×

Data management

  • US 7,986,785 B2
  • Filed: 08/29/2006
  • Issued: 07/26/2011
  • Est. Priority Date: 10/27/1994
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • a first computer system receiving an encrypted version of data;

    the first computer system decrypting the encrypted version of the data using a first crypt key to produce decrypted data;

    the first computer system editing the decrypted data to produce edited decrypted data;

    the first computer system re-encrypting the edited decrypted data using a second crypt key to produce a re-encrypted version of the data, wherein the second crypt key is different from the first crypt key, and wherein one or both of the first crypt key and the second crypt key is a utilization permit key usable to authorize at least one, but not all, of a plurality of types of usages of data;

    the first computer system attaching identification information to the re-encrypted version of the data, wherein the identification information is associated with a user identifier that is authorized to decrypt the re-encrypted version of the data; and

    after the attaching the identification information, the first computer system transmitting the re-encrypted version of the data and the attached identification information to a second computer system via a communication network, wherein the identification information is usable to request a key to decrypt the re-encrypted version of the data.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×