IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0895510
(2010-09-30)
|
등록번호 |
US-8185478
(2012-05-22)
|
발명자
/ 주소 |
- Pinkas, Binyamin
- Sander, Tomas
- Home, William G.
|
출원인 / 주소 |
- Intertrust Technologies Corp.
|
대리인 / 주소 |
Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
|
인용정보 |
피인용 횟수 :
5 인용 특허 :
48 |
초록
▼
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encryp
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party. In other embodiments, the sender encrypts this hash using a key associated with the third party and sends the encrypted hash to the receiver, who then forwards it to the third party.
대표청구항
▼
1. A method for providing a first party with data content, the method performed by a first computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving at the fi
1. A method for providing a first party with data content, the method performed by a first computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving at the first computer system data content from a second party, wherein the data content has been encrypted by a computer system associated with a third party;computing, at the first computer system, a first hash of at least a portion of the received encrypted data content;sending, by the first computer system, the first hash to a fourth party, wherein the fourth party is operable to compare at least a portion of the first hash to at least a portion of a second hash;receiving, at the first computer system, a decryption key from the fourth party; anddecrypting, at the first computer system, at least the portion of the received encrypted data content with the decryption key. 2. A method as in claim 1, wherein the data content received from the second party is provided to the second party by the third party. 3. A method as in claim 1, wherein the step of computing a first hash of a portion of the data content includes computing multiple hashes of the data content, wherein each of the multiple hashes is computed using a different portion of the data content. 4. A method as in claim 3, wherein the decryption key comprises a public key of the fourth party. 5. A method as in claim 3, wherein the second hash includes a hash of at least a portion of the encrypted data content, the second hash and the decryption key being sent to the fourth party by the third party. 6. A method as in claim 3, wherein the data content comprises one or more of: digitally encoded audio content; digitally encoded video content; digitally encoded text; and software. 7. A method as in claim 3, wherein each different portion of the data content comprises a unique, non-overlapping portion of the data content. 8. A method as in claim 3, wherein the step of sending the first hash to the fourth party includes sending the multiple hashes to a plurality of parties, and wherein the step of receiving the decryption key further includes receiving a plurality of decryption keys from the plurality of parties, each of the decryption keys being operable to decrypt a portion of the data content. 9. A method as in claim 8, wherein a first decryption key received from one of the plurality of parties is operable to decrypt at least a first portion of the data content used to compute a hash sent to the one of the plurality of parties. 10. A method as in claim 8, wherein the plurality of decryption keys does not include at least one decryption key corresponding to at least one portion of the data content, and wherein the step of decrypting the data content includes decrypting said at least one portion of the data content. 11. A method as in claim 9, wherein the plurality of decryption keys does not include at least twenty five percent of a set of decryption keys corresponding to each portion of the data content, and wherein the step of decrypting the portion of data content includes decrypting each portion of the data content using the plurality of decryption keys. 12. A method as in claim 3, further comprising: in response to the step of sending the first hash, receiving an indication from the fourth party that the portion of the encrypted data content is valid. 13. A method as in claim 12, further including: in response to receiving the indication from the fourth party that the encrypted data content is valid, submitting payment information to the fourth party, the payment information being sufficient to enable the fourth party to cause the first party to be charged for the data content. 14. A method as in claim 13, wherein the payment information is processed so that the fourth party is compensated for supplying the decryption key to the first party. 15. A method as in claim 1, wherein the step of sending the first hash to a fourth party further includes sending payment related information to the fourth party. 16. A method as in claim 1, wherein the step of receiving data content from the second party further includes receiving the data content in multiple data blocks, and wherein each of the multiple data blocks further includes a message authentication code. 17. A method as in claim 16, wherein the message authentication code included in at least one of the multiple blocks is encoded by the fourth party, wherein the fourth party uses a key to encode the message authentication code before sending the message authentication code to the third party. 18. A method as in claim 16, wherein the step of sending the first hash to the fourth party further includes sending the message authentication code. 19. A method as in claim 18, wherein the fourth party is operable to decrypt the message authentication code and compare the decrypted message authentication code with the message authentication code sent by the fourth party to the third party. 20. A method as in claim 19, wherein the fourth party uses the key to decrypt the received message authentication code.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.