A token or other storage device uses Internet identities to set file
access attribute rights. Subsequently, requests to access a file can be
controlled by confirming the Internet identity of the requester by either
validating the request with a known public key or retrieving the public
key from an Internet identity provider. Files may be stored encrypted and
may be re-encrypted with the public key associated with Internet identity
making the request.