A Personal Digital Key Digital Content Security System (PDK-DCSS) is used to protect computers from unauthorized use and protect the digital content stored on computers from being wrongfully accessed, copied, and/or distributed. The basic components of the PDK-DCSS are (1) a standard hard drive devi
A Personal Digital Key Digital Content Security System (PDK-DCSS) is used to protect computers from unauthorized use and protect the digital content stored on computers from being wrongfully accessed, copied, and/or distributed. The basic components of the PDK-DCSS are (1) a standard hard drive device, with the addition of a PDK Receiver/Decoder Circuit (PDK-RDC) optionally integrated into the hard drive's controller, and (2) a PDK-Key associated with the PDK-RDC. The PDK-Key and RDC technology is utilized to provide two categories of protection: (1) hard drive access control for providing Drive-Level and Sector-Level protection and (2) operating system-level independent file protection for providing File-Level and Network-Level protection.
대표청구항▼
What is claimed is: 1. A method of securing a storage medium having digital content, comprising: detecting a portable, physical key with a receiver/decoder circuit communicating with the storage medium wherein the key comprises information used to encrypt or decrypt the digital content; determining
What is claimed is: 1. A method of securing a storage medium having digital content, comprising: detecting a portable, physical key with a receiver/decoder circuit communicating with the storage medium wherein the key comprises information used to encrypt or decrypt the digital content; determining by the receiver/decoder circuit whether or not the detected key is associated with the storage medium; permitting access to the storage medium or a portion thereof if the detected key is associated with the storage medium, wherein digital content read from or written to the storage medium is decrypted or encrypted by the receiver/decoder circuit using the key associated with the storage medium; and disabling the storage medium if the detected key is not associated with the storage medium. 2. The method of claim 1, wherein the storage medium and the receiver/decoder circuit reside in a computer. 3. The method of claim 1, wherein the detecting step includes detecting the key over a secure wireless link. 4. The method of claim 1, wherein the storage medium is a hard drive of a computer. 5. The method of claim 1, wherein digital content stored on the storage medium is not encrypted with the key. 6. The method of claim 1, wherein digital content read from or written to the storage medium is decrypted or encrypted by the receiver/decoder circuit in sectors such that securing the storage medium is transparent to an operating system managing the storage medium. 7. The method of claim 1, wherein the key associated with the storage medium is initially delivered with the storage medium. 8. A system for securing digital content, comprising: a storage medium for storing the digital content; and a receiver/decoder circuit communicating with the storage medium, the receiver/decoder circuit comprising: detection logic for detecting a portable, physical key in proximity to the storage medium; receiving logic for receiving key information from the detected key; validation logic for determining if the key is associated with the storage medium; encryption/decryption logic for decrypting or encrypting the digital content read from or written to the storage medium using the key information received from the key if the key is associated with the storage medium; and protection logic for disabling the storage medium if the detected key is not associated with the storage medium. 9. The system of claim 8, wherein the receiver/decoder circuit resides in a computer. 10. The system of claim 8, wherein the receiver/decoder circuit detects the key over a secure wireless link. 11. The system of claim 8, wherein the storage medium is a hard drive of a computer. 12. The system of claim 8, wherein digital content stored on the storage medium is not encrypted with the key. 13. The system of claim 8, wherein the receiver/decoder circuit decrypts or encrypts digital content read from or written to the storage medium in sectors such that securing the storage medium is transparent to an operating system managing the storage medium. 14. The system of claim 8, wherein the key associated with the hard drive is initially delivered with the storage medium. 15. A method of securing and accessing a computer file, comprising: encrypting the file with a receiver/decoder circuit using a portable, physical key; storing the encrypted file on a storage medium; requesting the file with a playback mechanism; detecting the portable, physical key with the receiver/decoder circuit, wherein the portable, physical key includes information used to encrypt or decrypt the file; determining by the receiver/decoder circuit if the detected key is associated with the file; permitting access to the file if the detected key is associated with the file, wherein the receiver/decoder circuit decrypts the file with the receiver/decoder circuit using the detected key; and disabling the storage medium if the detected key is not associated with the file. 16. The method of claim 15, wherein the storage medium is a hard drive of a computer, and the receiver/decoder circuit resides in the computer. 17. The method of claim 15, wherein a software driver in the computer's operating system instructs the receiver/decoder circuit to perform the detecting, validating, and decrypting steps. 18. The method of claim 15, wherein the detecting step includes detecting the key over a secure wireless link.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (25)
Stelzel Jason A. (13623 S. Berendo Ave. Gardena CA 90247-2023), Communicating between the infrared and midi domains.
Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
Radicella, Michael; Burkley, Richard M.; Chapman, Kriston L.; Jones, Shirl D.; Matsumoto, Roger Y., Method and system for controlling access to an enclosed area.
Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.