of the data, wherein the second crypt key is different from the first crypt key, and wherein one or both of the first crypt key and the second crypt key is a utilization permit key usable to authorize at least one, but not all, of a plurality of types of usages of data; the first computer system attaching identification information to the re-encrypted version of the data, wherein the identification information is associated with a user identifier that is authorized to decrypt the re-encrypted version of the data; and after the attaching the identification information, the first computer system transmitting the re-encrypted version of the data and the attached identification information to a second computer system via a communication network, wherein the identification information is usable to request a key to decrypt the re-encrypted version of the data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An article of manufacture including a computer-readable medium having stored thereon instructions that, in response to execution by a first computing device, cause the first computing device to perform operations comprising:
-
receiving data, wherein the received data is encrypted; decrypting the received data using a decryption key to produce decrypted data; editing the decrypted data to produce edited decrypted data; re-encrypting the edited decrypted data using a re-encryption key to produce re-encrypted data, wherein the re-encryption key is different from the decryption key, and wherein one or both of the decryption key and the re-encryption key is a utilization permit key that is usable to authorize at least one, but not all, of a plurality of types of usages of data; appending identification information to the re-encrypted data, wherein the identification information is associated with a user identifier that is authorized decrypt the re-encrypted data; and transmitting the re-encrypted data and the appended identification information to a second computing device via a computer network, wherein the identification information is usable to request a key to decrypt the re-encrypted data. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer system, comprising:
-
one or more processors; and a memory, coupled to the one or more processors, storing program instructions executable by the computer system to cause the computer system to; decrypt encrypted data using a decryption key to produce decrypted data; edit the decrypted data to produce edited decrypted data; re-encrypt the edited decrypted data using a re-encryption key to produce re-encrypted data, wherein the re-encryption key is different from the decryption key, and wherein one or both of the decryption key and the re-encryption key is a utilization permit key that is usable to authorize at least one, but not all, of a plurality of types of usages of data; add identification information to the re-encrypted data, wherein the identification information is associated with a user identifier that is authorized to decrypt the re-encrypted data; and transfer the re-encrypted data and the added identification information to a receiving device via a computer network, wherein the identification information is usable by the receiving device to request a key to decrypt the re-encrypted data. - View Dependent Claims (16, 17)
-
-
18. A method, comprising:
-
a computer system receiving an encrypted version of data; the computer system decrypting the received data using a decryption key to produce decrypted data; the computer system editing the decrypted data to produce edited decrypted data; the computer system re-encrypting the edited decrypted data using a re-encryption key to produce re-encrypted data, wherein the re-encryption key is different from the decryption key, and wherein one or both of the decryption key and the re-encryption key is a utilization permit key that is usable to authorize at least one, but not all, of a plurality of types of usages of data; and the computer system transmitting the re-encrypted data and identification information via a computer network to a receiving device, wherein the identification information is associated with a user identifier that is authorized to decrypt the re-encrypted data, and wherein the identification information is usable by the receiving device to obtain a key to decrypt the re-encrypted data. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. An apparatus, comprising:
-
means for decrypting encrypted data using a decryption key to produce decrypted data; means for editing the decrypted data to produce edited decrypted data; means re-encrypting the edited decrypted data using a re-encryption key to produce re-encrypted data, wherein the re-encryption key is different from the decryption key, and wherein one or both of the decryption key and the re-encryption key is a utilization permit key that is usable to authorize at least one, but not all, of a plurality of types of usages of data; means for adding identification information to the re-encrypted data, wherein the identification information is associated with a user identifier that is authorized to decrypt the re-encrypted data; and means for transmitting the re-encrypted data and the added identification information via a computer network to a receiving party, wherein the identification information is usable by the receiving party to request a key to decrypt the re-encrypted data.
-
Specification