A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authenti
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
대표청구항▼
1. A computer-implemented method for protecting electronic content, the method comprising the steps of: storing an asymmetric decryption key that is associated with a digital electronic container;receiving client device footprint data from a client device;creating a re-key value using both the clien
1. A computer-implemented method for protecting electronic content, the method comprising the steps of: storing an asymmetric decryption key that is associated with a digital electronic container;receiving client device footprint data from a client device;creating a re-key value using both the client device footprint data and the storedan asymmetric decryption key that is associated with a digital electronic container; andproviding the re-key value to the client device for re-keying content data provided byof the electronic digital container at the client device wherein a predetermined data block of the content data storescontains a symmetric decryption key, the predetermined data block and storedthe symmetric decryption key being previously encrypted using an asymmetric key technique, and wherein the content data is arranged into data blocks including the predetermined data block. 2. The computer-implemented method of claim 1, wherein all of the data blocks are encrypted using a systematicsymmetric key technique. 3. The computer-implemented method of claim 1, wherein the digital electronic container is configured with executable instructions that are configured to execute at the client device to combine the client device footprint data and the re-key value to create a fingerprint key, the fingerprint key for decrypting the predetermined data block thereby providing access to the symmetric decryption key. 4. The computer-implemented method of claim 1, wherein the step of providing the re-key value to the client device includes sending the re-key value as part of a permission token. 5. The computer-implemented method of claim 4, wherein the permission token includes a fingerprint key. 6. The computer-implemented method of claim 1, wherein the step of receiving receives user input data and the step of creating produces a fingerprint key. 7. The computer-implemented method of claim 6, wherein the user input data includes any one or more of: financial transaction data, expiration data, an email address, demographic data, financial data, account data, credit data, a social security number and identifying data. 8. The computer-implemented method of claim 1, wherein the step of creating uses a container identifier associated with the digital electronic container to produce a fingerprint key. 9. The computer-implemented method of claim 8, wherein the providing step sends the re-key value and the fingerprint key as part of a permission token. 10. A computer program product comprising computer executable instructions embodied on a non-transitory computer readable storage medium that when read and executed by a computer processor executes the following steps: storing an asymmetric decryption key that is associated with a digital electronic container;receiving client device footprint data from a client device;creating a re-key value using both the client device footprint data and the storedan asymmetric decryption key that is associated with a digital electronic container; andproviding the re-key value to the client device for re-keying content data provided by the digital electronic container to the client device wherein a predetermined data block of the content data storescontains a symmetric decryption key, the predetermined data block and storedthe symmetric decryption key being previously encrypted using an asymmetric key technique, and wherein the content data is arranged into data blocks including the predetermined data block. 11. The computer program product claim 10, wherein all of the data blocks are encrypted using a systematicsymmetric key technique. 12. The computer program product of claim 10, wherein the digital electronic container is configured with executable instructions that are configured to execute at the client device to combine the client device footprint data and the re-key value to create a fingerprint key, the fingerprint key for decrypting the predetermined data block thereby accessing the symmetric decryption key. 13. The computer program product of claim 10, wherein the step of providing the re-key value to the client device includes providing the re-key value as part of a permission token. 14. The computer program product of claim 13, wherein the permission token includes a fingerprint key. 15. The computer program product of claim 10, wherein the step of receiving receives user input data and the step of combining produces a fingerprint key. 16. The computer program product of claim 15, wherein the user input data includes any one or more of: financial data, account data, credit data, a social security number and identifying data.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (116)
Anoop Gupta ; David M Bargeron, Accessing annotations across multiple target media streams.
Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
Walker Jay S. ; Lech Robert R. ; Van Luchene Andrew S. ; Sparico Thomas M. ; Jorasch James A. ; Schneier Bruce, Conditional purchase offer management system for event tickets.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Parks,M. Jay; Peinado,Marcus; Helin,Jonas Fredrik; Strom,Clifford P., Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication.
Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, Method of processing an E-mail message that includes a representation of an envelope.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Janacek, Robert; Muchhala, Mahesh, Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Blumenthal Michael S. ; Barthel Daniel J. ; Newman Bruce ; Newman Brenda S., Secured electronic information delivery system having a three-tier structure.
Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
Uchida Wataru,JPX ; Nozaki Tsutomu,JPX, System for broadcasting electronic mails that separately stores and sends a portion of electronic mails with an access code for filtering and retrieving purpose.
Kupka,Michael S.; Hawkins,Michael L.; Thomas,Trent M., System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Mourad,Magda M.; Munson,Jonathan P.; Nadeem,Tamer; Pacifici,Giovanni; Pistoia,Marco; Youssef,Alaa S., Transparent digital rights management for extendible content viewers.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.