Method and system for secure digital file sharing
First Claim
Patent Images
1. A computer-implemented method for secure digital file sharing comprising the steps of:
- a remote computer receiving from a first computer an authentication request, the authentication request comprising a first computer serial number and a unique software license key, the unique software license key associated with a software agent on the first computer in communication with the remote computer;
the remote computer determining whether the first computer is authorized for use with the remote computer by determining a valid combination of the first computer serial number and the unique software license key;
the remote computer transmitting to the first computer a validation message associated with the first computer;
the remote computer storing a first file received from the first computer in a first database, first database associated with the first computer;
the first file tagged with access rights granted by the first computer which will serve to govern the subsequent use and lifespan of the first file;
the remote computer receiving from the first computer a first detail message associated with a first file copied from the first computer to the remote computer, the first detail message comprising at least a name of the first file copied from the first computer to the remote computer;
the remote computer storing the first detail message in a meta-data log;
the remote computer receiving from a second computer an authentication request, the authentication request comprising a second computer serial number and a unique software license key, the unique software license key associated with a software agent on the second computer, the second computer in communication with the remote computer;
the remote computer determining whether the second computer is authorized for use with the remote computer by determining a valid combination of the second computer serial number and the unique software license key;
the remote computer transmitting to the second computer a validation message associated with the second computer;
the remote computer transferring a copy of the first file from the first database to a second database, second database associated with the second computer;
the remote computer receiving from the second computer a second detail message associated with the first file copied by the remote computer to the second database, the second detail message comprising at least the name of the first file copied from the remote computer to the second database; and
the remote computer storing the second detail message in the meta-data log.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
92 Citations
24 Claims
-
1. A computer-implemented method for secure digital file sharing comprising the steps of:
-
a remote computer receiving from a first computer an authentication request, the authentication request comprising a first computer serial number and a unique software license key, the unique software license key associated with a software agent on the first computer in communication with the remote computer; the remote computer determining whether the first computer is authorized for use with the remote computer by determining a valid combination of the first computer serial number and the unique software license key; the remote computer transmitting to the first computer a validation message associated with the first computer; the remote computer storing a first file received from the first computer in a first database, first database associated with the first computer;
the first file tagged with access rights granted by the first computer which will serve to govern the subsequent use and lifespan of the first file;the remote computer receiving from the first computer a first detail message associated with a first file copied from the first computer to the remote computer, the first detail message comprising at least a name of the first file copied from the first computer to the remote computer; the remote computer storing the first detail message in a meta-data log; the remote computer receiving from a second computer an authentication request, the authentication request comprising a second computer serial number and a unique software license key, the unique software license key associated with a software agent on the second computer, the second computer in communication with the remote computer; the remote computer determining whether the second computer is authorized for use with the remote computer by determining a valid combination of the second computer serial number and the unique software license key; the remote computer transmitting to the second computer a validation message associated with the second computer; the remote computer transferring a copy of the first file from the first database to a second database, second database associated with the second computer; the remote computer receiving from the second computer a second detail message associated with the first file copied by the remote computer to the second database, the second detail message comprising at least the name of the first file copied from the remote computer to the second database; and the remote computer storing the second detail message in the meta-data log. - View Dependent Claims (2, 3, 4, 16, 17, 18)
-
-
5. A computer-implemented method for secure digital file sharing comprising the steps of:
-
a remote computer receiving from a first computer an authentication request, the authentication request comprising a first computer serial number and a unique software license key, the unique software license key associated with a software agent on the first computer in communication with the remote computer; the remote computer determining whether the first computer is authorized for use with the remote computer by determining a valid combination of the first computer serial number and the unique software license key;
the remote computer transmitting to the first computer a validation message associated with the first computer;the remote computer storing a first file received from the first computer in a first database, first database associated with the first computer;
the first file tagged with access rights granted by the first computer which will serve to govern the subsequent use and lifespan of the first file;the remote computer receiving from the first computer a first detail message associated with a first file copied from the first computer to the remote computer, the first detail message comprising at least a name of the first file copied from the first computer to the remote computer; the remote computer storing the first detail message in a meta-data log; the remote computer receiving from a mobile device an authentication request, the authentication request comprising a mobile device serial number and a unique software license key the unique software license key associated with a software agent on the mobile device in communication with the remote computer; the remote computer determining whether the mobile device is authorized for use with the remote computer by determining a valid combination of the mobile device serial number and the unique software license key;
the remote computer transmitting to the mobile device a validation message associated with the mobile device;the remote computer transferring a copy of the first file from the first database to a second database, second database associated with the mobile device; the remote computer receiving from the mobile device a second detail message associated with the first file copied from the remote computer to the second database, the second detail message comprising at least the name of the first file copied by the remote computer to the second database; and the remote computer storing the second detail message in the meta-data log. - View Dependent Claims (6, 7, 8, 9, 19, 20, 21)
-
-
10. A computer-implemented method for secure digital file sharing, comprising the steps of:
-
a remote computer receiving from a first mobile device, a first mobile device serial number and a first unique software license key, the first mobile device in communication with the remote computer, the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device serial number and the first unique software license key; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device;
the first file tagged with access rights granted by the first computer which will serve to govern the subsequent use and lifespan of the first file;the remote computer storing the first file received from the first mobile device, the remote computer in communication with a software agent on the first mobile device; the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer; the remote computer receiving from a second mobile device, a second mobile device serial number and a second unique software license key, the second mobile device in communication with the remote computer; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device serial number and the second unique software license key; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transferring a copy of the first file to the second mobile device, the remote computer in communication with a software agent on the second mobile device; and the remote computer storing in the meta-data log a second detail message associated with the first file transmitted by the remote computer to the second mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 22, 23, 24)
-
Specification