Electrical computers and digital processing systems: multicomput – Computer-to-computer data modifying – Compressing/decompressing
Reexamination Certificate
1999-06-18
2003-09-30
Jaroenchonwanit, B. (Department: 2141)
Electrical computers and digital processing systems: multicomput
Computer-to-computer data modifying
Compressing/decompressing
C707S793000
Reexamination Certificate
active
06629150
ABSTRACT:
BACKGROUND
1. Field
The present invention relates to the field of data security. More particularly, this invention relates to a platform and corresponding method for preventing digital information from unauthorized observation, manipulation and/or distribution by users, applications, and machines.
2. General Background
Due to advances in digital processing technology and growing usage of networks and the Internet the distribution of digital information is increasing in popularity. In general, one consumption model of digital information involves the sale of software applications, software games, videos, still images, audio recordings, text documents and/or other forms of digital information. For example, software vendors are using the Internet to sell and/or provide software in a digital format to its customers upon credit card confirmation. Other distribution models include pay-per-view, rent-to-own, subscriptions and the like.
To protect the digital information, software vendors and other information providers have relied on encryption and decryption technology. While this technology protects the digital information during distribution, it is unable to protect the digital information once received by an open, programmable digital platform (e.g., computer, set-top box, etc.) of the customer. For example, the digital information cannot be prevented from being observed by unauthorized users, manipulated (e.g., copied, altered, etc.) by a malicious program during playback, or even replicated for subsequent distribution by customers themselves. The reason is that encryption and decryption technology does not have any conditional access mechanisms to enforce rules of usage associated with the decrypted digital information.
It is appreciated that the inability to protect the digital information once in possession of the customer has greatly impeded the distribution of digital content that has intellectual and commercial value associated with it. Therefore, it would be desirable to create a platform and method for protecting digital information by binding security attributes to the digital information itself.
SUMMARY
Briefly, in one embodiment, the invention relates to a platform comprising a processor and a memory device. The memory device includes code executable by the processor. When executed, the code produces a container archive by compressing a combined result of digital information and a signed archive manifest associated with the digital information. The code also comprises a combination of a signed container manifest and the container archive forming a digital container.
REFERENCES:
patent: 5191613 (1993-03-01), Graziano et al.
patent: 5218637 (1993-06-01), Angebaud et al.
patent: 5373561 (1994-12-01), Haber et al.
patent: 5473692 (1995-12-01), Davis
patent: 5568552 (1996-10-01), Davis
patent: 5712914 (1998-01-01), Aucsmith et al.
patent: 5757919 (1998-05-01), Herbert et al.
patent: 5870754 (1999-02-01), Dimitrova et al.
patent: 5907619 (1999-05-01), Davis
patent: 5937411 (1999-08-01), Becker
patent: 5983295 (1999-11-01), Cotugno
patent: 5983348 (1999-11-01), Ji
patent: 6047318 (2000-04-01), Becker et al.
patent: 6067416 (2000-05-01), Fraser
patent: 6088747 (2000-07-01), Cotugno et al.
patent: 6098056 (2000-08-01), Rusnak et al.
patent: 6170058 (2001-01-01), Kausik
patent: 6195794 (2001-02-01), Buxton
patent: 6199072 (2001-03-01), Jian et al.
patent: 6256668 (2001-07-01), Slivka et al.
patent: 6272674 (2001-08-01), Holiday, Jr.
patent: 6282535 (2001-08-01), Pham et al.
patent: 6286051 (2001-09-01), Becker et al.
patent: 6311273 (2001-10-01), Helbig et al.
patent: 6314468 (2001-11-01), Murphy et al.
patent: 6415385 (2002-07-01), Cotugno et al.
patent: 892521 (1999-01-01), None
Johnson, The bean box: Sun;s Java beans test container, Sep. 1997, javaworld.com, 6 pages.*
Zheng “Universal Hash Function in Randomness Extraction and Message authentication” 7/98, ieee.org, 6 pages.*
SSH X.509 certificates tools white paper, 03/99, version 2, pp. 1-15.*
Smith, “Securing the Future of Java” 04/97, Javaworld, 3 pages.*
Jaworski, JAVA 1.1, 1997, Samsnet, second edition, 24 pages.*
Dell et al., “Manifest formal”, 3/99, Sun Microsystems Inc., 7 pages.*
Tackett et al., “Using Linux”, 1998, forth edititon, 33 pages.
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Jaroenchonwanit B.
LandOfFree
Platform and method for creating and using a digital container does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Platform and method for creating and using a digital container, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Platform and method for creating and using a digital container will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3042999