Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Patent
1997-11-24
2000-08-01
Trammell, James P.
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
713200, 705 76, G06F 1760
Patent
active
060980567
ABSTRACT:
A system and method for limiting access to and preventing unauthorized use of an owner's digital content stored in an information network and available to clients under authorized conditions. The network includes at least one server coupled to a storage device for storing the limited access digital content encrypted using a random-generated key, known as a Document Encryption Key (DEK). The DEK is further encrypted with the server's public key, using a public/private key pair algorithm and placed in a digital container stored in a storage device and including as a part of the meta-information which is in the container. The client's workstation is coupled to the server for acquiring the limited access digital content under the authorized condition. A Trusted Information Handler (TIH) is validated by the server after the handler provides a data signature and type of signing algorithm to transaction data descriptive of the purchase agreement between the client and the owner. After the handler has authenticated, the server decrypts the encrypted DEK with its private key and re-encrypts the DEK with the handler's public key ensuring that only the information handler can process the information. The encrypted DEK is further encrypted with the client's public key personalizing the digital content to the client. The client's program decrypts the DEK with his private key and passes it along with the encrypted content to the handler which decrypts the DEK with his private key and proceeds to decrypt the content for displaying to the client.
REFERENCES:
patent: 4827508 (1989-05-01), Shear
patent: 4977594 (1990-12-01), Shear
patent: 5050213 (1991-09-01), Shear
patent: 5436972 (1995-07-01), Fischer
patent: 5557518 (1996-09-01), Rosen
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5590199 (1996-12-01), Krajewski et al.
patent: 5621797 (1997-04-01), Rosen
patent: 5629980 (1997-05-01), Steifik et al.
patent: 5642419 (1997-06-01), Rosen
patent: 5878139 (1999-03-01), Rosen
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 5892900 (1999-04-01), Ginter et al.
Schneier, Bruce. "Applied Cryptography: Protocols, Algorithms, and Source code in C" 2d. (New York: John Wiley & Sons, Inc., Jan. 1996) pp. v & 21-27.
Lawton, George. Intellectual-Property Protectioon Opens Path for E-commerce. "Computer" IEEE Computer Societyu, vol. 33, No. 2 (Feb. 2000) 14-17 & 21.
Rusnak David J.
Zientara John T.
International Business Machines - Corporation
Meyers Steven J.
Redmond, Jr. Joseph C.
Trammell James P.
Young John Leonard
LandOfFree
System and method for controlling access rights to and security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for controlling access rights to and security , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for controlling access rights to and security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-673419