IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0157993
(2011-06-10)
|
등록번호 |
US-8402558
(2013-03-19)
|
발명자
/ 주소 |
- Phillips, II, Eugene B.
- Ornstein, Seth
|
출원인 / 주소 |
- Digital Reg of Texas, LLC
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
1 인용 특허 :
115 |
초록
▼
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authenti
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
대표청구항
▼
1. A computer-implemented method for protecting electronic content, the method comprising the steps of: sending a digital electronic container having a container identification to a client device, the digital electronic container containing content data arranged into data blocks encrypted using a sy
1. A computer-implemented method for protecting electronic content, the method comprising the steps of: sending a digital electronic container having a container identification to a client device, the digital electronic container containing content data arranged into data blocks encrypted using a symmetric keying technique, a predetermined data block storing a symmetric decryption key, and the predetermined data block and stored symmetric decryption key being encrypted using an asymmetric key technique;storing an asymmetric decryption key associated with the digital electronic container in a registration database;receiving client device footprint data from the client device;combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; andsending the re-key value to the client device to re-key the predetermined data block at the client device thereby locking the content data to the client device. 2. The computer-implemented method of claim 1, wherein all of the data blocks are encrypted using a symmetric key technique. 3. The computer-implemented method of claim 1, wherein the step of sending a digital electronic container includes sending unencrypted data blocks. 4. The computer-implemented method of claim 1, wherein the digital electronic container is configured with executable instructions that are configured to execute at the client device to combine the client device footprint data and the re-key value to create a fingerprint key, the fingerprint key for decrypting the predetermined data block thereby providing access to the symmetric decryption key. 5. The computer-implemented method of claim 1, wherein the step of sending the re-key value to the client device includes sending the re-key value as part of a permission token. 6. The computer-implemented method of claim 2, wherein the permission token includes a fingerprint key. 7. The computer-implemented method of claim 1, wherein the step of receiving receives user input data and the step of combining produces a fingerprint key. 8. The computer-implemented method of claim 7, wherein the user input data includes any one or more of: financial data, account data, credit data, a social security number and identifying data. 9. The computer-implemented method of claim 1, wherein the step of combining uses the container identifier to produce a fingerprint key. 10. The computer-implemented method of claim 9, wherein the sending step sends the re-key value and the fingerprint key as part of a permission token. 11. A computer program product comprising computer executable instructions embodied on a computer readable storage device that when read and executed by a computer processor executes the following steps: sending a digital electronic container having a container identification to a client device, the digital electronic container containing content data arranged into data blocks encrypted using a symmetric keying technique, a predetermined data block storing a symmetric decryption key, and the predetermined data block being encrypted using an asymmetric key technique;storing an asymmetric decryption key associated with the digital electronic container in a registration database;receiving client device footprint data from the client device;combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; andsending the re-key value to the client device to re-key the predetermined data block at the client device thereby locking the content data to the client device. 12. The computer-implemented method of claim 11, wherein all of the data blocks are encrypted using a symmetric key technique. 13. The computer program product of claim 11, wherein the step of sending a digital electronic container includes sending unencrypted data blocks. 14. The computer program product of claim 11, wherein the digital electronic container is configured with executable instructions that are configured to execute at the client device to combine the client device footprint data and the re-key value to create a fingerprint key, the fingerprint key for decrypting the predetermined data block thereby accessing the symmetric decryption key. 15. The computer program product of claim 11, wherein the step of sending the re-key value to the client device includes sending the re-key value as part of a permission token. 16. The computer program product of claim 11, wherein the permission token includes a fingerprint key. 17. The computer program product of claim 11, wherein the step of receiving receives user input data and the step of combining produces a fingerprint key. 18. The computer program product of claim 17, wherein the user input data includes any one or more of: financial data, account data, credit data, a social security number and identifying data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.