System and method for controlling access rights to and security

Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713200, 705 76, G06F 1760

Patent

active

060980567

ABSTRACT:
A system and method for limiting access to and preventing unauthorized use of an owner's digital content stored in an information network and available to clients under authorized conditions. The network includes at least one server coupled to a storage device for storing the limited access digital content encrypted using a random-generated key, known as a Document Encryption Key (DEK). The DEK is further encrypted with the server's public key, using a public/private key pair algorithm and placed in a digital container stored in a storage device and including as a part of the meta-information which is in the container. The client's workstation is coupled to the server for acquiring the limited access digital content under the authorized condition. A Trusted Information Handler (TIH) is validated by the server after the handler provides a data signature and type of signing algorithm to transaction data descriptive of the purchase agreement between the client and the owner. After the handler has authenticated, the server decrypts the encrypted DEK with its private key and re-encrypts the DEK with the handler's public key ensuring that only the information handler can process the information. The encrypted DEK is further encrypted with the client's public key personalizing the digital content to the client. The client's program decrypts the DEK with his private key and passes it along with the encrypted content to the handler which decrypts the DEK with his private key and proceeds to decrypt the content for displaying to the client.

REFERENCES:
patent: 4827508 (1989-05-01), Shear
patent: 4977594 (1990-12-01), Shear
patent: 5050213 (1991-09-01), Shear
patent: 5436972 (1995-07-01), Fischer
patent: 5557518 (1996-09-01), Rosen
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5590199 (1996-12-01), Krajewski et al.
patent: 5621797 (1997-04-01), Rosen
patent: 5629980 (1997-05-01), Steifik et al.
patent: 5642419 (1997-06-01), Rosen
patent: 5878139 (1999-03-01), Rosen
patent: 5889868 (1999-03-01), Moskowitz et al.
patent: 5892900 (1999-04-01), Ginter et al.
Schneier, Bruce. "Applied Cryptography: Protocols, Algorithms, and Source code in C" 2d. (New York: John Wiley & Sons, Inc., Jan. 1996) pp. v & 21-27.
Lawton, George. Intellectual-Property Protectioon Opens Path for E-commerce. "Computer" IEEE Computer Societyu, vol. 33, No. 2 (Feb. 2000) 14-17 & 21.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for controlling access rights to and security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for controlling access rights to and security , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for controlling access rights to and security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-673419

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.