Method and system for conducting transactions between repositories
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06Q-030/00
G06F-021/10
G06Q-010/10
G06Q-020/12
G06Q-020/36
G06Q-030/02
G06Q-030/04
G06Q-030/06
G06Q-050/18
H04L-012/14
H04L-029/06
H04L-029/12
H04N-007/16
H04N-021/234
H04N-021/254
H04N-021/2543
H04N-021/266
H04N-021/4627
H04N-021/6332
H04N-021/6377
H04N-021/835
H04N-021/8355
H04L-009/32
출원번호
US-0401926
(2006-04-12)
등록번호
US-9953328
(2018-04-24)
발명자
/ 주소
Stefik, Mark J.
Pirolli, Peter L.T.
출원인 / 주소
CONTENTGUARD HOLDINGS, INC.
대리인 / 주소
Rimon P.C.
인용정보
피인용 횟수 :
0인용 특허 :
237
초록▼
A method, system and software for establishing a secure communications channel between repositories using a repository transaction protocol, including generating a registration identifier and registration message including an identification certificate, and an identifier of a master repository that
A method, system and software for establishing a secure communications channel between repositories using a repository transaction protocol, including generating a registration identifier and registration message including an identification certificate, and an identifier of a master repository that encrypted the identification certificate; receiving the registration message and verifying the identity by verifying the identification certificate; validating the authenticity, including, generating a message to test the authenticity, sending the generated message, and verifying if upon receiving the generated message whether the generated message is correctly processed; and exchanging messages including a session key used for communications and transactions including generating a request for a digital work, associating usage rights information with the request for digital work, and determining if the usage rights information associated with the request corresponds to usage rights associated with the digital work. The usage rights define a manner in which the digital work is used or distributed.
대표청구항▼
1. A computer system comprising computer readable media for establishing and utilizing a secure communication channel between repositories for conducting a usage transaction of a digital work, said computer readable media having encoded thereon: an identification certificate of a repository certifie
1. A computer system comprising computer readable media for establishing and utilizing a secure communication channel between repositories for conducting a usage transaction of a digital work, said computer readable media having encoded thereon: an identification certificate of a repository certified by a master repository;an external interface of said repository programmed to establish the secure communication channel using a session initiation transaction protocol, the session initiation transaction protocol including: receiving, at another repository, a registration message, the registration message including the identification certificate of said repository and a registration identifier,validating, at the another repository, the authenticity of said repository by verifying the identification certificate,generating a message to test the authenticity of said repository,sending the generated message to said repository, andverifying if said repository correctly processed the generated message, andexchanging messages including at least one session key between said repository and the another repository, wherein the session key is to be used in communications during a session between said repository and the another repository,said external interface also being programmed to conduct a secure transaction with the another repository, including receiving the digital work; anda processor programmed to conduct the usage transaction, wherein the usage transaction comprises controlling use of the digital work in accordance with usage rights associated with the digital work. 2. The system of claim 1, wherein the secure transaction further includes verifying at the another repository if said repository is allowed to receive said digital work. 3. The system of claim 2, wherein the secure transaction further includes generating at the another repository usage rights that are associated with the digital work. 4. The system of claim 1, wherein said usage transaction comprises one of play, copy and move transactions. 5. The system of claim 1, wherein the message generated to test authenticity includes a nonce. 6. The system of claim 1 wherein the registration identifier is a random registration identifier. 7. A computer implemented method for establishing and utilizing a secure communication channel between repositories for conducting a usage transaction of a digital work, said method comprising: establishing a secure communication channel by an external interface of a repository using a session initiation transaction protocol, the session initiation transaction protocol including: receiving, by another repository, a registration message, the registration message including an identification certificate of said repository and a registration identifier, said identification certificate being certified by a master repository,validating, by the another repository, the authenticity of said repository by: verifying the identification certificate,generating a message to test the authenticity of said repository,sending the generated message to said repository, andverifying if said repository correctly processed the generated message, andexchanging messages including at least one session key between said repository and the another repository, wherein the session key is to be used in communications during a session between said repository and the another repository, conducting a secure transaction with the another repository by said external interface of said repository, including receiving the digital work; andconducting the usage transaction by a processor, wherein the usage transaction comprises controlling use of the digital work in accordance with usage rights associated with the digital work. 8. The method of claim 7, wherein said step of conducting a secure transaction further includes verifying at the another repository if said repository is allowed to receive said digital work. 9. The method of claim 8, wherein said step of conducting a secure transaction further includes generating at the another repository usage rights that are associated with the digital work. 10. The method of claim 7, wherein said step of conducting a usage transaction comprises conducting one of play, copy and move transactions. 11. The system of claim 7, wherein the message generated to test authenticity includes a nonce. 12. The system of claim 7 wherein the registration identifier is a random registration identifier. 13. A computer implemented method for establishing and utilizing a secure communication channel between a first repository and a second repository for conducting a usage transaction of a digital work, the method comprising: establishing a secure communication channel with an external interface of the second repository using a session initiation transaction protocol, the session initiation transaction protocol including: receiving, by the first repository, a registration message, the registration message including an identification certificate of the second repository and a registration identifier, the identification certificate being certified by a master repository,validating, by the first repository, the authenticity of the second repository by: verifying the identification certificate,generating a message to test the authenticity of the second repository,sending the generated message to the second repository, andverifying whether the second repository correctly processed the generated message, andsending, to the second repository, and receiving, from the second repository, messages including at least one session key, wherein the session key is to be used in communications during a session between the second repository and the first repository,conducting, by the first repository, a secure transaction with the external interface of the second repository, including transmitting the digital work to the second repository; andconducting, by a processor of the first repository, the usage transaction, wherein the usage transaction comprises controlling use of the digital work in accordance with usage rights associated with the digital work. 14. The method of claim 13, wherein the step of conducting a secure transaction further includes verifying at the first repository whether the second repository is allowed to receive the digital work. 15. The method of claim 14, wherein the step of conducting a secure transaction further includes generating at the first repository usage rights that are associated with the digital work. 16. The method of claim 13, wherein the step of conducting a usage transaction comprises conducting one of play, copy and move transactions. 17. The method of claim 13, wherein the message generated to test authenticity includes a nonce. 18. The method of claim 13, wherein the registration identifier is a random registration identifier. 19. The method of claim 13, wherein the first repository is a source repository and the second repository is a sink repository. 20. The method of claim 13, wherein the step of establishing a secure communication channel with an external interface of the second repository using a session initiation transaction protocol occurs before a request for digital content is received. 21. A computer implemented method for establishing and utilizing a secure communication channel between a first repository and a second repository for conducting a usage transaction of a digital work, the method comprising: establishing, by an external interface of a second repository using a session initiation transaction protocol, a secure communication channel, the session initiation transaction protocol including: sending a registration message to the first repository, the registration message including an identification certificate of the second repository and a registration identifier, the identification certificate being certified by a master repository,proving the authenticity of the second repository to the first repository by: receiving a message generated by the first repository to test the authenticity of the second repository when the first repository verifies the identification certificate,processing the generated message, andsending the result to the first repository, andsending, to the first repository, and receiving, from the first repository, messages including at least one session key, wherein the session key is to be used in communications during a session between the second repository and the first repository,conducting, by the external interface of the second repository, a secure transaction with the first repository, including receiving the digital work by the second repository; andparticipating, by the second repository, in the usage transaction conducted by a processor of the first repository by rendering the digital work and neither retaining it nor transmitting it to another system, wherein the usage transaction comprises controlling use of the digital work in accordance with usage rights associated with the digital work. 22. The method of claim 21, wherein the first repository verifies whether the second repository is allowed to receive the digital work during the secure transaction. 23. The method of claim 22, wherein usage rights that are associated with the digital work are generated by the first repository during the secure transaction. 24. The method of claim 21, wherein the step of conducting a usage transaction comprises conducting one of play, copy and move transactions. 25. The method of claim 21, wherein the message generated to test authenticity includes a nonce. 26. The method of claim 21, wherein the registration identifier is a random registration identifier. 27. The method of claim 21, wherein the first repository is a source repository and the second repository is a sink repository. 28. The method of claim 21, wherein the step of establishing, by an external interface of a second repository using a session initiation transaction protocol, a secure communication channel occurs before a request for the digital work is sent.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (237)
Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
Beetcher Robert Carl ; Corrigan Michael Joseph ; Reardon ; Jr. Francis Joseph ; Moran James William, Apparatus and method for controlling access to software.
Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
Bain James M. (Beavercreek OH) Best David J. (Miamisburg OH) Globig James E. (Hamilton OH) Lamprecht ; Jr. Dale E. (Dayton OH) Markham James G. (Spring Valley OH) Stellwag Debra A. (Dayton OH), Barcode identification system spooler.
Barnes Vera L. (Wayne PA) Dodds ; Jr. Thomas J. (Drexel Hill PA) Gibson Harold F. (Downington PA) Campbell ; Jr. Carl M. (Newtown Square PA), Communications line authentication device.
Lindman Richard S. (3708 17th Ave. South Minneapolis MN 55407) Lindman Richard P. (7625 18th Ave. South Richfield MN 55423) Myers Edward D. (4440 Denton Way Inver Grove Heights MN 55075), Computer security system.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus for creating and using program authorization information data structures.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA), Conditional object creating system having different object pointers for accessing a set of data structure objects.
Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Controlled dissemination of digital information.
Downer Robert R. (Medfield MA) Noonan Richard C. (Belmont MA) Dalke David M. (Marlborough MA), Controlling machine operation with respect to consumable accessory units.
Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
Akiyama Ryota,JPX ; Hasebe Takayuki,JPX ; Yoshioka Makoto,JPX, Information distribution system wherein storage medium storing ciphered information is distributed.
Okano Hirokazu (1-8-6 ; Kurakake Asakita-Ku ; Hiroshima-shi ; Hiroshima JPX), Information processing system using error-correcting codes and cryptography.
Lessin Arlen R. (New York NY) Gruppuso Frank M. (Commack NY) Harrison Shelley A. (Dix Hills NY), Intelligent portable interactive personal data system.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Johnson Donavon W. (Georgetown TX) Morgan Stephen P. (Mahopac NY) Smith Todd A. (Austin TX), Maintenance of file attributes in a distributed data processing system.
Musyck Emile P. (Geel BEX) Binard Luc A. (Mol BEX) Coupe Bernard G. (Tournai BEX), Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereo.
Hamilton Jeffrey S. (Doylestown PA) Kauffman Marc (Ft. Washington PA) Vince Lawrence D. (Lansdale PA), Method and apparatus for controlling access to digital signals.
Cichelli Richard J. (Allentown PA) Thompson Michael O. (Bethlehem PA), Method and apparatus for digital serial scanning with hierarchical and relational access.
Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
Cooper Thomas E. (Louisville CO) Nagda Jagdish (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted file.
Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
Vigarie Jean-Pierre,FRX, Method and equipment for allocating to a television program, which is already conditionally accessed, a complementary conditional access.
Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
Yuval Gideon A. (Mercer Island WA) Ernst Michael (Redmond WA), Method and system for controlling unauthorized access to information distributed to users.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
Ye Shin-Ju,FRX ; Rabiller Philippe,FRX ; Keskes Naamen,FRX, Method for automatic detection of planar heterogeneities crossing the stratification of an environment.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Sudama Ram (Hudson MA) Griffin David M. (Maynard MA) Johnson Brad (Westerly RI) Sealy Dexter (Boston MA) Shelhamer James (Maynard MA) Tallman Owen H. (Lunenburg MA), Method for providing a security facility for a network of management servers utilizing a database of trust relations to.
Griffeth Nancy D. (Westfield NJ) Velthuijsen Hugo (Den Haag NLX), Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure cryptographic operations using control vectors generated inside a cryptographic facility.
Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Audebert Yves (Croissy-sur-Seine FRX) Delahaye Achille (Fontenay-sous-Bois FRX), System and individual device for participation in a broadcast program.
Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Shelton William Anthony ; Healy William R. ; Jones Joseph Francis Earl ; Issac Samuel, System for collecting and presenting real-time weather information on multiple media.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
Asip William F. (340 E. 52nd St. New York NY 10022) Bartha Miklos L. (11 Meade Ave. Passaic NJ 07055), System for remote monitoring and data transmission over non-dedicated telephone lines.
Volk Larry N. (3320 Royce Ct. Las Vegas NV), System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expir.
Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Aldous Stephen C. (Salt Lake City UT) Dake Guy M. (Sandy UT), Systems for connection of physical/electrical media connectors to computer communications cards.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Pavlov Leonidas P. (Colorado Springs CO) Aba-Jbara Nabil M. (Colorado Springs CO), Unitary, self-contained card verification and validation system and method.
Abraham Dennis G. (Concord NC) Henningsmeyer Daniela (Stuttgart VA DEX) Hudson John M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Stevens Jam, User defined function facility.
Cohen Jason M. (20 Skookwams Ct. West Islip NY 11795), Video communications system having a remotely controlled central source of video and audio data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.