Method and system for managing a data object so as to comply with predetermined condition for usage
First Claim
1. A method of controlling the usage by a user of data objects so as to comply with a variable number of conditions for usage of the data objects, comprising:
- providing at least two data packages, each data package comprising a data object and a user set of control data, which comprises at least one usage control element defining a usage of the data object which complies with the variable number of conditions, the data object being encrypted;
examining the usage control elements of the at least two data packages to find a match;
checking whether a data processor is capable of executing a security procedure specified in a security control element of the at least one usage control element, and disabling the usage when the data processor is not capable of executing the security procedure; and
performing an action being specified in the user sets of control data of the at least two data packages and decrypting the data objects.
11 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for managing a data object so as to comply with predetermined conditions for usage of the data object. To control the usage of the data object, a set of control data, defining uses of the data object, which comply with the predetermined conditions, is created for the data object. The data object is concatenated with the user set of control data, encrypted and transferred to the user. When the user wants to use the data object, a special user program checks whether the usage complies with the control data. If so, the usage is enabled. Otherwise it is disabled.
-
Citations
2 Claims
-
1. A method of controlling the usage by a user of data objects so as to comply with a variable number of conditions for usage of the data objects, comprising:
-
providing at least two data packages, each data package comprising a data object and a user set of control data, which comprises at least one usage control element defining a usage of the data object which complies with the variable number of conditions, the data object being encrypted; examining the usage control elements of the at least two data packages to find a match; checking whether a data processor is capable of executing a security procedure specified in a security control element of the at least one usage control element, and disabling the usage when the data processor is not capable of executing the security procedure; and performing an action being specified in the user sets of control data of the at least two data packages and decrypting the data objects. - View Dependent Claims (2)
-
Specification