IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0128182
(2002-04-22)
|
발명자
/ 주소 |
- Pinkas,Binyamin
- Sander,Tomas
- Horne,William G.
|
출원인 / 주소 |
- Intertrust Technologies Corp.
|
대리인 / 주소 |
Finnegan, Henderson, Farabow, Garrett &
|
인용정보 |
피인용 횟수 :
25 인용 특허 :
48 |
초록
▼
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encryp
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party. In other embodiments, the sender encrypts this hash using a key associated with the third party and sends the encrypted hash to the receiver, who then forwards it to the third party.
대표청구항
▼
The invention claimed is: 1. A method for providing a first party with access to an electronic file, the method comprising: receiving an electronic message from a second party, the electronic message including an encrypted version of the electronic file; sending an electronic message from the firs
The invention claimed is: 1. A method for providing a first party with access to an electronic file, the method comprising: receiving an electronic message from a second party, the electronic message including an encrypted version of the electronic file; sending an electronic message from the first party to a third party, the electronic message including a first hash of at least part of the encrypted electronic file, the third party being operable to compare the first hash with a second hash, the second hash having been sent to the third party by said second party before the first party sent to the third party the electronic message including the first hash; receiving a decryption key from the third party; decrypting at least part of the electronic file with the decryption key. 2. A method as in claim 1, wherein the electronic file comprises an electronic mail message. 3. A method as in claim 1, in which the second hash comprises a hash of the encrypted electronic file. 4. A method as in claim 1, wherein said electronic message further comprises a description of the electronic file. 5. A method as in claim 1, further comprising: in response to said sending step, receiving an indication from the third party that the encrypted electronic file is valid. 6. A method as in claim 5, further comprising: in response to receiving the indication from the third party that the encrypted electronic file is valid, submitting payment information to the third party, the payment information being sufficient to enable the third party to cause the first party to be charged for the electronic file. 7. A method as in claim 1, in which the encrypted electronic file is selected from the group consisting of: digitally encoded audio content; digitally encoded video content; digitally encoded text; and software. 8. A method as in claim 1, wherein the steps are performed in the order recited. 9. A method as in claim 1, wherein the second hash sent to the third party by the second party is sent in a communication separate from the electronic message sent by the first party to the third party. 10. A method for facilitating the secure electronic transfer of an electronic file from a first party to a second party, the method comprising the following steps: receiving a first hash of at least part of an encrypted version of the electronic file from the first party; receiving a second hash of at least part of an encrypted version of the electronic file from the second party, wherein the second hash is received after the first hash is received; comparing the first hash with the second hash; if the comparison is successful: sending a decryption key to the second party, the decryption key being operable to decrypt at least part of the encrypted electronic file; if the comparison is not successful: sending an indication to the second party that the comparison was not successful. 11. A method as in claim 10, further comprising: if the comparison is successful: sending an indication to the second party that the comparison was successful; receiving payment-related information from the second party; verifying the validity of the payment-related information; processing the payment-related information such that the second party is charged for access to or use of the electronic file; wherein the step of sending the decryption key to the second party is performed in response to the step of verifying the validity of the payment-related information from the second party. 12. A method as in claim 11, in which the payment-related information is processed such that the first party is compensated for transferring the electronic file to the second party. 13. A method as in claim 12, in which the payment-related information is processed such that an owner of rights to the electronic file's contents is compensated for the second party's acquisition of access to or use of the electronic file. 14. A method as in claim 10, in which the first hash is received in encrypted form, the method further comprising: decrypting the first hash. 15. A method as in claim 14, further comprising: if the comparison is successful: electronically sending an indication to the first party that the key was sent to the second party. 16. A method as in claim 10, wherein the second hash is received in a communication separate from the first hash. 17. A computer-readable medium storing a computer program package for managing the transfer of electronic files, the computer program package providing instructions, which, if executed by a computer system, cause the system to perform operations comprising: receiving, from a first party, a first hash of at least part of an encrypted version of an electronic file; receiving, from a second party, a second hash of at least part of an encrypted version of the electronic file, wherein the second hash is received after the first hash is received; comparing the first hash with the second hash; if the comparison is successful: sending a decryption key to the second party, the decryption key being operable to decrypt at least part of the encrypted version of the electronic file; if the comparison is not successful: sending an indication to the second party that the comparison was not successful. 18. A computer-readable medium as in claim 17, in which the computer program package further provides instructions, which, if executed by a computer system, cause the system to perform operations comprising: decrypting an encrypted version of the first hash received from the first party; and if said comparison of the first hash with the second hash is successful: sending an indication to the first party that the key was sent to the second party.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.