Key-based content management and access systems and methods
First Claim
1. A method comprising:
- receiving data representative of a content instance over a network from an access device associated with a first user;
storing said content instance;
encrypting said content instance in response to a command initiated by said first user by way of one or more graphical user interfaces;
providing, in response to said command initiated by said first user to encrypt said content instance, a key configured to facilitate decryption of said content instance;
creating, subsequent to said command initiated by said first user to encrypt said content instance and based on input provided by said first user by way of said one or more graphical user interfaces, at least one access rule corresponding to said content instance, said at least one access rule specifying an allowed level of access to said content instance for each of a plurality of different users and an allowed level of access to said content instance for each of a plurality of different types of access devices, wherein said allowed level of access to said content instance for each of said plurality of different types of access devices comprises a full access level to said content instance for a first type of access device included in the plurality of different types of access devices, a read-only access level to said content instance for a second type of access device included in the plurality of different types of access devices, and a no access level to said content instance for a third type of access device included in the plurality of different types of access devices;
transmitting data representative of said content instance to a requesting access device associated with a requesting user;
receiving, from said requesting access device, data representative of a request to access said key over said network; and
performing a predefined action related to said key in response to said request and in accordance with said at least one access rule.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary method includes receiving data representative of a content instance over a network from an access device associated with a user, storing the content instance, encrypting the content instance in response to a command initiated by the user, providing a key configured to facilitate decryption of the encrypted content instance, transmitting data representative of the encrypted content instance to a requesting access device, receiving data representative of a request to access the key from the requesting access device over the network, and performing a predefined action related to the key in response to the request and in accordance with at least one access rule, the at least one access rule based on at least one of a user profile and an access device profile.
-
Citations
24 Claims
-
1. A method comprising:
-
receiving data representative of a content instance over a network from an access device associated with a first user; storing said content instance; encrypting said content instance in response to a command initiated by said first user by way of one or more graphical user interfaces; providing, in response to said command initiated by said first user to encrypt said content instance, a key configured to facilitate decryption of said content instance; creating, subsequent to said command initiated by said first user to encrypt said content instance and based on input provided by said first user by way of said one or more graphical user interfaces, at least one access rule corresponding to said content instance, said at least one access rule specifying an allowed level of access to said content instance for each of a plurality of different users and an allowed level of access to said content instance for each of a plurality of different types of access devices, wherein said allowed level of access to said content instance for each of said plurality of different types of access devices comprises a full access level to said content instance for a first type of access device included in the plurality of different types of access devices, a read-only access level to said content instance for a second type of access device included in the plurality of different types of access devices, and a no access level to said content instance for a third type of access device included in the plurality of different types of access devices; transmitting data representative of said content instance to a requesting access device associated with a requesting user; receiving, from said requesting access device, data representative of a request to access said key over said network; and performing a predefined action related to said key in response to said request and in accordance with said at least one access rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a content management subsystem configured to maintain data representative of a plurality of content instances associated with a first user; and an access subsystem associated with said first user and selectively and communicatively coupled to said content management subsystem over a network; wherein said content management subsystem is configured to encrypt said content instance in response to a command initiated by said first user by way of one or more graphical user interfaces, and provide, in response to said command initiated by said first user to encrypt said content instance, a key configured to facilitate decryption of said content instance; wherein said access subsystem is configured to transmit data representative of a content instance to said content management subsystem, and create, subsequent to said command initiated by said first user to encrypt said content instance and based on input provided by said first user by way of said one or more graphical user interfaces, at least one access rule corresponding to said content instance, said at least one access rule specifying an allowed level of access to said content instance for each of a plurality of different users and an allowed level of access to said content instance for each of a plurality of different types of access devices, wherein said allowed level of access to said content instance for each of said plurality of different types of access devices comprises a full access level to said content instance for a first type of access device included in the plurality of different types of access devices, a read-only access level to said content instance for a second type of access device included in the plurality of different types of access devices, and a no access level to said content instance for a third type of access device included in the plurality of different types of access devices; and wherein said content management subsystem is further configured to receive, from a requesting access device associated with a requesting user, data representative of a request to access said key, and perform a predefined action related to said key in response to said request and in accordance with said at least one access rule. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
a communication facility configured to receive data representative of a content instance over a network from an access device associated with a first user; a data store configured to store said data representative of said content instance; and a processing facility configured to; encrypt said content instance in response to a command initiated by said first user by way of one or more graphical user interfaces and provide, in response to said command initiated by said first user to encrypt said content instance, a key configured to facilitate decryption of said content instance, and create, subsequent to said command initiated by said first user to encrypt said content instance and based on input provided by said first user by way of said one or more graphical user interfaces, at least one access rule corresponding to said content instance, said at least one access rule specifying an allowed level of access to said content instance for each of a plurality of different users and an allowed level of access to said content instance for each of a plurality of different types of access devices, wherein said allowed level of access to said content instance for each of said plurality of different types of access devices comprises a full access level to said content instance for a first type of access device included in the plurality of different types of access devices, a read-only access level to said content instance for a second type of access device included in the plurality of different types of access devices, and a no access level to said content instance for a third type of access device included in the plurality of different types of access devices; wherein said communication facility is further configured to transmit data representative of said content instance to a requesting access device and receive, from said requesting access device, data representative of a request to access said key over said network; and wherein said processing facility is further configured to perform a predefined action related to said key in response to said request and in accordance with said at least one access rule. - View Dependent Claims (22, 23, 24)
-
Specification