Method and system for managing a data object so as to comply with predetermined conditions for usage
First Claim
Patent Images
1. A method comprising:
- receiving at least two data packages, each data package comprising a data object and a set of control data, the set of control data for each data package including at least one usage control element defining a usage of the data object, the usage complying with a variable number of conditions, the data object and the usage control element for each data package being encrypted;
decrypting the usage control elements of the sets of control data;
examining, by use of a data processor, the usage control elements of the at least two data packages to find a match;
determining whether a data processor is capable of completing a security procedure specified in a security control element of the usage control elements, and disabling the usage when the data processor is not capable of completing the security procedure; and
performing an action specified in the sets of control data of the at least two data packages, if the usage is not disabled.
11 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for managing a data object so as to comply with predetermined conditions for usage of the data object. To control the usage of the data object, a set of control data, defining uses of the data object, which comply with the predetermined conditions, is created for the data object. The data object is concatenated with the user set of control data, encrypted and transferred to the user. When the user wants to use the data object, a special user program checks whether the usage complies with the control data. If so, the usage is enabled. Otherwise it is disabled.
-
Citations
38 Claims
-
1. A method comprising:
-
receiving at least two data packages, each data package comprising a data object and a set of control data, the set of control data for each data package including at least one usage control element defining a usage of the data object, the usage complying with a variable number of conditions, the data object and the usage control element for each data package being encrypted; decrypting the usage control elements of the sets of control data; examining, by use of a data processor, the usage control elements of the at least two data packages to find a match; determining whether a data processor is capable of completing a security procedure specified in a security control element of the usage control elements, and disabling the usage when the data processor is not capable of completing the security procedure; and performing an action specified in the sets of control data of the at least two data packages, if the usage is not disabled. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving at least two data packages, each data package comprising a data object and a set of control data, the set of control data for each data package including at least one usage control element defining a usage of the data object, the usage complying with a variable number of conditions, the data object for each data package being encrypted; examining, by use of a data processor, the usage control elements of the at least two data packages to find a match; determining whether a data processor is capable of completing a security procedure specified in a security control element of the usage control elements, and disabling the usage when the data processor is not capable of completing the security procedure; and performing an action specified in the sets of control data of the at least two data packages, if the usage is not disabled. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
a data processor; a receiving module, being executable by the data processor, to receive at least two data packages, each data package comprising a data object and a set of control data, the set of control data for each data package including at least one usage control element defining a usage of the data object, the usage complying with a variable number of conditions, the data object and the usage control element for each data package being encrypted; a decryption module to decrypt the usage control elements of the sets of control data; a security module to examine the usage control elements of the at least two data packages to find a match, to determine whether the data processor is capable of completing a security procedure specified in a security control element of the usage control elements, and to disable the usage when the data processor is not capable of completing the security procedure; and a usage manager module to perform an action specified in the sets of control data of the at least two data packages, if the usage is not disabled. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system comprising:
-
a data processor; a receiving module, being executable by the data processor, to receive at least two data packages, each data package comprising a data object and a set of control data, the set of control data for each data package including at least one usage control element defining a usage of the data object, the usage complying with a variable number of conditions, the data object for each data package being encrypted; a security module to examine the usage control elements of the at least two data packages to find a match, to determine whether the data processor is capable of completing a security procedure specified in a security control element of the usage control elements, and to disable the usage when the data processor is not capable of completing the security procedure; and a usage manager module to perform an action specified in the sets of control data of the at least two data packages, if the usage is not disabled. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
Specification