Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The
Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
대표청구항▼
1. A method performed by a computer system associated with a first party, the computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the computer system to perform the method, the method comprising: receiving a first pluralit
1. A method performed by a computer system associated with a first party, the computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the computer system to perform the method, the method comprising: receiving a first plurality of encoded content blocks from a second party computer system, the first plurality of encoded content blocks being associated with a plurality of blocks of a piece of content;receiving a message comprising a second plurality of encrypted encoded content blocks and an encrypted first encryption key from a third party computer system, the second plurality of encrypted encoded content blocks being encrypted using the first encryption key, the encrypted first encryption key being encrypted using a second encryption key associated with the first party;decrypting the encrypted first encryption key using the second encryption key to obtain the first encryption key;decrypting the second plurality of encrypted encoded content blocks using the first encryption key to obtain a second plurality of decrypted encoded content blocks;comparing at least one block of the second plurality of decrypted encoded content blocks with at least one block of the first plurality of encoded content blocks; anddetermining whether the third party computer system has possession of the first plurality of encoded content blocks based at least in part on the comparison. 2. The method of claim 1, wherein the first plurality of encoded content blocks are encoded from the plurality of blocks of the piece of content using an error correction code. 3. The method of claim 1, wherein a number of blocks of the first plurality of encoded content blocks is less than a number of blocks of the plurality of blocks of the piece of content. 4. The method of claim 1, wherein a number of blocks of the second plurality of encrypted encoded content blocks is less than a number of blocks of the first plurality of encoded content blocks. 5. The method of claim 1, wherein the second encryption key comprises a public encryption key associated with the first party. 6. The method of claim 1, wherein the determining whether the third party computer system has possession of the first plurality of encoded content blocks comprises determining that the at least one block of the second plurality of decrypted encoded content blocks matches the at least one block of the first plurality of encoded content blocks. 7. The method of claim 1, wherein the comparing comprises comparing each block of the second plurality of decrypted encoded content blocks with at least one block of the first plurality of encoded content blocks. 8. The method of claim 1, wherein the message further comprises information associating the second plurality of encrypted encoded content blocks with the first plurality of encoded content blocks. 9. The method of claim 8, wherein comparing at least one block of the second plurality of decrypted encoded content blocks with at least one block of the first plurality of encoded content block is performed using the information. 10. The method of claim 1, wherein the determining comprises determining that the third party computer system has possession of the first plurality of encoded content blocks and the method further comprises: transmitting the first encryption key to the third party computer system. 11. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor included in a first party computer system, cause the first party computer system to perform a method comprising: receiving a first plurality of encoded content blocks from a second party computer system, the first plurality of encoded content blocks being associated with a plurality of blocks of a piece of content;receiving a message comprising a second plurality of encrypted encoded content blocks and an encrypted first encryption key from a third party computer system, the second plurality of encrypted encoded content blocks being encrypted using the first encryption key, the encrypted first encryption key being encrypted using a second encryption key associated with the first party computer system;decrypting the encrypted first encryption key using the second encryption key to obtain the first encryption key;decrypting the second plurality of encrypted encoded content blocks using the first encryption key to obtain a second plurality of decrypted encoded content blocks;comparing at least one block of the second plurality of decrypted encoded content blocks with at least one block of the first plurality of encoded content blocks; anddetermining whether the third party computer system has possession of the first plurality of encoded content blocks based at least in part on the comparison. 12. The non-transitory computer-readable storage medium of claim 11, wherein the first plurality of encoded content blocks are encoded from the plurality of blocks of the piece of content using an error correction code. 13. The non-transitory computer-readable storage medium of claim 11, wherein a number of blocks of the first plurality of encoded content blocks is less than a number of blocks of the plurality of blocks of the piece of content. 14. The non-transitory computer-readable storage medium of claim 11, wherein a number of blocks of the second plurality of encrypted encoded content blocks is less than a number of blocks of the first plurality of encoded content blocks. 15. The non-transitory computer-readable storage medium of claim 11, wherein the second encryption key comprises a public encryption key associated with the first party computer system. 16. The non-transitory computer-readable storage medium of claim 11, wherein the determining whether the third party computer system has possession of the first plurality of encoded content blocks comprises determining that the at least one block of the second plurality of decrypted encoded content blocks matches the at least one block of the first plurality of encoded content blocks. 17. The non-transitory computer-readable storage medium of claim 11, wherein the comparing comprises comparing each block of the second plurality of decrypted encoded content blocks with at least one block of the first plurality of encoded content blocks. 18. The non-transitory computer-readable storage medium of claim 11, wherein the message further comprises information associating the second plurality of encrypted encoded content blocks with the first plurality of encoded content blocks. 19. The non-transitory computer-readable storage medium of claim 18, wherein comparing at least one block of the second plurality of decrypted encoded content blocks with at least one block of the first plurality of encoded content block is performed using the information. 20. The non-transitory computer-readable storage medium of claim 11, wherein the determining comprises determining that the third party computer system has possession of the first plurality of encoded content blocks and the method further comprises: transmitting the first encryption key to the third party computer system.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (48)
Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.