Method for providing multimedia files and terminal therefor
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04N-007/167
H04L-009/00
출원번호
US-0739797
(2000-12-20)
등록번호
US-7463738
(2008-12-09)
발명자
/ 주소
Nii,Naoaki
출원인 / 주소
Nokia Corporation
대리인 / 주소
Banner & Witcoff, Ltd.
인용정보
피인용 횟수 :
5인용 특허 :
14
초록▼
A method of and a system for securely distributing data files to a user. A first key is encrypted using a second key. The encrypted first key is stored on an integrated circuit card that is associated with the user. The integrated circuit card is provided to the user. Data files are encrypted using
A method of and a system for securely distributing data files to a user. A first key is encrypted using a second key. The encrypted first key is stored on an integrated circuit card that is associated with the user. The integrated circuit card is provided to the user. Data files are encrypted using the first key to get an encrypted data file at a first party. The encryption parameters are exchanged between the first party and integrated circuit card.
대표청구항▼
What is claimed is: 1. A method comprising: encrypting a first encryption key using a second encryption key, to provide an encrypted first encryption key; storing the encrypted first encryption key on a first integrated circuit card at a first computer; encrypting a data file using the first encryp
What is claimed is: 1. A method comprising: encrypting a first encryption key using a second encryption key, to provide an encrypted first encryption key; storing the encrypted first encryption key on a first integrated circuit card at a first computer; encrypting a data file using the first encryption key, to result in an encrypted data file; distributing the encrypted data file to a distribution terminal; placing the first integrated circuit card into communication with a first mobile terminal; downloading the encrypted data file from the distribution terminal to the first mobile terminal and storing the encrypted data file on the first mobile terminal; directly transferring the encrypted first encryption key from the first integrated circuit card to the first mobile terminal, wherein the encrypted first encryption key and the encrypted data file are transmitted over separate communication channels; decrypting the encrypted first encryption key in the first mobile terminal using an encryption key corresponding to the second encryption key; and decrypting the encrypted data file in the first mobile terminal using the first encryption key. 2. The method of claim 1, further comprising wirelessly transferring the encrypted data file to the first mobile terminal. 3. The method of claim 1, wherein the first integrated circuit card includes a publisher identity stored thereon, and wherein downloading the encrypted data file includes: sending the publisher identity to the distribution terminal, and verifying the sent publisher identity as an authorized identity. 4. The method of claim 1, further comprising: transferring the data file from the first mobile terminal to a second mobile terminal. 5. The method of claim 1, further comprising: establishing a communication link between the first mobile terminal and a second mobile terminal; accessing, by the first mobile terminal, a second integrated circuit card in communication with the second mobile terminal; determining that the first and second integrated circuit cards each have a common publisher identity stored thereon; and forwarding, based on the determination of common publisher identity stored on the first and second integrated circuit cards, the data file from the first mobile terminal to the second mobile terminal. 6. The method of claim 1, wherein the first integrated circuit card includes consumption metering data stored thereon, and further comprising: updating the consumption metering data based on download of the data file to the first mobile terminal; updating the consumption metering data based on download of additional data files to the first mobile terminal; and upon the consumption metering data reaching a predetermined value, allowing no further data file downloads based on the consumption metering data reaching the predetermined value. 7. The method of claim 6, further comprising: updating the consumption metering data upon transfer of the data file or one of the additional data files to a second mobile terminal. 8. The method of claim 7, wherein the updating process permits downloading of further data files by the first mobile terminal from the distribution terminal. 9. The method of claim 1, wherein the second encryption key is one of the encryption keys of a public/private encryption key pair, and wherein the key corresponding to the second encryption key is the other of the encryption keys of the public/private encryption key pair. 10. The method of claim 9, wherein: the other of the encryption keys of the public/private encryption key pair is stored in a secure module in the first mobile terminal. 11. A system comprising: a first integrated circuit card; a first computer configured to store an encrypted first encryption key on the first integrated circuit card, the encrypted first encryption key including a first encryption key encrypted using a second encryption key; a distribution terminal configured to receive an encrypted data file, wherein the encrypted data file is data file encrypted using the first encryption key; and a first mobile terminal configured to communicate with the first integrated circuit card, download the encrypted data file from the distribution terminal, store the encrypted data file, directly receive the encrypted first encryption key from the first integrated circuit card, wherein the encrypted first encryption key and the encrypted data file are transmitted over separate communication channels, decrypt the encrypted first encryption key using an encryption key corresponding to the second encryption key, and decrypt the encrypted data file using the first encryption key. 12. The system of claim 11, wherein the first integrated circuit card includes a publisher identity stored thereon, and wherein the first mobile terminal is configured to send the publisher identity to the distribution terminal, and the distribution terminal is configured to verify the sent publisher identity as an authorized identity. 13. The system of claim 11, further comprising a second mobile terminal, and wherein the first mobile terminal is configured to transfer the data file to the second mobile terminal. 14. The system of claim 11, further comprising a second mobile terminal, and wherein the first mobile terminal is configured to: establish a communication link with the second mobile terminal, access a second integrated circuit card in communication with the second mobile terminal, determine that the first and second integrated circuit cards each store a common publisher identity, and forward, based on the determination that the first and second integrated circuit cards each store a common publisher identity, the data file to the second mobile terminal. 15. The system of claim 11, wherein the second encryption key is one of the encryption keys of a public/private encryption key pair, and wherein the key corresponding to the second encryption key is the other of the encryption keys of the public/private encryption key pair. 16. The system of claim 15, wherein: the other of the encryption keys of the public/private encryption key pair is stored in a secure module in the first mobile terminal. 17. A method comprising: establishing communication between an encryption source and a first mobile terminal; downloading an encrypted data file from a distribution source to the first mobile terminal and storing the encrypted data file on the first mobile terminal; directly receiving an encrypted first encryption key from the encryption source at the first mobile terminal, wherein the encrypted first encryption key and the encrypted data file are received into the first mobile terminal via separate communication channels; decrypting the encrypted first encryption key to obtain a first encryption key in the first mobile terminal using a second encryption key; and decrypting the encrypted data file to obtain a data file in the first mobile terminal using the first encryption key. 18. The method of claim 17, wherein downloading the encrypted data file comprises wirelessly receiving the encrypted data file. 19. The method of claim 17, wherein the encryption source includes a publisher identity stored thereon, and wherein downloading the encrypted data file includes: sending the publisher identity to the distribution source; and verifying the sent publisher identity as an authorized identity. 20. The method of claim 17, further comprising: transferring the data file from the first mobile terminal to a second mobile terminal. 21. The method of claim 17, further comprising: establishing a communication link between the first mobile terminal and a second mobile terminal; accessing, by the first mobile terminal, a second encryption source in communication with the second mobile terminal; determining that the first and second encryption sources each have a common publisher identity stored thereon; and forwarding, based on the determination of common publisher identity stored on the first and second encryption sources, the data file from the first mobile terminal to the second mobile terminal. 22. The method of claim 17, wherein the first encryption source includes consumption metering data stored thereon, and further comprising: updating the consumption metering data based on download of the data file to the first mobile terminal; updating the consumption metering data based on download of additional data files to the first mobile terminal; and upon the consumption metering data reaching a predetermined value, allowing no further data file downloads based on the consumption metering data reaching the predetermined value. 23. The method of claim 22, further comprising: updating the consumption metering data upon transfer of the data file or one of the additional data files to a second mobile terminal. 24. The method of claim 23, wherein the updating the consumption metering data upon transfer of the data file or one of the additional data files to the second mobile terminal permits downloading of further data files by the first mobile terminal from the distribution source. 25. The method of claim 17, wherein the second encryption key is one of the encryption keys of a public/private encryption key pair, and wherein the key corresponding to the second encryption key is the other of the encryption keys of the public/private encryption key pair. 26. The method of claim 17, further comprising: storing the encrypted first encryption key on a first integrated circuit card at a first computer. 27. The method of claim 17, further comprising: distributing the encrypted data file to a distribution terminal. 28. Apparatus comprising: a memory; and a processor configured to perform a method comprising: establishing communication between an encryption source and the apparatus; downloading an encrypted data file from a distribution source to the apparatus and storing the encrypted data file on the apparatus; directly receiving an encrypted first encryption key from the encryption source at the apparatus, wherein the encrypted first encryption key and the encrypted data file are received into the apparatus via separate communication channels; decrypting the encrypted first encryption key to obtain a first encryption key in the apparatus using a second encryption key; and decrypting the encrypted data file to obtain a data file in the apparatus using the first encryption key. 29. The apparatus of claim 28, wherein the data file comprises a multimedia file. 30. The apparatus of claim 28 wherein the apparatus comprises a wireless terminal for multimedia data. 31. The apparatus of claim 28, wherein the distribution source comprises a wireless kiosk. 32. The apparatus of claim 28, wherein said downloading to the apparatus the encrypted data file from the distribution source comprises wirelessly receiving the encrypted data file at the apparatus. 33. The apparatus of claim 28, wherein the encryption source includes a publisher identity stored thereon, and wherein the downloading an encrypted data file from the distribution source further includes: sending the publisher identity to the distribution source, to verify the sent publisher identity as an authorized identity. 34. The apparatus of claim 28, wherein the processor is further configured to perform: transferring the data file from the apparatus to a second apparatus. 35. The apparatus of claim 28, wherein the processor is further configured to perform: establishing a communication link between the apparatus and a second apparatus; accessing a second encryption source in communication with the second apparatus; determining that the first and second encryption sources each have a common publisher identity stored thereon; and based on the determination, forwarding the data file to the second apparatus.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (14)
Tsevdos James T. ; Cook Ross L. ; Ring Nancy Lee ; Barnhill Robert S. ; Hamblin Glen E. ; Milsted Kenneth L. ; Kindell Craig N. ; Waefler Susan Elizabeth ; Portela Carlos ; Anderson Brent C., Digital information accessing, delivery and production system.
Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
Fox, Barbara L.; Waters, Lester L.; Spelman, Jeffrey F.; Seidensticker, Robert B.; Thomlinson, Matthew W., System and method for secure electronic commerce transaction.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Seo, Jang-Won; Kwon, Yong-Hwan; Kim, Ji-Eun; Kim, Ji-Hong; Kim, Hye-Ryung; Jeon, Se-Ran; Hwang, Woo-Seok, Display screen or portion thereof with graphical user interface.
Hake, Rich; McConathy, Marc; Berdai, Adil; DeHook, Mickey, System and method for creating and distributing asynchronous bi-directional channel based multimedia content.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.