System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
출원번호
US-0126974
(2002-04-22)
발명자
/ 주소
Byrne,Shannon
Muecke,Innes
Patterson,Andrew
Slik,David
출원인 / 주소
Protexis, Inc.
대리인 / 주소
Roylance, Abrams, Berdo &
인용정보
피인용 횟수 :
18인용 특허 :
32
초록▼
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system i
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters.
대표청구항▼
What is claimed is: 1. A method of delivering encrypted content to a user computer via a communication network comprising the steps of: generating queries using said user computer to search for content via said communication network, said content being available from an information provider via a s
What is claimed is: 1. A method of delivering encrypted content to a user computer via a communication network comprising the steps of: generating queries using said user computer to search for content via said communication network, said content being available from an information provider via a server and said communication network; downloading a dataset comprising at least one purchasable item and provided via said server in response to said queries; previewing said dataset using said user computer; selecting at least one purchasable item provided in said dataset; generating a machine-dependent product code at said user computer, said product code comprising a unique identifier corresponding to at least a part of said user computer to uniquely identify said user computer; transmitting a request for said at least one purchasable item and said product code to said information provider; and encrypting said at least one purchasable item in response to said request. 2. A method as claimed in claim 1, wherein said information provider encrypts said at least one purchasable item in said dataset using a key and generates a release code for said at least one purchasable item using said product code and said key in response to said request, said release code being machine-dependent with respect to said user computer. 3. A method as claimed in claim 2, further comprising the steps of: receiving said release code at said user computer; and decrypting said at least one purchasable item at said user computer using said release code. 4. A method as claimed in claim 1, wherein said unique identifier is derived from a hardware device in said computer. 5. A method as claimed in claim 1, wherein said unique identifier is derived from a card number of a circuit board in said user computer. 6. A method of delivering encrypted content to a user computer via a communication network comprising the steps of: reviewing a dataset using said user computer, said dataset being provided to said user computer by an information provider via a communication network; selecting at least one purchasable item provided in said dataset; generating a machine-dependent product code at said user computer, said product code comprising a unique identifier corresponding to at least a part of said user computer to uniquely identify said user computer; and transmitting a request for said at least one purchasable item and said product code to said information provider; and encrypting said at least one purchasable item in response to said request. 7. A method as claimed in claim 6, wherein said dataset comprises secure content previews of selected content items from a data repository in said communication network, said content items being stored unencrypted at said data repository, said at least one purchasable item corresponding to one of said selected content items, said reviewing step comprising the step of reviewing said secure content previews prior to encryption of said at least one purchasable item in response to said request. 8. A method as claimed in claim 6, wherein said information provider encrypts said at least one purchasable item in said dataset using a key and generates a release code for said purchasable item using said product code and said key in response to said request, said release code being machine-dependent with respect to said user computer. 9. A method as claimed in claim 8, further comprising the steps of: receiving said release code at said user computer; and decrypting said purchasable item at said user computer using said release code. 10. A method as claimed in claim 6, wherein said unique identifier is derived from a hardware device in said user computer. 11. A method as claimed in claim 6, wherein said unique identifier is derived from a card number of a circuit board in said user computer. 12. A method of delivering encrypted content to a user computer via a communication network comprising the steps of: storing content in a data repository; receiving a request from a remote user computer for a selected content item in said data repository, said request comprising a product code that is machine-dependent based on said user computer; encrypting said selected content item using a key for encryption in response to said request; generating a release code in response to said request based on said key and said product code; and transmitting the encrypted said selected content item and said release code to said user computer. 13. A method as claimed in claim 12, wherein said product code comprises a unique identifier derived from a hardware device in said user computer. 14. A method as claimed in claim 12, wherein said product code comprises a unique identifier derived from a card number of a circuit board in said user computer. 15. A method as claimed in claim 12, wherein said content is stored unencrypted. 16. A method of delivering encrypted content to a user computer via a communication network comprising the steps of: storing content in a data repository, said content being stored unencrypted; receiving a request from a remote user computer for selected said content in said data repository; encrypting said selected content using a key for encryption in response to said request; transmitting said selected content to said user computer for downloading; generating a release code in response to a request to decrypt an item among said selected content, said request to decrypt comprising a product code that is machine-dependent with respect to said user computer, said release code being based on said key and said product code; and transmitting said release code to said user computer. 17. A method as claimed in claim 16, wherein said product code comprises a unique identifier derived from a hardware device in said user computer. 18. A method as claimed in claim 17, wherein said unique identifier is derived from a card number of a circuit board in said user computer. 19. A method of delivering a set of data items from a server database to a client computer via a digital medium comprising the steps of: generating queries via said client computer to search for data items in said server database; previewing and selecting desired data items via said client computer and sending the selection results to said server; packaging the selected data items via said server into a single compound file, encrypting it with a package key, and storing the key in a key database along with a unique package identifier; attaching executable client fulfillment software to the package file via said server; receiving the package of encrypted data items at said client computer from said server and executing the client fulfillment software; generating a product code via said client fulfillment software that comprises said unique package identifier and transmitting said product code to said server; after receiving said product code, generating a release code at said server that comprises said package key and transmitting said release code to said client computer; receiving said release code and decrypting the data items via said client fulfillment software for storage on said client computer. 20. A method as claimed in claim 19, wherein said product code also comprises an identifier that uniquely identifies and differentiates said client computer from other client computers. 21. A method as claimed in claim 20, wherein said identifier that uniquely identifies said client computer is derived from the unique serial numbers of one or more hardware devices in said computer that are accessible via software. 22. A method as claimed in claim 20, wherein said release code is encrypted with said identifier that uniquely identifies said client computer. 23. A method as claimed in claim 19, wherein said product code is encrypted with a key that is known by both said client fulfillment software and said server. 24. A method as claimed in claim 19, further comprising the step of processing a payment transaction between said client computer and the said server before said release code is transmitted to said client computer.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (32)
Fahn Paul N. (Redwood City CA) Kaliski ; Jr. Burton S. (San Carlos CA) Robshaw Matthew J. B. (San Francisco CA) Fahn Paul N. (Redwood City CA), Abuse-resistant object distribution system and method.
Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
Fehskens Leonard G. (Westboro MA) Strutt Colin (Westford MA) Callander Jill F. (Hudson MA) Nelson Kathy J. (Nashua NH) Guertin Matthew J. (Westford MA) Sylor Mark W. (Nashua NH) Chapman Kenneth W. (N, Extensible entity management system including a dispatching kernel and modules which independently interpret and execute.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Santon John C. (Johnstown CO) Nielsen Kenneth R. (Loveland CO) Armbrust Christen M. (Boulder Creek CA) Shah Pankaj B. (Santa Clara CA) Hand Steven J. (San Jose CA), Method of distributing computer data files.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Lidinsky William P. (Naperville IL) Roediger Gary A. (Downers Grove IL) Steele Scott B. (Naperville IL) Weddige Ronald C. (Western Springs IL) Zelle Bruce R. (Naperville IL), Metropolitan area network arrangement for serving virtual data networks.
Bernard Warren E. ; Jacobson Philip A., System and method for automated remote previewing and purchasing of music, video, software, and other multimedia product.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.