US 12,333,032 B2
Data access control systems and methods
Daniel Joseph Sturtevant, Cambridge, MA (US); Christopher Lalancette, Ayer, MA (US); Michael Nathan Lack, Arlington, VA (US); and Paul B. Schneck, Potomac, MD (US)
Assigned to DataSphere, LLC, Milton, GA (US)
Filed by Intellectual Ventures II LLC, Wilmington, DE (US)
Filed on Feb. 16, 2024, as Appl. No. 18/444,484.
Application 18/444,484 is a continuation of application No. 17/948,112, filed on Sep. 19, 2022, granted, now 11,941,134.
Application 17/948,112 is a continuation of application No. 16/816,032, filed on Mar. 11, 2020, granted, now 11,449,622, issued on Sep. 20, 2022.
Application 16/816,032 is a continuation of application No. 16/102,573, filed on Aug. 13, 2018, granted, now 10,599,859, issued on Mar. 24, 2020.
Application 16/102,573 is a continuation of application No. 15/656,966, filed on Jul. 21, 2017, granted, now 10,049,225, issued on Aug. 14, 2018.
Application 15/656,966 is a continuation of application No. 14/923,344, filed on Oct. 26, 2015, granted, now 9,740,872, issued on Aug. 22, 2017.
Application 14/923,344 is a continuation of application No. 14/307,394, filed on Jun. 17, 2014, granted, now 9,171,176, issued on Oct. 27, 2015.
Application 14/307,394 is a continuation of application No. 11/756,824, filed on Jun. 1, 2007, granted, now 8,800,008, issued on Aug. 5, 2014.
Claims priority of provisional application 60/803,683, filed on Jun. 1, 2006.
Prior Publication US 2024/0346161 A1, Oct. 17, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/00 (2013.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); G06F 21/85 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/62 (2013.01) [G06F 21/31 (2013.01); G06F 21/604 (2013.01); G06F 21/606 (2013.01); G06F 21/6209 (2013.01); G06F 21/6218 (2013.01); G06F 21/85 (2013.01); H04L 63/0807 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for controlling access to protected content or data, the method comprising:
receiving, at a computer device from a remote user device, a request to access the protected content or data stored in a trusted operating system at the computer device, wherein the request comprises an indication of a first version of an electronic ticket granted to a user, and wherein the first version of the electronic ticket includes access control rules;
retrieving, at the computer device, a second version of the electronic ticket, wherein the second version of electronic ticket includes state information that is not in the first version of the electronic ticket, and wherein the second version is stored in a portion of memory that is not accessible by the user;
determining, at the computer device, and based at least in part on the access control rules and the state information, whether the request to access the protected content or data should be granted,
wherein—
when it is determined that the request should be granted, enabling access to the protected content or data, and
when it is determined that the request should not be granted, denying access to the protected content or data.