Secured information is stored on a server accessible to a network. A first access component that is required to permit use of the secured information is distributed to a delegate. In the absence of a second access component, the first access component is not sufficient to permit use of the secured information. The second access component can be stored on the server or stored with a third party for distribution to the delegate.

 
Web www.patentalert.com

< Nestable skeleton decryption keys for digital rights management

> Method and apparatus for processing usage rights expressions

~ 00425