Global Patent Index - EP 3061057 A1

EP 3061057 A1 20160831 - SYSTEM AND METHOD FOR MONITORING THIRD PARTY ACCESS TO A RESTRICTED ITEM

Title (en)

SYSTEM AND METHOD FOR MONITORING THIRD PARTY ACCESS TO A RESTRICTED ITEM

Title (de)

SYSTEM UND VERFAHREN ZUR ÜBERWACHUNG DES DRITTPARTEIZUGANGS ZU EINEM ZUGANGSBESCHRÄNKTEN ELEMENT

Title (fr)

SYSTÈME ET PROCÉDÉ DE CONTRÔLE D'ACCÈS TIERS À UN ÉLÉMENT RESTREINT

Publication

EP 3061057 A1 20160831 (EN)

Application

EP 14806725 A 20141024

Priority

  • ZA 201308093 A 20131025
  • ZA 201400928 A 20140207
  • IB 2014065586 W 20141024

Abstract (en)

[origin: GB2514716A] A method of monitoring third party access to a restricted item (e.g. physical/digital media item, such as an eBook) comprises embedding key-data in the restricted item, the data being associated with a store of value (e.g. digital-currency wallet) and being useable to conduct a transaction against that store, where a transaction-record is visible in a transaction ledger; and monitoring the transaction ledger to determine whether a transaction is made, and marking the item as accessed by a third party if a transaction occurs. An authorised party is held accountable for the third party access in the event that such an access is detected. The store of value may be a cryptocurrency, and may be represented by/derived from a public key corresponding to a private key. Key-data may be readable either directly or by software tools, and may comprise a plurality of sets of key-data. An advantage of the invention is incentivising third parties to use the key data, thus notifying the monitoring authority that the restricted item has been accessed by a third party.

IPC 8 full level

G06F 21/16 (2013.01); G06Q 30/00 (2012.01); G06Q 30/02 (2012.01); H04L 9/32 (2006.01)

CPC (source: EP GB RU)

G06F 21/16 (2013.01 - EP GB); G06Q 30/02 (2013.01 - RU); G06Q 30/0208 (2013.01 - GB); G06Q 30/0226 (2013.01 - RU); G06Q 30/0254 (2013.01 - RU); H04L 9/32 (2013.01 - EP RU); H04L 9/321 (2013.01 - RU); H04L 9/3213 (2013.01 - RU); H04L 9/3226 (2013.01 - RU); H04L 9/3247 (2013.01 - RU); H04L 9/3249 (2013.01 - RU); H04L 2209/56 (2013.01 - EP)

Citation (search report)

See references of WO 2015059669A1

Citation (examination)

JAKUB SZEFER ET AL: "BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures", CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON, IEEE, 13 May 2013 (2013-05-13), pages 630 - 635, XP032431257, ISBN: 978-1-4673-6465-2, DOI: 10.1109/CCGRID.2013.102

Designated contracting state (EPC)

AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

Designated extension state (EPC)

BA ME

DOCDB simple family (publication)

GB 201416002 D0 20141022; GB 2514716 A 20141203; CN 105849757 A 20160810; CN 105849757 B 20190903; EP 3061057 A1 20160831; RU 2016119148 A 20171201; RU 2656995 C2 20180607; WO 2015059669 A1 20150430; ZA 201603571 B 20171129

DOCDB simple family (application)

GB 201416002 A 20140910; CN 201480071065 A 20141024; EP 14806725 A 20141024; IB 2014065586 W 20141024; RU 2016119148 A 20141024; ZA 201603571 A 20160525