INFORMATION SECURITY SYSTEMS AND METHODS
First Claim
Patent Images
1. A method for governing the use of a digital resource, the method comprising:
- associating one or more rules and a set of one or more computations with the digital resource, wherein the rules correspond to one or more conditions for accessing the digital resource and the computations operate upon the digital resource in order to provide a specific view of the digital resource that differs from the digital resource.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for governing derived electronic resources are provided. In one embodiment, a digital resource is associated with one or more rules and a set of one or more computations, wherein the rules correspond to one or more conditions for accessing the digital resource and the computations operate upon the digital resource in order to provide a specific view of the digital resource that differs from the digital resource.
-
Citations
26 Claims
-
1. A method for governing the use of a digital resource, the method comprising:
associating one or more rules and a set of one or more computations with the digital resource, wherein the rules correspond to one or more conditions for accessing the digital resource and the computations operate upon the digital resource in order to provide a specific view of the digital resource that differs from the digital resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
10. The method of claim 10, in which pseudorandom information used to obscure the digital resource is based on a deterministic set of seed information.
-
11. The method of claim 11, in which the deterministic seed information used to generate the pseudorandom information is associated with a given principal such that the same principal always receives the same obscured view of the digital resource.
-
26. The method of 14, in which the computation is cryptographically associated with a digital resource by packaging a machine-readable representation of the computation in the same secure package used to associate the rules with the digital resource.
Specification