Cryptography – Cryptanalysis
Patent
1994-09-27
1995-04-25
Gregory, Bernarr E.
Cryptography
Cryptanalysis
380 23, 380 25, 380 49, 380 50, 327525, H04L 932, G06F 1314
Patent
active
054105986
ABSTRACT:
A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which .disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user's site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.
REFERENCES:
patent: 3573747 (1971-04-01), Adams et al.
patent: 3609697 (1971-09-01), Blevins
patent: 3796830 (1974-03-01), Smith
patent: 3798359 (1974-03-01), Feistel
patent: 3798360 (1974-03-01), Feistel
patent: 3798605 (1974-03-01), Feistel
patent: 3806882 (1974-04-01), Clarke
patent: 3829833 (1974-08-01), Freeny, Jr.
patent: 3906448 (1975-09-01), Henriques
patent: 3911397 (1975-10-01), Freeny, Jr.
patent: 3924065 (1975-12-01), Freeny, Jr.
patent: 3931504 (1976-01-01), Jacoby
patent: 3946220 (1976-03-01), Brobeck et al.
patent: 3956615 (1976-05-01), Anderson et al.
patent: 3958081 (1976-05-01), Ehrsam et al.
patent: 3970992 (1976-07-01), Boothroyd et al.
patent: 4048619 (1977-09-01), Forman, Jr. et al.
patent: 4071911 (1978-01-01), Mazur
patent: 4112421 (1978-09-01), Freeny, Jr.
patent: 4120030 (1978-10-01), Johnstone
patent: 4168396 (1979-09-01), Best
patent: 4196310 (1980-04-01), Forman et al.
patent: 4200913 (1980-04-01), Kuhar et al.
patent: 4209787 (1980-06-01), Freeny, Jr.
patent: 4217588 (1980-08-01), Freeny, Jr.
patent: 4220991 (1980-09-01), Hamano et al.
patent: 4232193 (1980-11-01), Gerard
patent: 4232317 (1980-11-01), Freeny, Jr.
patent: 4236217 (1980-11-01), Kennedy
patent: 4253157 (1981-02-01), Kirschner et al.
patent: 4262329 (1981-04-01), Bright et al.
patent: 4265371 (1981-05-01), Desai et al.
patent: 4270182 (1981-05-01), Asija
patent: 4278837 (1981-07-01), Best
patent: 4305131 (1981-12-01), Best
patent: 4306289 (1981-12-01), Lumley
patent: 4319079 (1982-03-01), Best
patent: 4323921 (1982-04-01), Guillou
patent: 4328544 (1982-05-01), Baldwin et al.
patent: 4337483 (1982-06-01), Guillou
patent: 4361877 (1982-11-01), Dyer et al.
patent: 4375579 (1983-03-01), Davida et al.
patent: 4433207 (1984-02-01), Best
patent: 4434464 (1984-02-01), Suzuki et al.
patent: 4442486 (1984-04-01), Mayer
patent: 4446519 (1984-05-01), Thomas
patent: 4454594 (1984-06-01), Heffron et al.
patent: 4458315 (1984-07-01), Uchenick
patent: 4462076 (1984-07-01), Smith, III
patent: 4462078 (1984-07-01), Ross
patent: 4471163 (1984-09-01), Donald et al.
patent: 4484217 (1984-11-01), Block et al.
patent: 4494156 (1985-01-01), Kadison et al.
patent: 4513174 (1985-04-01), Herman
patent: 4528588 (1985-07-01), Lofberg
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4553252 (1985-11-01), Egendorf
patent: 4562306 (1985-12-01), Chou et al.
patent: 4562495 (1985-12-01), Bond et al.
patent: 4577289 (1986-03-01), Comerford et al.
patent: 4584641 (1986-04-01), Guglielmino
patent: 4588991 (1986-05-01), Atalla
patent: 4589064 (1986-05-01), Chiba et al.
patent: 4593353 (1986-06-01), Pickholtz
patent: 4593376 (1986-06-01), Volk
patent: 4595950 (1986-06-01), Lofberg
patent: 4597058 (1986-06-01), Izumi et al.
patent: 4634807 (1987-01-01), Chorley et al.
patent: 4644493 (1987-02-01), Chandra et al.
patent: 4646234 (1987-02-01), Tolman et al.
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4658093 (1987-04-01), Hellman
patent: 4670857 (1987-06-01), Rackman
patent: 4677434 (1987-06-01), Fascenda
patent: 4680731 (1987-07-01), Izumi et al.
patent: 4683553 (1987-07-01), Mollier
patent: 4685056 (1987-08-01), Barnsdale et al.
patent: 4688169 (1987-08-01), Joshi
patent: 4691350 (1987-09-01), Kleijne et al.
patent: 4696034 (1987-09-01), Wiedemer
patent: 4701846 (1987-10-01), Ikeda et al.
patent: 4712238 (1987-12-01), Gilhousen et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4740890 (1988-04-01), William
patent: 4747139 (1988-05-01), Taaffe
patent: 4757533 (1988-07-01), Allen et al.
patent: 4768087 (1988-08-01), Taub et al.
patent: 4791565 (1988-12-01), Dunham et al.
patent: 4827508 (1989-05-01), Shear
patent: 4977594 (1990-12-01), Shear
patent: 5010571 (1991-04-01), Katznelson
patent: 5103392 (1992-04-01), Mori
Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, Privacy and Authentication: An Introduction to Cryptography, Whitfield Diffie and Martin E. Hellman, pp. 397-427.
Digest of Papers, VLSI: New Architectural Horizons, Feb. 1980, Preventing Software Piracy With Crypto-Microprocessors, Robert M. Best, pp. 466-469.
IEEE Transactions on Information Theory, vol. 22, No 6, Nov. 1976, New Directions in Cryptography, Whitfield Diffie and Martin E. Hellman, pp. 644-651.
Kent, "Protecting Externally Supplied Software In Small Computers" (MIT/LCS/TR-255 Sep. 1980).
"Encapsulation: An Approach to Operating System Security", Bisbey, II et al. Oct. 1973, pp. 666-675.
"Encryption Methods in Data Networks", Blom et al, Ericsson Technics, No. 2, 1978; Stockholm, Sweden.
First CII Honeywell Bull International Symposium on Computer Security and Confidentiality, Jan. 26-28, 1981, Conference Text, pp. 1-21.
Codercard, Spec. Sheet--Basic Coder Subsystem, No Date Given.
"Micro Card"--Micro Card Technologies, Inc., Dallas, Texas, No Date Given.
"A Method Of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques", Scnaumueller-Bichl et al, No Date Given.
I "The New Alexandria" No. 1, Alexandria Institute, pp. 1-12, Jul.-Aug. (1986).
Denning et al, "Data Security", 11 Computing Surveys No. 3, Sep. 1979.
Electronic Publishing Resources, Inc.
Gregory Bernarr E.
LandOfFree
Database usage metering and protection system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Database usage metering and protection system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Database usage metering and protection system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1573493