Computer system and process for accessing an encrypted and self-

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380255, 380287, 713150, 713182, 713189, 713190, 713200, H04L 900

Patent

active

060527803

ABSTRACT:
Some of these problems with digital information protection systems may be overcome by providing a mechanism which allows a content provider to encrypt digital information without requiring either a hardware or platform manufacturer or a content consumer to provide support for the specific form of corresponding decryption. This mechanism can be provided in a manner which allows the digital information to be copied easily for back-up purposes and to be transferred easily for distribution, but which should not permit copying of the digital information in decrypted form. In particular, the encrypted digital information is stored as an executable computer program which includes a decryption program that decrypts the encrypted information to provide the desired digital information, upon successful completion of an authorization procedure by the user. In combination with other mechanisms that track distribution, enforce royalty payments and control access to decryption keys, the present invention provides an improved method for identifying and detecting sources of unauthorized copies. Suitable authorization procedures also enable the digital information to be distributed for a limited number of uses and/or users, thus enabling per-use fees to be charged for the digital information.

REFERENCES:
patent: 4120030 (1978-10-01), Johnstone
patent: 4168396 (1979-09-01), Best
patent: 4262329 (1981-04-01), Bright et al.
patent: 4278837 (1981-07-01), Best
patent: 4306289 (1981-12-01), Lumley
patent: 4319079 (1982-03-01), Best
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4433207 (1984-02-01), Best
patent: 4465901 (1984-08-01), Best
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4847902 (1989-07-01), Hampson
patent: 4864616 (1989-09-01), Pond et al.
patent: 4888798 (1989-12-01), Earnest
patent: 4888800 (1989-12-01), Marshall et al.
patent: 4937861 (1990-06-01), Cummins
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5007082 (1991-04-01), Cummins
patent: 5021997 (1991-06-01), Archie et al.
patent: 5027396 (1991-06-01), Platteter et al.
patent: 5033084 (1991-07-01), Beecher
patent: 5081675 (1992-01-01), Kittirutsunetorn
patent: 5144659 (1992-09-01), Jones
patent: 5155827 (1992-10-01), Ghering
patent: 5155847 (1992-10-01), Kirouac et al.
patent: 5166886 (1992-11-01), Molnar et al.
patent: 5191611 (1993-03-01), Lang
patent: 5220606 (1993-06-01), Greenberg
patent: 5222133 (1993-06-01), Chou et al.
patent: 5272755 (1993-12-01), Miyaji et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5313521 (1994-05-01), Torii et al.
patent: 5325433 (1994-06-01), Torii et al.
patent: 5327563 (1994-07-01), Singh
patent: 5337357 (1994-08-01), Chou et al.
patent: 5341429 (1994-08-01), Stringer et al.
patent: 5351293 (1994-09-01), Michener et al.
patent: 5351297 (1994-09-01), Miyaji et al.
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5379433 (1995-01-01), Yamagishi
patent: 5392351 (1995-02-01), Hasebe et al.
patent: 5394469 (1995-02-01), Nagel et al.
patent: 5396609 (1995-03-01), Schmidt et al.
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5414850 (1995-05-01), Whiting
patent: 5442699 (1995-08-01), Arnold et al.
patent: 5473687 (1995-12-01), Lipscomb et al.
patent: 5490216 (1996-02-01), Richardson, III
patent: 5497423 (1996-03-01), Miyaji
patent: 5509074 (1996-04-01), Choudhury et al.
patent: 5511123 (1996-04-01), Adams
patent: 5524072 (1996-06-01), Labaton et al.
patent: 5532920 (1996-07-01), Hartrick et al.
patent: 5555304 (1996-09-01), Hasebe et al.
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5563946 (1996-10-01), Cooper et al.
patent: 5592549 (1997-01-01), Nagel et al.
patent: 5598470 (1997-01-01), Cooper et al.
patent: 5615264 (1997-03-01), Kazmierczak et al.
patent: 5625692 (1997-04-01), Herzberg et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5638445 (1997-06-01), Spelman et al.
InterTrust Technologies Corporation, "Technology Overview", (12/24/96), pp. 1-2.
Olin Sibert, et al., "Securing the Content, Not the Wire, for Information Commerce", (12/24/96), pp. 1-12.
Lloyd Chrein, "Products Right Copyright Wrongs", (12/18/96), pp. 1-4.
Global Village Publishing, Inc., "Folio Publisher 4.0", (12/24/96), pp. 1-6.
Publication Rights Clearinghouse, "National Writers Union and the UnCover Company Create Copyright Model for Electronic Database Industry", (12/26/96), p. 1.
Patel, Tara, "International Firms Press for Encryption Software Pact", Tribune Business News (1/30/96), pp. 1-2.
Cryptolope Containers, "Welcome to the Cryptolope Showcase", (10/23/96), pp. 1-9.
Philip E. Rose, "Cops Versus Robbers in Cyberspace", Forbes (9/9/96), pp. 134-139.
Damon Darlin, "Intel's Palace", Forbes (9/9/96), pp. 42-43.
Lisa Gubernick, "I Didn't Want to be a Digit Head", Forbes (9/9/96), pp. 80, 84.
"A Place to Chat", Forbes (9/9/96), pp. 168, 170-171.
Business Wire, "Zoran Receives DVD Copy Protection Software License From CSS; License Expected to Rapidly Accelerate", (6/3/97), pp. 1-2.
J. Scott Carr, "Digimarc Watermarking Technology Receives U.S. Patent", Business (6/11/97), pp. 1-2.
Wilson, David, "San Jose, Calif., Start-Up Could Put Music Retail Business OnLine", San Jose Mercury News (6/16/97), pp. 1-6.
Carey Nachenberg, Computer Virus-Coevolution Communications of the ACM, (Jan. 1997), vol. 40, No. 1, pp. 46-51.
Wilson, David, "Startup's Product May Prevent Piracy," San Jose Mercury news, (6/15/97).
Jacobs, R. "Tequila -A Cocktail of Viral Tricks," Virus Bulletin, (June 1991), pp. 16-17.
Skulason, F. "Virus Encryption Techniques," Virus Bulletin, (Nov. 1990), pp. 13-16.
Messmer, Ellen, "Satan Bug Virus on the Loose in Government Computers," Network World, (Oct. 11, 1993), p. 25.
Daly, James, "The Newest Virus Threat," ComputerWorld, (Aug. 17, 1992), p. 37.
Konigs, H.-P., "Cryptographic Identification Methods for Smart Cards in the Process of Standardization," IEEE Communication Magazine, vol. 29, No. 6, Jun. 1991, pp. 42-48.
"Data Masking Algorithm," IBM Technical Disclosure Bulletin, vol. 32, No. 6B, Nov. 1989.
"Information Distribution via ROM Disks," IBM Technical Disclosure Bulletin, vol. 33, No. 12, May 1991.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer system and process for accessing an encrypted and self- does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer system and process for accessing an encrypted and self-, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system and process for accessing an encrypted and self- will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2345504

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.