Browse Prior Art Database

Method and system of key based information delivery

IP.com Disclosure Number: IPCOM000241666D
Publication Date: 2015-May-21
Document File: 5 page(s) / 116K

Publishing Venue

The IP.com Prior Art Database

Abstract

Nowadays information are delivered and exchanged quite often. However, there are plenty of information with sensitivity and security. If they are exposed to improper persons at improper places during incorrect timeframe, there are potential risk for users related to such information. Our core idea is to associate information with a key and provide key to information receiver. The properties of the key includes limit of scope, time and location, etc. They will protect the information. In addition, key can be nested and referenced. What information receiver gets first is key instead of information itself. The information receivers use the delivered key to log on information repository, and they also need to input their credential so that information owner can automatically or manually check whether information should be delivered to right person during right time.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 70% of the total text.

Page 01 of 5

Method and system of key based information delivery

Nowadays information are delivered and exchanged quite often. However, there are plenty of information with sensitivity and security. If they are exposed to improper persons at improper places during incorrect timeframe, there are potential risk for users related to such information.

Our core idea is to associate information with a key and provide key to information receiver. The properties of the key includes limit of scope, time and location, etc. They will protect the information. In addition, key can be nested and referenced.

What information receiver gets first is key instead of information itself. The information receivers use the delivered key to log on information repository, and they also need to input their credential so that information owner can automatically or manually check whether information should be delivered to right person during right time.

Our idea includes several steps in order to make it work.

a. information owner generates key which is based on delivered information and situation of delivery, such as delivered target, valid timeslot, delivered location.

b. information owner delivers key to information receivers.

c. information receivers gets key and logs on to information repository.

e. depends on information's characteristic, different authentication methods was performed.

- information owner may select to validate manually and check the ID information of information receivers to del...