US 12,072,989 B2
System and methods for using cipher objects to protect data
Gregory Scott Smith, Madison, TN (US); Melani Leigh Smith Weed, Franklin, TN (US); Daniel Michael Fischer, Brentwood, TN (US); and Elke M. Ridenour, Brentwood, TN (US)
Assigned to Sertainty Corporation, Nashville, TN (US)
Filed by SERTAINTY CORPORATION, Nashville, TN (US)
Filed on Jul. 16, 2021, as Appl. No. 17/377,595.
Application 17/377,595 is a continuation in part of application No. 16/657,412, filed on Oct. 18, 2019, granted, now 11,093,623.
Application 16/657,412 is a continuation of application No. 15/704,735, filed on Sep. 14, 2017, granted, now 10,482,266, issued on Nov. 19, 2019.
Application 15/704,735 is a continuation of application No. 14/689,668, filed on Apr. 17, 2015, granted, now 9,792,451, issued on Oct. 17, 2017.
Application 14/689,668 is a continuation in part of application No. 13/710,366, filed on Dec. 10, 2012, abandoned.
Claims priority of provisional application 63/052,851, filed on Jul. 16, 2020.
Claims priority of provisional application 61/980,617, filed on Apr. 17, 2014.
Claims priority of provisional application 61/569,162, filed on Dec. 9, 2011.
Prior Publication US 2022/0004649 A1, Jan. 6, 2022
Int. Cl. G06F 21/60 (2013.01); H04L 9/40 (2022.01); H04W 4/18 (2009.01)
CPC G06F 21/604 (2013.01) [G06F 21/606 (2013.01); H04L 63/104 (2013.01); H04L 63/20 (2013.01); H04W 4/185 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2141 (2013.01); H04L 63/0428 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method for creating digitally secured data, the method comprising:
constructing a self-protected data object comprising at least one delegate object, wherein the at least one delegate object comprises an externally addressable network address and wherein the delegate object communicates with a remote delegate service at the externally addressable network address; and
initializing the remote delegate service with one or more user authentication credentials specific to the self-protected data object such that access to the self-protected data object is limited to users associated with the user authentication credentials stored at the remote delegate service, wherein the one or more user authentication credentials specific to the self-protected data object comprise at least one static user credential, wherein the at least one static user credential is incorporated into the self-protected data object, thereby allowing users associated with the at least one static user credential to access the data object without requiring authentication b the remote delegate service.