×

Key-based content management and access systems and methods

  • US 8,787,579 B2
  • Filed: 06/30/2008
  • Issued: 07/22/2014
  • Est. Priority Date: 06/30/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving data representative of a content instance over a network from an access device associated with a first user;

    storing said content instance;

    encrypting said content instance in response to a command initiated by said first user by way of one or more graphical user interfaces;

    providing, in response to said command initiated by said first user to encrypt said content instance, a key configured to facilitate decryption of said content instance;

    creating, subsequent to said command initiated by said first user to encrypt said content instance and based on input provided by said first user by way of said one or more graphical user interfaces, at least one access rule corresponding to said content instance, said at least one access rule specifying an allowed level of access to said content instance for each of a plurality of different users and an allowed level of access to said content instance for each of a plurality of different types of access devices, wherein said allowed level of access to said content instance for each of said plurality of different types of access devices comprises a full access level to said content instance for a first type of access device included in the plurality of different types of access devices, a read-only access level to said content instance for a second type of access device included in the plurality of different types of access devices, and a no access level to said content instance for a third type of access device included in the plurality of different types of access devices;

    transmitting data representative of said content instance to a requesting access device associated with a requesting user;

    receiving, from said requesting access device, data representative of a request to access said key over said network; and

    performing a predefined action related to said key in response to said request and in accordance with said at least one access rule.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×