IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0590319
(2006-10-30)
|
등록번호 |
US-7827114
(2010-11-22)
|
발명자
/ 주소 |
- Pinkas, Binyamin
- Sander, Tomas
- Horne, William G.
|
출원인 / 주소 |
- Intertrust Technologies Corporation
|
대리인 / 주소 |
Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
|
인용정보 |
피인용 횟수 :
5 인용 특허 :
48 |
초록
▼
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encryp
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party. In other embodiments, the sender encrypts this hash using a key associated with the third party and sends the encrypted hash to the receiver, who then forwards it to the third party.
대표청구항
▼
The invention claimed is: 1. A method performed by a computer system associated with a first party, the computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: compu
The invention claimed is: 1. A method performed by a computer system associated with a first party, the computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: computing, by the computer system, a first hash of at least a portion of encrypted data content received from a second party, wherein the encrypted data content has been encrypted by a third party; sending, from the computer system, the first hash to a fourth party, wherein the fourth party is operable to compare at least a portion of the first hash to at least a portion of a second hash; and decrypting, by the computer system, at least the portion of the encrypted data content with a decryption key received from the fourth party. 2. A method as in claim 1, wherein the encrypted data content received from the second party is provided to the second party by the third party. 3. A method as in claim 1, wherein the step of computing a first hash of a portion of the encrypted data content includes computing multiple hashes of the encrypted data content, wherein each of the multiple hashes is computed using a different portion of the encrypted data content. 4. A method as in claim 3, wherein the decryption key comprises a public key of the fourth party. 5. A method as in claim 3, wherein the second hash includes a hash of at least a portion of the encrypted data content, the second hash and the decryption key being sent to the fourth party by the third party. 6. A method as in claim 3, wherein the data content comprises one or more of: digitally encoded audio content; digitally encoded video content; digitally encoded text; and software. 7. A method as in claim 3, wherein each different portion of the encrypted data content comprises a unique, non-overlapping portion of the encrypted data content. 8. A method as in claim 3, wherein the step of sending the first hash to the fourth party includes sending the multiple hashes to a plurality of parties, and wherein the decrypting step further includes receiving a plurality of decryption keys from the plurality of parties, each of the decryption keys being operable to decrypt a portion of the encrypted data content. 9. A method as in claim 8, wherein a first decryption key received from one of the plurality of parties is operable to decrypt at least a first portion of the encrypted data content used to compute a hash sent to the one of the plurality of parties. 10. A method as in claim 9, wherein the plurality of decryption keys does not include at least twenty five percent of a set of decryption keys corresponding to each portion of the encrypted data content, and wherein the step of decrypting the portion of encrypted data content includes decrypting each portion of the encrypted data content using the plurality of decryption keys. 11. A method as in claim 8, wherein the plurality of decryption keys does not include at least one decryption key corresponding to at least one portion of the encrypted data content, and wherein the step of decrypting the encrypted data content includes decrypting said at least one portion of the encrypted data content. 12. A method as in claim 3, further comprising: in response to the step of sending the first hash, receiving, at the computer system, an indication from the fourth party that the portion of the encrypted data content is valid. 13. A method as in claim 12, further including: in response to receiving the indication from the fourth party that the encrypted data content is valid, submitting, from the computer system, payment information to the fourth party, the payment information being sufficient to enable the fourth party to cause the first party to be charged for the data content. 14. A method as in claim 13, wherein the payment information is processed so that the fourth party is compensated for supplying the decryption key to the first party. 15. A method as in claim 1, wherein the step of sending the first hash to a fourth party further includes sending payment related information to the fourth party. 16. A method as in claim 1, wherein the encrypted data content is received in multiple data blocks, and wherein each of the multiple data blocks further includes a message authentication code. 17. A method as in claim 16, wherein the message authentication code included in at least one of the multiple blocks is encoded by the fourth party, wherein the fourth party uses a key to encode the message authentication code before sending the message authentication code to the third party. 18. A method as in claim 17, wherein the step of sending the first hash to the fourth party further includes sending the message authentication code. 19. A method as in claim 18, wherein the fourth party is operable to decrypt the message authentication code and compare the decrypted message authentication code with the message authentication code sent by the fourth party to the third party. 20. A method as in claim 19, wherein the fourth party uses the key to decrypt the received message authentication code.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.