IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0478042
(2012-05-22)
|
등록번호 |
US-8577812
(2013-11-05)
|
발명자
/ 주소 |
- Pinkas, Binyamin
- Sander, Tomas
- Horne, William G.
|
출원인 / 주소 |
- Intertrust Technologies Corporation
|
대리인 / 주소 |
Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
|
인용정보 |
피인용 횟수 :
1 인용 특허 :
48 |
초록
▼
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
대표청구항
▼
1. A non-transitory computer-readable medium storing program instructions that, when executed by a processor included in a computer system associated with a first party, cause the first party computer system to perform a method for decrypting data content, the method comprising: receiving encrypted
1. A non-transitory computer-readable medium storing program instructions that, when executed by a processor included in a computer system associated with a first party, cause the first party computer system to perform a method for decrypting data content, the method comprising: receiving encrypted data content from a second party;computing a first hash of at least a portion of the encrypted data content;sending the first hash to the second party, wherein the second party is configured to compare at least a portion of the first hash to at least a portion of a second hash;receiving a decryption key from the second party; anddecrypting at least the portion of the received encrypted data content with the decryption key,wherein computing the first hash of a portion of the encrypted data content comprises the first party computer system computing multiple hashes of the encrypted data content, where each of the multiple hashes is computed using a different portion of the encrypted data content. 2. The non-transitory computer-readable medium of claim 1, wherein the encrypted data content received from the second party is provided by a third party, the third party having received the encrypted data content from a fourth party. 3. The non-transitory computer-readable medium of claim 1, wherein the decryption key comprises a public key associated with the second party. 4. The non-transitory computer-readable medium of claim 1, wherein the second hash includes a hash of at least a portion of the encrypted data content, the second hash and the decrypting key being sent to the second party by a third party. 5. The non-transitory computer-readable medium of claim 1, wherein the encrypted data content comprises one or more of: digitally encoded audio content; digitally encoded video content; digitally encoded text; and software. 6. The non-transitory computer-readable medium of claim 1, wherein each different portion of the encrypted data content comprises a unique, non-overlapping portion of the encrypted data content. 7. The non-transitory computer-readable medium of claim 1, wherein sending the first hash to the second party includes sending the multiple hashes to a plurality of parties, and wherein receiving the decryption key further includes receiving a plurality of decryption keys from the plurality of parties, each of the decryption keys being configured to decrypt a portion of the encrypted data content. 8. The non-transitory computer-readable medium of claim 7, wherein a first decryption key received from one of the plurality of parties is operable to decrypt at least a first portion of the encrypted data content used to compute a hash sent to one of the plurality of parties. 9. The non-transitory computer-readable medium of claim 8, wherein the plurality of decryption keys does not include at least twenty five percent of a set of decryption keys corresponding to each portion of the encrypted data content, and wherein the step of decrypting the portion of the encrypted data content includes decrypting each portion of the encrypted data content using the plurality of decryption keys. 10. The non-transitory computer-readable medium of claim 7, wherein the plurality of decryption keys does not include at least one decryption key corresponding to at least one portion of the data content, and wherein decrypting the encrypted data content includes decrypting the at least one portion of the encrypted data content. 11. The non-transitory computer-readable medium of claim 1, wherein the method further comprises receiving, in response to sending the first hash, an indication from the second party that the portion of the encrypted data content is valid. 12. The non-transitory computer-readable medium of claim 11, wherein the method further comprises submitting, in response to receiving the indication from the second party that the encrypted data content is valid, payment information to the second party, the payment information being configured to enable the second party to cause the first party to be charged for the data content. 13. The non-transitory computer-readable medium of claim 12, wherein the payment information is processed so that the second party is compensated for supplying the decryption key to the first party. 14. The non-transitory computer-readable medium of claim 1, wherein sending the first hash to the second party further includes sending payment related information to the second party. 15. A non-transitory computer-readable medium storing program instructions that, when executed by a processor included in a computer system associated with a first party, cause the first party computer system to perform a method for decrypting data content, the method comprising: receiving encrypted data content from a second party;computing a first hash of at least a portion of the encrypted data content;sending the first hash to the second party, wherein the second party is configured to compare at least a portion of the first hash to at least a portion of a second hash;receiving a decryption key from the second party; anddecrypting at least the portion of the received encrypted data content with the decryption key,wherein receiving the encrypted data content from the second party further comprises the first party computer system receiving the encrypted data content in multiple encrypted data blocks, each of the multiple encrypted data blocks further including a message authentication code. 16. The non-transitory computer-readable medium of claim 15, wherein the message authentication code included in at least one of the multiple blocks is encoded by the second party, wherein the second party uses a key to encode the method authentication code before sending the message authentication code to a third party. 17. The non-transitory computer-readable medium of claim 15, wherein sending the first hash to the second party further includes sending the message authentication code. 18. The non-transitory computer-readable medium of claim 17, wherein the second party is configured to decrypt the message authentication code and compare the decrypted message authentication code with the message authentication code sent by the second party to a third party. 19. The non-transitory computer-readable medium of claim 18, wherein the second party is configured to use the key to decrypt the received message authentication code.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.