×

Information security systems and methods

  • US 9,589,110 B2
  • Filed: 04/11/2012
  • Issued: 03/07/2017
  • Est. Priority Date: 04/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for governing the use of a digital resource, the method comprising:

  • receiving one or more programs associated with a user, wherein the one or more programs are configured to operate upon the digital resource when executed to generate a derived digital resource by performing at least one computation on information contained in the digital resource, the derived digital resource being different, at least in part, than the digital resource;

    associating one or more rules with the digital resource, wherein the rules correspond to one or more conditions for accessing the digital resource;

    associating the one or more programs with the digital resource; and

    receiving a request to generate the derived digital resource from a system associated with the user;

    executing the one or more programs to generate the derived digital resource based on the digital resource wherein the digital resource contains information not included in the generated derived digital resource, and the generated derived resource is a limited view of said digital resource from which it is not possible to recreate the digital resource, and the digital resource is obscured using pseudorandom information based on deterministic seed information associated with a given principal such that the same principal always receives the same obscured view of the digital resource,and wherein executing the one or more programs comprises enforcing the one or more conditions for accessing the digital resource in connection with execution of the one or more programs; and

    transmitting the derived digital resource to the system associated with the user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×