Systems and methods of secure data exchange
First Claim
1. A method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment, the method comprising:
- establishing, by a secure exchange facility managed by an intermediate organizational entity, a user login data authentication procedure that allows a user through at least one client computing device to access the secure exchange facility, wherein the user is one of a plurality of users of a plurality of other organizational entities that access content shared through the secure exchange facility, where communication between the secure exchange facility and the plurality of users is through a communications network;
receiving computer data content and at least one indicator of access rights for the computer data content from a first user of the plurality of users associated with a first organizational entity of the plurality of other organizational entities, wherein the first user permits sharing access to the computer data content by at least a second user of the plurality of users associated with a second organizational entity based on the indicated access rights, wherein the second organizational entity is one of the plurality of other organizational entities and is different than the first organizational entity;
transforming the computer data content into DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and wherein the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities that access content shared through the secure exchange facility;
granting, by the secure exchange facility, shared access to the DRM protected computer data content to at least the second user;
wherein the secure exchange facility further comprises a data management facility and plurality of data storage nodes, wherein the data management facility is managed by the intermediate organizational entity and is adapted to provide permissioned control to the plurality of other organizational entities for use of at least one of the plurality of data storage nodes, wherein each of the other organizational entities is granted permissioned control of at least one of the plurality of data storage nodes by the intermediate organizational entity for storing data comprised of the content and metadata, wherein the data management facility manages secure data exchange of the content through the data storage nodes, and wherein the data management facility has access to the metadata of the stored data for managing sharing of the content via the data storage nodes, but the data management facility does not have access to the content; and
wherein the secure exchange facility provides content services to the plurality of data storage nodes that operate on and store the content, store metadata, and provide at least one of data transformation, filtering to the content, analytics related to the content, and searching tools for the searching for content.
14 Assignments
0 Petitions
Accused Products
Abstract
An example method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment includes establishing, by a secure exchange facility and managed by an intermediate organizational entity, a procedure that allows a user from a first entity to share access to computer data content with a user from a second entity based on indicated access rights. The method includes transforming the computer data content into DRM protected content, utilizing a DRM engine provided by a separate entity. The method includes granting access to the content to the second user, providing permissioned control to entities utilizing a number of data storage nodes, and managing secure data exchange of the content and metadata, without the secure exchange facility having access to the content. The method includes operations to support content services including data transformation, filtering, analytics, and searching tools for the content.
-
Citations
22 Claims
-
1. A method for managing digital rights management (DRM) protected content sharing in a networked secure collaborative computer data exchange environment, the method comprising:
-
establishing, by a secure exchange facility managed by an intermediate organizational entity, a user login data authentication procedure that allows a user through at least one client computing device to access the secure exchange facility, wherein the user is one of a plurality of users of a plurality of other organizational entities that access content shared through the secure exchange facility, where communication between the secure exchange facility and the plurality of users is through a communications network; receiving computer data content and at least one indicator of access rights for the computer data content from a first user of the plurality of users associated with a first organizational entity of the plurality of other organizational entities, wherein the first user permits sharing access to the computer data content by at least a second user of the plurality of users associated with a second organizational entity based on the indicated access rights, wherein the second organizational entity is one of the plurality of other organizational entities and is different than the first organizational entity; transforming the computer data content into DRM protected computer data content through communications with a DRM engine, wherein the DRM engine is selected based on a content type of the computer data content, and wherein the DRM engine is provided by an entity other than the intermediate organizational entity and other than any of the plurality of other organizational entities that access content shared through the secure exchange facility; granting, by the secure exchange facility, shared access to the DRM protected computer data content to at least the second user; wherein the secure exchange facility further comprises a data management facility and plurality of data storage nodes, wherein the data management facility is managed by the intermediate organizational entity and is adapted to provide permissioned control to the plurality of other organizational entities for use of at least one of the plurality of data storage nodes, wherein each of the other organizational entities is granted permissioned control of at least one of the plurality of data storage nodes by the intermediate organizational entity for storing data comprised of the content and metadata, wherein the data management facility manages secure data exchange of the content through the data storage nodes, and wherein the data management facility has access to the metadata of the stored data for managing sharing of the content via the data storage nodes, but the data management facility does not have access to the content; and wherein the secure exchange facility provides content services to the plurality of data storage nodes that operate on and store the content, store metadata, and provide at least one of data transformation, filtering to the content, analytics related to the content, and searching tools for the searching for content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification