Secure Distributed Information And Password Management

  • Published: May 10, 2016
  • Earliest Priority: Nov 05 2013
  • Family: 2
  • Cited Works: 1
  • Cited by: 1
  • Cites: 7
  • Additional Info: Cited Works Full text
Abstract

A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a key for the digital content; encrypting the digital content using the generated key to generate encrypted digital content; obtaining a first passcode; and providing the first passcode and the encrypted digital content to a user device associated with the first user. The method may further include receiving, from the user device, a request for the key, wherein the request include the first passcode; determining that the first passcode is valid; determining that the key has not expired; and providing the key to the user device, in response to determining that the first passcode is valid and that the key has not expired.


Claims
Download PDF
Document Preview
Document History
  • Publication: May 10, 2016
  • Application: Nov 5, 2013
    US US 201314072303 A
  • Priority: Nov 5, 2013
    US US 201314072303 A

Sign in to the Lens

Feedback