Password-less security and protection of online digital assets
First Claim
1. A computer-implemented method for protecting a digital asset on an asset server with a key and destroying the key, the method, comprising the steps of:
- storing the digital asset on the asset server;
disabling the digital asset, comprising;
handicapping the digital asset on the asset server with security data to prevent normal use of the digital asset, by removing a portion of bits from the digital asset itself to prevent normal use of the digital asset;
sending the security data from the asset server to the remote device, wherein the remote device handicaps the security data with a second security data based on a user gesture to prevent normal use of the security data, wherein the second security data is completely discarded from the remote device; and
completely discarding the security data from the asset server, wherein the digital asset remains disabled on the asset server; and
enabling the digital asset, comprising;
receiving the security data from the remote device responsive to a request to access the digital asset, wherein the remote device reconstitutes the second security data from user gesture and uses the second security data to enable the security data that was handicapped by the remote device for normal use of the security data; and
reconstituting the digital asset using at least the security data in order to enable the digital asset that was handicapped by the asset server for normal use of the digital asset.
0 Assignments
0 Petitions
Accused Products
Abstract
Digital assets stored on an asset server by an asset owner are protected without a password. Instead, the digital assets are functionally handicapped by removing at least a portion of digital data (or a key) associated with the digital asset and discarding the key after being sent to an enabling device. The portion of digital data (or a key) is then handicapped by the enabling device by a cryptographic key which is formed from a human gesture and subsequently discarded. When access to the digital asset is requested, an asset owner is notified by the enabling device for approval. A human gesture from the asset owner first provides a key to reconstitute the digital data portion which is transmitted to the asset server to reconstitute the digital asset upon which the access is granted and logged.
32 Citations
17 Claims
-
1. A computer-implemented method for protecting a digital asset on an asset server with a key and destroying the key, the method, comprising the steps of:
storing the digital asset on the asset server; disabling the digital asset, comprising; handicapping the digital asset on the asset server with security data to prevent normal use of the digital asset, by removing a portion of bits from the digital asset itself to prevent normal use of the digital asset; sending the security data from the asset server to the remote device, wherein the remote device handicaps the security data with a second security data based on a user gesture to prevent normal use of the security data, wherein the second security data is completely discarded from the remote device; and completely discarding the security data from the asset server, wherein the digital asset remains disabled on the asset server; and enabling the digital asset, comprising; receiving the security data from the remote device responsive to a request to access the digital asset, wherein the remote device reconstitutes the second security data from user gesture and uses the second security data to enable the security data that was handicapped by the remote device for normal use of the security data; and reconstituting the digital asset using at least the security data in order to enable the digital asset that was handicapped by the asset server for normal use of the digital asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A computer-implemented method for protecting a digital asset on an asset server from a remote device with a key and destroying the key, the method comprising the steps of:
-
receiving at least security data associated with the digital asset that has been handicapped to prevent normal use of the digital asset, from the asset server, and wherein the digital asset remains intact on the asset server and the security data has been completely discarded from the asset server; disabling the security data; receiving a unique human input from an owner of the digital asset; handicapping the security data with data from the unique human input; and completely discarding the second security data from the remote device enabling the security data; responsive to receiving a notification for a request for access to the digital asset, requesting the unique human input from the owner of the digital asset; reconstituting the security data with the unique human input; and sending the security data to the asset server to reconstitute the digital asset for normal use.
-
-
16. A non-transitory computer-readable medium storing source code that, when executed by a processor, performs a method for protecting a digital asset on an asset server with a key and destroying the key, the method comprising the steps of:
-
storing the digital asset on the asset server; disabling the digital asset, comprising; handicapping the digital asset on the asset server with security data to prevent normal use of the digital asset, by removing a portion of bits from the digital asset itself to prevent normal use of the digital asset; sending security data from the asset server to the remote device, wherein the remote device handicaps the security data with a second security data based on a user gesture to prevent normal use of the security data, wherein the user gesture is not stored on the remote device; and completely discarding the security data from the asset server, wherein the digital asset remains disabled on the asset server; and enabling the digital asset, comprising; receiving the security data from the remote device responsive to a request to access the digital asset, wherein the remote device reconstitutes the second security data from user gesture and uses the second security data to enable the security data that was handicapped by the remote device for normal use of the security data; and reconstituting the digital asset using at least the security data in order to enable the digital asset that was handicapped by the asset server for normal use of the digital asset.
-
-
17. A system to protect a digital asset on an asset server, comprising:
-
a processor; and a memory to store the digital asset, the memory comprising; a handicapping module to handicap the digital asset with security data to prevent normal use, by removing a portion of bits from the digital asset itself to prevent normal use of the digital asset, to send the security data to a remote device, wherein the remote device handicaps the security data, the security data being independent from the digital asset, and discard the security data, wherein the digital asset remains disabled on the asset server; and a reconstitution module to receive the security data from a remote device, and reconstitute the digital asset using the security data to enable the digital asset for normal use.
-
Specification