AU715638B2 - System and method for access control for data storage media - Google Patents

System and method for access control for data storage media Download PDF

Info

Publication number
AU715638B2
AU715638B2 AU62595/96A AU6259596A AU715638B2 AU 715638 B2 AU715638 B2 AU 715638B2 AU 62595/96 A AU62595/96 A AU 62595/96A AU 6259596 A AU6259596 A AU 6259596A AU 715638 B2 AU715638 B2 AU 715638B2
Authority
AU
Australia
Prior art keywords
access
data
controller
recited
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU62595/96A
Other versions
AU715638C (en
AU6259596A (en
Inventor
Janet Lynn Dolphin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spyrus Inc
Original Assignee
Spyrus Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU76874/94A external-priority patent/AU694742C/en
Priority claimed from US08/485,817 external-priority patent/US5677953A/en
Application filed by Spyrus Inc filed Critical Spyrus Inc
Priority to AU62595/96A priority Critical patent/AU715638C/en
Publication of AU6259596A publication Critical patent/AU6259596A/en
Publication of AU715638B2 publication Critical patent/AU715638B2/en
Application granted granted Critical
Publication of AU715638C publication Critical patent/AU715638C/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/109Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Description

SYSTEM AND METHOD FOR ACCESS CONTROL FOR DATA STORAGE MEDIA Field of the Invention The present invention relates to providing access to data stored on a portable data storage unit or access to a remote or local server. More particularly, it relates to a system for delivering encrypted data on a portable data storage unit or server and transmitting an access code from a remote location to decrypt the encrypted data.
Background of the Invention As advances in data high density storage technology continue to progress, more homes and business are acquiring computer peripherals capable of reading the new forms of portable data storage media. For example, high-density media such as compact disc read only memory (CD- ROM) is becoming a popular medium for storing advanced forms of electronic O information such as textual, visual (video or photographs) and audio information as well as interactive media. CD-ROMs contain enough storage space to hold the equivalent of 250,000 pages of text, 12,000 images, hours of video, 500 paperback books or 430 magazines. Moreover, CD-ROM technology supports an extremely cost effective replication feature averaging $0.05 per replicated CD. CD-ROM players can be coupled to television sets or o• computers so that the user can access textual and visual information as well -1- WO 96/41445 PCTIUS96/09393 as audio information stored on a CD-ROM. Moreover, more homes and businesses are linking their computers to on-line services and networks such as the Internet.
It is common practice for most publishers to collect and process their information electronically, that is, on word processors and computers. Their data is maintained in electronic form until it is time to mail it to the subscriber.
At that time, the information is printed, subscribers mail labels are attached and the published information is sent via a postal service to the subscriber.
Under this system, the costs of printing and delivery are extremely high.
Moreover, environmental concerns have necessitated the need to consider paper a critical resource. Accordingly, the need for a new publishing medium has been recognized. For example, see U.S. Patent Nos. 4,827,508, 4,977,594 and 5,050,213, issued May 2, 1989, December 11, 1990 and September 17, 1991 respectively to Shear.
Subscription services to the home and office through standard postal channels provide subscribers with magazines, trade journals, financial updates and book of the month clubs. These subscription services require the user (subscriber) to pay a fixed amount either in advance or monthly. During the time which the subscription is valid, the publisher continues to mail its information to that subscriber. Moreover, any single user may be the subscriber of a multitude of journals or magazines. It is also likely a single subscriber may hold subscriptions to several magazines published by the same publisher.
Also other types of published or archived information, such as corporate, government, or legal records, are printed on paper for dissemination. When disseminated, such records may inadvertently or intentionally be read by those unauthorized to do so since there is no way to insure that the reader is -2- P:\OPER\SSB\62595-96. RES 23/11/99 -3authorized to access to printed matter. Moreover, since some published corporate or legal information is subject to constant updates which renders the previously published material obsolete, it is preferable but often difficult to purge dated material from circulation.
Again referring to the Shear patents, these systems audit or meter a user's access activity. Because a key to unlock encrypted data is present on the user's hardware such as a PCMCIA card, the decryption function is inhibited at the user's site in order to prevent unauthorized access to the data. Thus, according to the systems of Shear, access to the information on the portable storage medium, such as a CD- ROM, is available to a user without prior authorization for access. Therefore, there is no way to insure that the reader is authorized to access to the information stored on the CD-ROM prior to the user's access. Furthermore, those systems do not provide a way in which access to out-of-date information can be blocked.
The need for protection of information stored on, for example, CD-ROMs, or one a local or remote server from unauthorized access needs to be satisfied before such a publication distribution system is acceptable to publishers. Security provided at both ~the publisher's site and subscriber's site is needed to prevent the unauthorised access 20 to data contained on the media. Moreover, valid subscribers need to be protected when their subscription service is terminated.
Summary of the invention The present invention provides a system for accessing data by a user, comprising: 25 a processor for processing said data; a data storage unit for storing said data in a manner requiring different access code for accessing correspondingly different data stored on said storage unit by the user; a controller in communication with said processor for receiving a signal representative of one of said different access codes from a remote location and for W sending a signal which enables access by said processor means to a selected portion P:\OPER\SSB\62595-96. RES 23/11/99 -3Aof said data on said storage unit using one of said access codes; a remote authorization unit located at a location remote from said processor and said controller, said remote authorization unit for transmitting an access code to said controller from said remote location in response to an authorization request signal sent by the user to said remote authorization unit; and wherein said data storage unit stores update means cooperative with said transmitted access code for automatically generating updated access codes for access to previously unaccessible parts of said data storage unit when electronic update counter conditions are met.
The present invention also provides a method for distributing data to a user comprising the steps of: on storage unit, providing encrypted data, such requiring an access code to decrypt said data to provide access thereto wherein at least a portion of said encrypted data is correlated with a corresponding access code identifier for identifying access codes; at a remote location, storing a plurality of access codes together with ge. corresponding access code identifiers; at a remote location, generating an authorization signal when particular *20 conditions are met, wherein said authorization signal causes one of said access codes •to be transmitted to said user to enable said user to access a portion of said encrypted data by decrypting a portion of said encrypted data and wherein said access conditions include the receipt of one of said access code identifiers from said user; applying said access code to said encrypted data to decrypt a portion of said 25 encrypted data; and processing said decrypted portion of said encrypted data.
S.i* The present invention also provides a method of distributing information in the form of data sets and providing access thereto, comprising the steps of: encrypting said data sets so that different access codes are required to decrypt C different portions of said data sets; Y\ correlating said data sets with access code identifiers which identify particular P:\OPER\SSB\62595-96.RES 23/11/99 -3Baccess codes which will decrypt said data sets; writing said data sets on a data storage unit; providing a data storage controller which is capable of applying said access codes to said data storage means; remotely providing a data access controller with one of said different access codes to decrypt a selected one of said encrypted data sets in response to the receipt of one of said access code identifiers; said data access controller accessing said data sets written onto said data storage means; and wherein said access codes are further stored with attributes defined in a manner which corresponds to particular properties of said data sets, both of which are transmitted to said data access controller in response to the receipt of one of said access code identifiers.
The present invention also provides a system for encrypting data, comprising: a memory medium including programming codes stored thereon for encrypting individual data sets and for assigning access code identifiers to said individual data sets, each of said access code identifiers associated with and used in identifying a particular access code for decrypting one of said individual data sets, said access code 20 identifier for identifying said particular access code; a processor in communication with said memory medium for writing said encrypted individual data sets to a data storage unit so that at least some of said individual data sets are stored in conjunction with access code identifiers on said data storage unit; and 25 a remote access code distribution controller for transferring a particular one of l said access codes for use with a particular one of said portable data storage means on receipt of one of said access code identifiers from a second location.
Of* The present invention also provides a method for encrypting data sets to control 30 access thereto, comprising the steps of: defining said attributes in a manner which corresponds to particular properties p:\OPER\SSB\62595-96. RES 23/11/99 -3C *Q 0 0 0* 0 of said data sets; binding said attributes to access codes and storing them in a first location; encoding said data sets so they may be decrypted by said access codes when said access codes signal are applied to said data sets by a processor; storing said encoded data sets on a data storage unit; transmitting to a second location from said first location one of said access codes bound to one of said attributes.
The present invention also provides a data retrieval system for use by a user comprising: a data storage unit including data stored thereon including portions selected by said user, said selected portions on said data storage unit being accessible by a set of access codes, wherein one of said set of access codes is transmitted by a remote central processing unit to a user at a different location, such transmitted to said user to provide access to said selected portions of said data stored on said data storage unit; and wherein said data storage unit includes update means cooperative with said transmitted access codes for automatically generating updated access codes for access to previously unaccessible parts of said selected portions of said data on said 20 data storage unit when electronic update counter conditions are met.
The present invention also provides a system for providing authentication of electronic transmissions, comprising: an authorization center for transmitting access codes to different locations upon 25 receipt of authenticated requests for said access codes, wherein one of said access codes is electronically transmitted to a different location when said authenticated request meets particular electronic signature conditions; and a controller at said different location for receiving said access codes from said authorization center, said controller capable of verifying that said access code was transmitted from said remote authorization center.
Ih.
.0.0 0 00 000 00 *x vs~ P:\OPER\SSB\62595-96.RES 23/11/99 -3r The present invention also provides a method for providing authentication of electronic transmissions, comprising the steps of: providing an authorization center for transmitting access codes to different locations upon receipt of authenticated requests for said access codes, wherein one of said access codes is electronically transmitted to a different location when said authenticated request meets particular electronic signature conditions; and providing a controller at said different location for receiving said access codes from said authorization center, said controller capable of verifying that said access code was transmitted from said remote authorization center.
The present invention also provides a system for controlling access by a user to a plurality of sets of electronic content, comprising: a data storage device for storing each of the plurality of sets of electronic content in an encrypted form such that a predetermined access code is required for accessing each of the plurality of sets of electronic content stored in the data storage device, and for storing a plurality of access code identifiers that each correspond to an access code; a user access apparatus, comprising: a processor, wherein the processor can be operated in response to an 20 access code to enable access to a corresponding set of encrypted electronic content stored in a data storage device; a controller, the controller further comprising: t ~means for communicating with a remote authorization unit, wherein an access code identifier can be transmitted to a remote 25 authorization unit and an access code can be received from a remote authorization unit; means for communicating with a processor, wherein instructions .can be transmitted to a processor to control operation of the processor in accordance with an access code; and S* 30 means for communicating with a data storage device via a network, wherein an access code identifier can be retrieved from a data J storage device via the network in response to a user instruction, the P:\OPER\SSB\62595-96.RES -23/11/99 3E access code identifier so retrieved being transmitted to a remote authorization unit by means for communicating with a remote authorization unit; and with a remote authorization unit located at a location remote from the processor and the controller, the remote authorization unit further comprising: means for communicating with a controller; means for storing access codes; means for identifying an access code corresponding to an access code identifier received by the remote authorization unit from a controller; and means for causing the identified access code to be transmitted to the controller from which the access code identifier was received.
The present invention also provides a system for controlling access by a user to a plurality of sets of electronic content, comprising: a data storage device for storing each of the plurality of sets of electronic content in an encrypted form such that a predetermined access code is required for accessing each of the plurality of sets of electronic content stored in the data storage device, and for storing update instructions and an update counter value; 0 a user access apparatus, comprising: a processor, wherein the processor can be operated in response to an access code to enable access to a corresponding set of encrypted electronic content stored in a data storage device; and a controller, the controller further comprising: means for communicating with a remote authorization unit, 25 wherein an access code can be received from a remote authorization unit; means for communicating with a processor, wherein instructions can be transmitted to a processor to control operation of the processor in accordance with an access code; 30 means for communicating with a data storage device via a network, wherein update instructions and an update counter value can be retrieved from a data storage device via the network; and P:\OPER\SSB\62595-96. RES 23/11/99 -3Fmeans for using update instructions and an update counter value to generate an updated access code from an access code previously received from a remote authorization unit, such that the updated access code enables access, without receipt of an additional access code from a remote authorization unit, to an otherwise inaccessible set of electronic content stored in a data storage device.
The present invention also provides a system for controlling access by a user to a plurality of sets of electronic content, comprising: a data storage device for storing each of the plurality of sets of electronic content in an encrypted form such that a predetermined access code is required for accessing each of the plurality of sets of electronic content stored in the data storage device; a user access apparatus, comprising: a processor, wherein the processor can be operated in response to an access code to enable access via a network to a corresponding set of encrypted electronic content stored in a data storage device; a controller, the controller further comprising: means for communicating with a remote authorization unit, 20 wherein an authorization request can be transmitted to a remote "o authorization unit and an access code and a set of attributes can be received from a remote authorization unit; and means for communicating with a processor, wherein instructions can be transmitted to a processor to control operation of the processor o 25 in accordance with an access code, the instructions being transmitted in accordance with the manner defined by a set of attributes corresponding to a set of electronic content being accessed by the processor; and o :ooa remote authorization unit located at a location remote from the processor and the controller, the remote authorization unit further comprising: means for communicating with a controller; t means for storing access codes; means for storing sets of one or more attributes that define a manner in p:\OPER\SSB\62595-96. RES 23/11/99 -3Gwhich a set of electronic content can be accessed, such that at least one set of attributes corresponds to each of the plurality of sets of electoronic content; means for evaluating an authorization request received from a controller to determine whether the authorization request is approved; means for identifying an access code and a set of attributes corresponding to an authorization request; and means for causing the identified access code and set of attributes for an approved authorization request to be transmitted to the controller from which the approved authorization request was received.
There are at least three basic features which are preferably provided by embodiments of the present invention. They include, encryption of data in a particular manner, distribution of the data under a particular distribution scheme and controlling the use of the data through an update scheme. Many benefits are provided by these basic features as will be discussed in detail below.
Preferably, an embodiment of the invention includes publishing data on a removable or portable media, preferably high density, such as a CD-ROM or a *°*magnetic optical (MO) or one a server which is either remote or local and hereinafter is referred to as a server, or alternatively, where only a CD-ROM is mentioned, it must be taken to mean to also include a server. Thus, one or more publishers may incorporate several, if not all of their periodic publications on a single media.
Preferably, an embodiment of the present invention includes partitioning the media according to the different publications into data sets, and then providing a protection, 25 access, and use audit scheme to these data sets. Thus, only validated subscribers are able to gain access to the information stored on the CD-ROM or server.
S
Preferred embodiments of the present invention provide a publisher the tools to configure and set up data and billing according to the publisher's own choice. At the 30 time they create the media, publishers are provided flexibility in billing to charge if' subscribers in accordance with the type of information being sold. This flexibility is P:\OPER\SSB\62595-96.RES 23/11/99 -4incorporated into the publishing process.
The protection and access scheme of an embodiment of the present invention includes providing the publisher with an encryption tool on, for example, a personalized PCMCIA, or other suitable program storage medium such as SmartCard or software stored on the user's machine. In this embodiment of the present invention, when the publisher loads a program stored locally, menu driven options appear on the publisher's computer screen which allow the publisher to define the user's or subscriber's access to the publisher's data. The billing options are also known as "attributes," which include, for example, subscription duration. The billing attributes are associated with Key Material Identifiers (KMIDs), which are in essence, indexes or identifying codes for the purpose of correlating billing attributes with access codes.
Access code and key are used interchangeably herein. An
S
S
*9 S r
C
WO 96/41445 PCT/US96/09393 access code corresponding to a particular segment of data stored on the CD- ROM or server is ultimately downloaded to the subscriber so that they may gain access to the information.
The program stored on the publisher's PCMCIA enables the publisher to encrypt the data so that an access code or key is required to decrypt it. The encrypted or scrambled data along with the KMID is then stored on a portable storage medium or server. Corresponding billing information is also stored in a separate file for the user's review. The CD-ROM is then transferred to the user or the encrypted data is electronically transferred to a server or other data storage unit. The user is also in possession of a PCMCIA, or other suitable storage medium such as SmartCard or software stored on the user's machine has on it software for communicating with the billing/access center and managing downloaded access codes. The user further has available a telephone line or comparable medium such as wireless transmissions, a computer with a modem and peripherals capable of reading the PCMCIA and the CD-ROM or accessing the server.
An application on the user's personal computer enables a menu to appear on the screen of the computer when the user loads the CD-ROM or access the server which contains publisher's data into its reading hardware.
The menu lists, for example, the publications available for sale and the billing information. The user then, via the software stored on the PCMCIA card, requests access to one or more of the publications by highlighting or pointing to a publication for sale and then sending the request to the billing/access center. The KMID or identifying index and required billing data, such as a credit or debit card number, is sent to a remote billing station via the telephone line. The billing station, upon credit approval, matches the KMID to the access code and transmits the key and access parameter, e.g. time of subscription P:\OPER\SSB\62595-96.RES 23/11/99 -6purchased, to the user via the telephone line. The key is then installed on the user's PCMCIA card. The user may then access the particular publication which is accessible by that particular access code or key.
Preferred embodiments of the present invention are described hereinafter, by way of example only, with reference to the accompanying drawings.
Brief Description of the Drawings Figure 1 depicts the overall system of an embodiment of the present invention; Figure 2 shows the user/billing station subsystem of Box 11 of Figure 1; Figure 3 shows the publisher/billing station subsystem of Box 12 of Figure 1; Figure 4 is a schematic showing the information sent to the billing/access centre by the publisher and by the user; Figure 5 is a block diagram of some elements of the publisher's station of an embodiment of the present invention; Figure 6 is a block diagram of the publisher's PCMCIA; i"t, Figure 7 is a flow chart of publisher's billing software; Figure 8 depicts a screen display of attribute choices available during the publisher's utilization of an embodiment of the present invention; 20 Figure 9 depicts a second screen display of security choices available during the publisher's utilization of an embodiment of the present invention; ~Figure 10 shows a list of the type of information stored on the removable media of an embodiment of the present invention; Figure 11 is a block diagram of some elements of the subscribers station of an embodiment of the present invention; Figure 12 is a block diagram of the subscribers PCMCIA; Figure 13 is a flow chart of the subscriber's key request process; Figure 14 is a block diagram of key data base and billing/access centre; Figure 15 is a flow chart of the billing/access centre process; and .K ,N1 0 Figure 16 is a chart illustrating the cryptographic update feature of an X embodiment of the present invention.
Detailed Description of preferred embodiments of the Invention The systems and methods of embodiments of the present invention generally include two subsystems and submethods. The first part of this discussion will focus upon the two subsystems and how they interrelate in order to make the whole system.
The second part of this discussion which begins below, will concentrate on the implementation of each part of the system.
Referring to FIG. 1, box 11 and box 12 are two different portions of the overall system which overlap at box 13. In box 12, the publisher 21 of data is shown. The data can include any type of data which can be stored on a portable storage unit 22 such as, and hereinafter referred to as CD-ROM 22 or a server 25. After the data is generated and before it is stored on the CD- ROM 22 or server 25, it is encrypted or scrambled so that it cannot be accessed without the appropriate access code. Server 25 can provide data stored thereon or provides accessibility via communication with yet another server or any other storage means. The media of distribution therefore can be for example CD-ROM, a bulletin board on the Internet, a floppy disk, a hard drive, electronic mail or any other suitable form. Accordingly, the present invention incorporates standard cryptographic techniques such as symmetric o key encryption, digital signature, asymmetric key exchanges, or challenge response. Alternatively, this invention may utilize any non-standard :cryptographic techniques.
66 After the publisher 21 encodes the data, it communicates certain information to billing/access center 23 shown in box 13, as will be discussed in detail below. The publisher 21 stores the encrypted data on the CD-ROM 22 or server 25 and then distributes the data via distribution channels such as the postal service 24. Of course, distribution includes electronic distribution either by wire or in a wireless manner. For example, methods of distribution include Internet, ISDN, X-400, satellite, electronic mail or any other type of electronic -7-
K
WO 96/41445 PCT/US96/09393 distribution, for example those of distribution channels can also include interoffice distribution, for example, in a corporate, government or legal environment among others. Ultimately, the CD-ROM is received by a user 26 or the electronic data is stored in a location accessible to the user under predetermined conditions as discussed below. The user has a computer (which includes a processor) or a television set or monitor with a processor and a CD-ROM reader. The user's computer is equipped with either a software program and/or hardware which is used to communicate with billing/access center 23 and which has a controller to process the data received from billing/access center 23.
When the user 26 loads the CD-ROM 22 into its CD-ROM reader, the user is presented with a menu on the computer or television monitor or screen which indicates what data is stored on the CD-ROM 22. Similarly, when the user accesses data from a server, the user is presented with a menu which indicates what data is accessible on the server. A portion of the data on the CD-ROM 22 or server 25 may not be encrypted so the user can access that portion without an access code. However, at least a portion of the data, according to the present invention, is encrypted. In order for the user to access the encrypted data, the user must obtain an access code or a key to decrypt the encrypted data. In order to obtain an access code, the user 26 communicates with the billing/access center 23 via connection 27, which is a telephone line or other communication apparatus or device, sending a request for a particular access code. Upon authorization, billing/access center 23 downloads or sends to the user 26 via connection 27, an access code to decrypt the data. Of course, user 26 includes any type of user, including for example, an individual, companies or other computer systems.
FIG. 2 shows the user/billing/access center subsystem in more detail.
As mentioned above, the user's computer is equipped with either a software -8- WO 96/41445 PCTIUS96/09393 program and/or hardware which is used to communicate with billing/access center 23 and which is used control the data received from billing/access center 23. As depicted in FIG. 2, an application to open and provide use "screens" is resident on the machine. Communication is therefore enabled between the PCMCIA card 29 which is loaded into PCMCIA drive 32 and the user operating the computer 31. The PCMCIA card 29 is supplied to user so that the user can provide a request 27' to the billing/access center 23 for an access code to decrypt encrypted data. Upon authorization, billing/access center 23 downloads or sends to the user 26 the access code via connection 27". Connection 27' and 27" can be the same line or transmission means, such including standard electronic mail formats. The access code or key is stored on the user's PCMCIA card 29 for reasons which will become clear below.
Now referring to FIG. 3, the publisher's station 36 consists of a workstation for organizing and gathering information. A writer device to create CD-ROM 35 or store data on server 25 is in communication with the publishers workstation. The publisher is provided its own publisher PCMCIA card 33 on which a software program is stored in order to allow the publisher to define and control access to the data at the time the information is organized for publication on the CD-ROM. Alternatively, hardware can be provided to the publisher in place of software.
The data 34, as mentioned above can include, for example video, image, photographs, databases including those for banking, sound and software, such of course being in digital form for electronic transmission. The data is either generated on or loaded onto the publisher's computer 36. In accordance with the present invention, before the data is stored on the CD- ROM 22 or the server 25, the publisher determines the billing partitions which are based on like data, e.g. singles magazines, single database, group of -9- WO 96/41445 PCT/US96/09393 similar photographs, modules of executable software and single fonts. The publisher also separates the data into different data sets such as files, sub directories, directories and volumes under different symmetric cryptographic keys so that access to each different segment is only possible with a key which matches that data segment.
The billing partitions are categorized according to how the publisher wants to bill for access to the data. Access control to the data set(s) is therefore controlled via the billing or "attribute" mechanism of the present invention. Attributes are assigned to the data sets by the publisher 21 and are bound to the access code which is hereinafter referred to as the key, such used by the user 26 to decrypt the individual data sets. Each individual symmetric key is then bound to or assigned a unique Key Material Identifier (KMID) which will be described in detail below.
The attributes are defined, implemented and used to determine charges for access to the data encrypted by the user 26 prior to access. One example of an attribute is time duration. For example, one CD-ROM may contain a January issue of a magazine. CD-ROMs issued for months following January may contain subsequent issues of the same magazine. The publisher may wish to offer 1 year, 2 year and 3 years subscriptions, as well as a free 1 month trial subscription. These four different time durations constitute four different attributes. Thus, according to the present invention, a cryptographic update process is applied to allow can be access for fixed periods of time depending on which time duration was chosen by the user. A configuration for an attribute is a data structure of variable length containing flags indicating which metric is present and parameters indicating metric values and units.
WO 96/41445 PCT/US96/09393 Other examples of attributes include "one time buy" attribute where the information is purchased once, and all information protected by that key is available to the subscriber. Also included is an "on demand" attribute where the use of the data is monitored based on a publisher defined parameter including number of times the key can be used, the number of transactions, number of bytes or number of files transferred. Moreover, advertising attributes such are available. For example, a "file bypass" attribute allows the publisher to define files or data sets which are bypassed or are in plain text.
Also, a "trial period" attribute allows the user to obtain access to these files for a fixed period of time without a copy or print capability. Applications, such as the trial period, communicates directly with the PCMCIA card to control access to application specific functions, such as copy or print. These applications are modified to support the PCMCIA interface. Furthermore, by a "reduced resolution" attribute, the publisher allows viewing of a particular file without quality resolution. Attributes define access control to the intellectual property stored on the data storage unit and can be according to the user or group of users as the publisher defines. They are also used to define billing or for audit resolution according to time such as a period of time or according to a calendar, in quantities of information such as bytes or in a manner which is user defined. The attributes can be representable by constant values and can also be functions of variables.
After determination of the data partitions by the publisher, and after the publisher defines the attribute to be used with each data set, the attribute is bound with a key and a Key Material Identifier (KMID). The KMID acts as an index or identifying code so that the billing/access center can provide the proper key or access code to open the desired data set. This information is combined by the publisher 21 to create a unique file containing the attribute information for the entire media to be distributed. This information is sent to -11- WO 96/41445 PCT/US96/09393 the billing/access center. The software stored on the PCMCIA card 33 further allows the publisher 21 to encrypt the data and include the attribute and the KMID on the CD or server.
The system of the present invention therefore includes assignment of the key and KMID to a database and the keeping of such information by the billing/access center 23. It further includes the user sending to the billing/access center a particular KMID in order to receive a key to access the desired data. These elements of this system are shown in FIG. 4, where the unique file 37 containing the key, attribute and KMID for each data set is transmitted to the billing/access center 23 which is billing or authorization center 23 by the publisher. This file 37 is downloaded into a central distribution site. Information that needs to be written to the CD-ROM 22 or server 25 is the key start and stop information along with the KMID associated with each particular data set 38. A special "Read-Me" file can be created which allows the subscriber to read information concerning pricing (which match the attributes) for the individual data sets. The "mastered" information is then replicated and distributed by the publisher via any transport method suitable.
Returning to FIG. 2, the user 26 is able to load the CD-ROM into a CD- ROM reader 28 or call up server 25 and read the special "Read-Me" file to see what is available on the portable storage media. When the user 26 has identified a particular data set the user wishes to access, the user 26 uses the PCMCIA card 29 which is loaded into the PCMCIA drive 32 to communicate with the billing/access center, billing/access center 23 a request including the KMID which identifies the desired key via connection 27'. The billing/access center, once having authorized access, downloads via line 27" the key associated with the KMID.
-12- WO 96/41445 PCT/US96/09393 When downloaded, the key may reside on the user's PCMCIA card 29 or on appropriate hardware. The key will access the data set of the instant data storage unit and subsequent data which are distributed in accordance with the limits of the attribute. Therefore, if the attribute indicates a six month time duration as indicated in box 37 and box 38 of FIG. 4, and the first access occurs in January, the user 26 may use the user PCMCIA card 29 through June in order to access the equivalent data set on subsequently distributed CD-ROMs or subsequently stored on the server. After the first use of the key, the subsequent use of the key is maintained and audited by the local user environment, that is, through the user PCMCIA card 29.
In order to provide for limited time duration attributes, the present invention utilizes "key zeroization" (also called "key cancellation") which occurs when an attribute condition is met or can be remotely invoked by the billing/access center. For example, an attribute condition having been met would include the passage of time which is monitorable by a time clock. Since updated data is released periodically, keys are derived from the originally generated key through a cryptographic update process. This feature allows the publisher to distribute its periodic information under a different key which is derived from the last key based on a cryptographic operation. The number of updates valid for a subscriber is encoded in the KMID/attribute information.
The cryptographic update process of the present invention is described in detail below and with reference to FIG. 16.
The user's PCMCIA card 29 is used to audit and maintain the count of updates provided by the publisher. Each CD-ROM contains information about the update release of a particular KMID as well as time stamping information used by the user's PCMCIA card 29 for time based key management functions.
A clock can also be installed on the PCMCIA card.
-13- WO 96/41445 PCT/US96/09393 The zeroization feature of the present invention provides the advantage that the access of, for example, corporate, government or legal records which are frequently updated can be avoided or stopped. By using a key which.
zeroizes after one or only a few reviews of the data or after a short time duration, the publisher insures that out-of-date frequently updated records will not be confused with current records.
The user's PCMCIA card 29 is also used to authenticate the subscriber to the billing/access center. Each subscriber is assigned a unique public/private key pair to be used in all transmissions, such being stored on the user's PCMCIA card 29. Different users key pairs or personalities allow the user to sign purchase orders or to make purchase requests with the appropriate personalities. This feature is important in the situation where a single person holds, whether temporary or permanently, several different offices. For example, the president of a company may sign a separate request as a purchasing agent but may sign a separate access request, with different privileges, as president of the company. Accordingly, this invention supports the authentication of different user personalities, as defined by the subscriber, to provide electronic purchase authorizations. Furthermore, each user PCMCIA card 29 contains a unique Pin Phrase to validate the user and their use of the personalities and cryptographic functions of the card at the user's site or through an optional challenge/response system.
When an individual wishes to gain access to files stored on the CD- ROM or server, the key must be resident on the card, that is, already purchased. If not, the subscriber must create a purchase request and send this request to the billing/access center. All requests containing payment methods, e.g. credit card numbers, are encrypted in the public/private key pair.
All purchase requests can be also be signed by the appropriate authorizing personality before the billing/access center will process any purchase request.
-14- WO 96/41445 PCT/US96/09393 In the situation where a purchase is not made, that is, where inter-office distribution of CD-ROM to provide corporate, government or legal information in-house, the authentication feature is especially desirable. Unauthorized access to sensitive information is more easily avoided in accordance with the present invention than when information is disseminated on printed media.
To recap, referring to FIG. 1, at the billing/access center 23 the request 27 is received in the form of, for example, electronic mail. The mail is received and the signature is validated to authenticate the source of the request.
Included with the mail message is the requested KMID (see FIG. This is then used as a look up index into a large database containing the stored cryptographic keys. Under one embodiment of the present invention, the following steps occur. The billing/access center 23 obtains the publisher defined attributes assigned to the KMID from the database and provides this information to the requester. The requester is then allowed to select a form of payment for the key which is sent to the billing/access center. The billing/access center then validates the payment method and authorization.
The KMID and its binded attributes are then sent to the user. At the user's site, the KMID and attributes are loaded onto the user PCMCIA card 29 for control of access and for audit purposes by the card. The user now has access to the purchased information. The KMID and use of the keys according to the publisher's definition is monitored and maintained by the user's PCMCIA card 29. As mentioned above, when an attribute condition is met, e.g. the subscriber has reached the number of purchase bytes or the time has expired, the user's PCMCIA card 29 will automatically zeroize with respect to that publication. Further access by the user will require another call to the billing/access center 23.
WO 96/41445 PCT/US96/09393 The above discussion described in detail general features of the subsystems of present invention and how they relate to one another. The following discussion repeats some of the above discussion with less of an emphasis of the interrelationship of the elements of the present invention, but with more of an emphasis on the components and method steps of the elements of the present invention.
As discussed above, by logically grouping and categorizing the publisher's information, the publisher can then define the billing and advertising functions associated with the data sets to be published. After the publisher gathers all information that is intended for publication on a particular
CD-ROM
of series of CD-ROMs or for storage on any type of data storage unit, the information is then be assigned the access and subscription attributes defined by the present invention. A standard publisher's configuration is shown in the block diagram of FIG. 5. There the publisher's workstation 36 is shown on which to gathering and organizing information. The publisher is provided with billing premastering software 41 for such organization wherein the premastering is for the distribution media as discussed above. In communication with the workstation is the CD-ROM writer driver 35 to create the CD-ROM. Finally, the key data base 42 which is stored at publisher's site contains the used keys and their alias', history and current attribute definitions.
The key database 42 also contains a list of unused keys which the publisher can use and define the attributes for such unused keys. The keys are generated by a key management center and are preferably random. They are then assigned KMIDs y the key management center. After the publisher defines the use of a particular key, that information is sent to the remote billing/access center 23.
16- WO 96/41445 PCT/US96/09393 The encryption device 43 is stored on the publisher's PCMCIA card 33 shown in Figure 6. Each publisher is assigned a unique and personal
PCMCIA
card 33 which contains, in a FLASH or EEPROM non-volatile memory 44, the publishers personalities and provides audit information about data published and its author. The personalities of the publisher are similar to those of the user as described above. The non-volatile memory 44 further contains the publisher's unique storage variable used as part of the password algorithm. The non-volatile memory, per key, further stores information relating to purchased keys such as KMIDs, stores use (billing/audit data) and stores access codes. The aforementioned information can be stored on the publisher's PCMCIA card and are encrypted by this local key. Additionally, the publisher's workstation automatically records the CD-ROM identification and KMIDs used to publish a particular CD-ROM. This audit data is stored and maintained by the key data base 42.
The digital signature provided by the PCMCIA card 33 assures the billing/access center and/or the subscriber that the published data was in fact published on the CD-ROM by the authorized publisher of that particular information. This feature avoids piracy of copyrighted material, as well as falsified records in the corporate, government and legal environment.
The audit information stored on the publisher's PCMCIA card 33 is auditable from the billing/access center 23. Since there is a transmission line between the billing/access center and the publisher, the billing/access center can access information stored on the publisher's PCMCIA card 33 to analyze the publisher's activity for many purposes, including improving the system.
-17- WO 96/41445 PCT/US96/09393 The PCMCIA card 33 can be a hardware card or a software application for emulating the hardware card functions. As a standard feature, it contains a volatile memory or RAM 46 and a bus interface 47 so that it may communicate with the publisher's computer system 36.
Before the publisher can actually encrypt and/or sign any information to the CD-ROM, it logs onto the PCMCIA card 33 which supports a logon phrase either through the keyboard interface or one which can be directly input to the card reader. The phrase may be any length or any set of ascii characters the publisher assigns. For enhanced security, the publisher may use biometrics (voice) after the logon phrase for a more secure logon which binds the publisher to the card and its resources. The publisher logs onto the card prior to performing any security related functions.
After logon, the publisher may use the resources of the PCMCIA card 33. The card, whether performed as a software function on the publisher's computer 36 or as a separate hardware card, provides all of the cryptographic functions required by the publisher to generate a CD for supporting an electronic subscription service. The encryption for the CD application is performed at the sector level to support random access on large data bases.
The microprocessor 48 operates as the encryption device 43 to allow the publisher to associate files, directories, sub directories, volumes or whole media with a particular symmetric encryption key and is used to execute the encryption. Signature and key exchange algorithms are performed using the public/private key determined by the personality selected. These algorithms are in software for configurability but may also be implemented in hardware on the microprocessor. The microprocessor can be an off the shelf microprocessor. The PCMCIA card 33 operates as a finite state machine.
The publisher application is responsible for synchronization of key attribute definitions back to the remote billing/access center.
-18- WO 96/41445 PCT/US96/09393 The flow chart of FIG. 7 illustrates a series of steps of the present invention, most of which have been described in detail above. After the program starts 51, the data is organized into the data sets to be published on a CD-ROM in step 52. The billing structure for each data set is prepared in step 53. Then, different attributes are associated with the data sets. For example, if time duration is assigned according to decision box 54, the time base is set at step 56 and the attribute is correlated to the data set. Or, the number of bytes of access can be assigned to the data set according to decision box 57, then the number of bytes is set at step 58 and the attribute is correlated to the data set. Or, certain transactions can be defined by the publisher and set according to decision boxes 59 and 61 and then correlated to the data set. After the attributes are created and correlated, new keys are obtained from the key database 42 in step 62. The data is then ready to be encrypted. In step 63 the data is encrypted. In step 64, the key and signature tables are built. In step 66, the entire process is repeated for the next data set. When all of the data has been prepared, step 67 write the key and signature table to the CD and provides for the publisher to update its own records and the billing/access center database records.
FIGS. 8 and 9 are illustrations one of the ways the program is presented to the publisher. This user friendly interface allows the publisher to point, click and drag components for assigning the attributes chosen from the selecter key group of attributes at the bottom of the screen. The file name column represents the intellectual property file format to which the attributes are assigned. The publisher can group similar applications to be encrypted under the same encryption key group 68. If the publisher does not want portions of particular data sets encrypted, the publisher may select bypass step 69 so that any hypertext or key word searches associated with the file will not be -19- WO 96/41445 PCT/US96/09393 encrypted. This is particularly useful if the subscriber wants to determine the number of incidents of a particular word or transaction before buying the data base.
After the publisher determines the key group associates and the level of encryption, the publisher is provided with a second set of menus for defining the billing attributes for the key group. FIG. 9 is an example of the type of interface provided to the user to set security defaults for the key group. These include but are not limited to: consecutive units of user access days, months or years; key start of user defined application turn on date; key expiration; total time of user access minutes, hours, days; total units transferred in bytes, words, or user defined transactions; and total user logons. Key alias can be defined for easier key identification.
These options are available on a new (unused) key or already aliased keys (used). After these attributes are determined by the publisher, the premastering software will update the publisher key database 42 with these parameters. Should the publisher be using an existing alias the publisher has the option to apply a cryptographic update process to this key. The process is defined by using a known fixed constant and mathematically applying this constant (via an exclusive or function) to the old key.
All updates are maintained with a key counter, which are associated with the key. This allows the publisher and subscriber to maintain synchronized keys and update counter which is published monthly with the published material. Subscription access is controlled via the number of updates allowed during the period of time purchased by the subscriber.
WO 96/41445 PCT/US96/09393 The key manager or data base 42 (see FIG. 5) will maintain an audit/history file of the KMIDs used with the individual CD-ROMs created by a publisher. After the CD-ROM is created the key manager 42 will automatically call the publisher's billing/access center and download the configured attribute information.
The CD-ROM (or whatever distribution media is utilized in accordance with this invention) contains information about the start and stop information for the associated KMIDs. This information is maintained in a separated table that can be located anywhere on the CD-ROM. FIG. 10 illustrates such a table. The publisher's digital signature file 70a contains signed data files Other files which have been discussed above including publisher's information the encryption algorithm information 70d, the update algorithm information the advertisement information relating to the publishing data 70f, and the key and signature table 70g are also included on the CD-ROM.
The key and signature table 70g contain the information about the KMIDs used in creating this media. Most importantly, this table contains the stop and start information for the KMIDs used.
Turning to FIG. 11, many of the features shown in FIG. 2 are again shown, but in block diagram form. However, audit/decrypt device and call up application 71 are distinguished from the user's computer 31. This device can either be on the user's PCMCIA card 29 or can be separate hardware or software installed on the user's computer 31.
The user's PCMCIA card 29 includes a standard bus interface 72 and RAM 73. The non-volatile memory includes such features as described above, such as personalities and audit functions. The microprocessor 76 includes an encryption/decryption, signature, key exchange algorithm.
-21 WO 96/41445 PCT/US96/09393 The operation by the user of the features on the user's PCMCIA card 29 is shown in the flow chart of FIG. 13. After the start 77 of the sequence of events, in step 78 the user orders subscription service to obtain periodically distributed media. In step 79, the user receives the CD-ROM by, for example, mail and loads the card and the CD-ROM. On the user's computer screen, the user views information stored on the CD-ROM similar that shown FIG. 10. In step 81 the user develops and signs an electronic mail request for a key and sends it to the billing/access center. In step 82, after having been authenticated and authorized, the user obtains the key via e-mail from the billing/access center. In step 83, the key is stored on the user's PCMCIA card 29. The card further maintains an audit log of the user's activity according to the attributes configured. This audit can be accessed by the billing/access center remotely in order to monitor use for several purposes. For example, the use is audited to provide publishers information as to how many times, after a subscription is published, the user views the same publication. Finally, in step 84, the user accesses the file of choice.
Referring to FIG. 14, features of the billing/access center 23 are shown in block diagrams. Features already discussed include the remote links 27 to both the users and the publishers. Access to the key management system include modem for on-line access, telephone, electronic mail, bulletin boards and other access means. The bulk key data base 85 keeps keys to be distributed to the publishers for their use in encrypting data. The subscriber data base 86 includes lists of all subscribers and certain information about them obtained prior to or after their use of the system or through audits. The publisher data base 87 contains the publisher's use of the keys and their associated KMIDs as well as attributes. The bulletin board 88 holds messages which are incoming from subscribers and publishers. It is also available to send messages to both the publishers and the subscribers telling them of new features of the system or other information.
-22- WO 96/41445 PCT/US96/09393 The billing/access center process starts 89 by polling the bulletin board or incoming call for incoming requests from subscribers. In step 92, the billing/access center reads the electronic request and authenticates the subscriber by checking the electronic signature of the message. In step 93, from the KMID provided by the request, it makes a match to the attributes to provide billing information. Optionally, the billing/access center can communicate with the user in step 94 to provide billing options to the user, such as time payments or offers not indicated on the CD-ROM menu. When the billing is settled, in step 95, the billing/access center validates the subscriber's payment method and receives a purchase order from the user. If the signature or the payment method are not satisfactory, the billing/access center denies the key and log attempt in step 96. If they are satisfactory, the key is downloaded to the user's PCMCIA card 29 in step 97. In step 98, the billing/access center queries for more requests. If there are none, it downloads the audit file, obtains the current user KMID audit file from the card in step 99 and updates the subscribers database 97 and updates the publisher's account in steps 100 and 101 respectively. If the response is yes to the query of step 98, the system returns to step 93 and begins the process over again, but with respect to a different data file and KMID.
The billing/access center's communication with the user can be interactive as described above, or it can be configured so that it a request is sent and it is either approved or denied. In any event, the billing/access center receives the KMID and if authorization is achieved, the key is sent to the user to access the data stored on the CD-ROM.
As discussed briefly above, the cryptographic update process provides a way in which access to out-of-date information or issues released beyond a subscriber's time period is blocked. The cryptographic update process is yet another flag in the attribute data structure. The publisher of a monthly or bi- -23- WO 96/41445 PCT/US96/09393 weekly periodical will publish a large amount of information regularly for what can be a very long period time (years). The publisher of periodicals will have subscribers to their service receiving this data. The subscriber joins and is downloaded with a key that is valid for a period of time that their subscription service is online. However, this puts the publisher in a very vulnerable position, if the same key is used for all encryption during the life of the publication. The objective of the remote cryptographic update process is to allow the publisher of a periodical to ship each periodical under a different encryption key each month without having to download a new key to their current set of subscribers.
Ideally, the publisher will distribute the information encrypted under a different key each month. This protects the publisher's information from an external attacker determining their key and obtaining all of their publications.
However, this implies that a subscriber would be required to download a new key each month, for example. This may be very cumbersome to the subscriber. The system of the present invention defines the use of a user site cryptographic update that is applied to the current (or monthly) key to "generate" a new key based on the previous month's key. Since all cards understand the algorithm to be used for the update process, they derive the same key value. The publisher is aware of the algorithm and uses it to generate the updated key value for the encryption process. If a publisher puts out material monthly, they would perform a monthly "update" on the key for each new publication. When the subscriber obtains the new CD-ROM, an update counter of the CD-ROM or stored on the data storage unit tells the user's PCMCIA how many updates have been performed. The update counter is used to maintain synchronization between publisher and subscriber.
24 WO 96/41445 PCT/US96/09393 For example, turning to FIG. 16, there is shown a one year subscription service period to illustrate the cryptographic update process for subscription service where a periodic key provides updates to the instant key each publication. The twelve months are identified in column 106. Each month has a different key associated with it as shown in column 107, such indicated as KA, KB, and so on. "Subscriber One" indicated in column 108 is shown as having a six month subscription starting in the second month of the year.
"Subscriber One" receives key K 8 to access the data distributed in the second month. The update process as described above updates key K 6 through a mathematical operation where the update process, U, acts on the previous month's key. For example, when U acts on KB, K c
UK
8 Moreover, when the CD for the third month of the subscription becomes available, U acts on K c so that K D
UK
c UUKB. K 0 through K G are generated in the same manner.
Thus, through the cryptographic update process of the present invention, "Subscriber One" receives a set of keys which operate to access the issues between month two and month seven. A different subscriber, "Subscriber Two" as indicate by column 109, also has a six month subscription, however, it begins in the fourth month and receives key K
D
The update process of the present invention updates key K 0 so that U acts on K
D
KE UK,. Moreover, when the CD for the third month of the subscription becomes available, U acts on KD so that KF UKE UUK
D
K
G through K, are generated in the same manner. Thus, while "Subscriber One" and "Subscriber Two" have their subscriptions during different time periods which overlap, they use the same keys to access the overlapping months through the update process. The process of the generation of the access codes from the initially downloaded key for access to a certain portion of the year's issues through a monthly update, allows the publisher to provide subscription service starting at different times and having different lengths, without providing access to more data than WO 96/41445 PCT/US96/09393 the authorized service. The KMID parameters define the number of updates purchased. In the example of FIG. 16, the KMID would define five updates for both users.
Thus, the present invention includes a data retrieval system for use by a user which includes a server or a plurality of portable data storage means, such as CD-ROMs, wherein each of which includes data stored on certain ones of the plurality of CD-ROM, for example, issues of a particular publication which is sequentially distributed. Portions of the data on the server or the CD- ROMs is selected by the user which are accessible by a set of access codes K. to KG) which is part of a larger group of access codes KA to KL) wherein one of the set of access codes is a transmitted access code, such transmitted to said user by the billing/access center. To access previously unaccessible or unavailable data on a server or ones of the plurality of CD- ROMs, the server or CD-ROMs include a code which is cooperative with the transmitted access code for generating updated access codes for access to other data on the server or data on other certain ones of the plurality of CD- ROMs.
The update process uses the current key (the one used in the months of the publication). To this key a fixed an known constant is mathematically applied, for example, exclusive OR'd, to the current key. The resultant value from the mathematical operation is used as the decryption key for the next publication. All keys with update attributes are maintained with their update counter. This allows the user to synchronize their keys even if they missed one or two publications. This process occurs at the subscriber's site. The publisher performs the same functions and applies the same value to generate the new encryption key. The information is encrypted with the newly updated key. The encryption information and the update counter attribute, which is unencrypted, is recorded onto the server or CD-ROM for distribution.
-26- P:\OPER\SSB\62595-96.RES 23/11/99 -26A Throughout this specification and the claims which follow, unless the context requires otherwise, the word "comprise", and variations such as "comprises" and "comprising", will be understood to imply the inclusion of a stated integer or step or group of integers or steps but not the exclusion of any other integer or step or group of integers or steps.
O
0 0
S

Claims (12)

1. A system for accessing data by a user, comprising: a processor for processing said data; a data storage unit for storing said data in a manner requiring different access code for accessing correspondingly different data stored on said storage unit by the user a controller in communication with said processor for receiving a signal representative of one of said different access codes from a remote location and for sending a signal which enables access by said processor means to a selected portion of said data on said storage unit using one of said access codes; a remote authorization unit located at a location remote from said processor and said controller, said remote authorization unit for transmitting an access code to said controller from said remote location in response to an authorization request signal sent by the user to said remote authorization unit; and wherein said data storage unit stores update means cooperative with said transmitted access code for automatically generating updated access codes for access to previously unaccessible parts of said data storage unit when electronic update counter conditions are met.
2. A system as recited in Claim 1 wherein said updated access codes are generated by said controller.
3. A system as recited in Claim 1 wherein each of said access codes is correlated with an identifying code and wherein said authorization request includes said identifying code. -27-
4. A system as recited in Claim 3 wherein said identifying code is representative of an attribute. A system as recited in Claim 4 wherein said attribute is representative of a use of said data.
6. A system as recited in Claim 1 wherein said controller is a hardware configuration.
7. A system as recited in Claim 1 wherein said controller is a software configuration.
8. A system as recited in Claim 1 wherein said data stored on said data storage unit includes identifying codes for identifying said data.
9. A system as recited in claim 8 wherein said identifying codes are codes associated with attributes. i S
10. A system as recited in claim 9 wherein said attribute is representative of an Sallowed use of said data. 15 11. A system as recited in Claim 8 wherein said authorization request includes one of said identifying codes. S.
12. A method for distributing data to a user comprising the steps of: on a storage unit, providing encrypted data, such requiring an access .•code to decrypt said data to provide access thereto wherein a least a portion i0 of said encrypted data is correlated with a corresponding access code identifier S for identifying access codes;
28- at a remote location, storing a plurality of access codes together with corresponding access code identifiers; at a remote location, generating an authorization signal when particular conditions are met, wherein said authorization signal causes one of said access codes to be transmitted to said user to enable said user to access a portion of said encrypted data by decrypting a portion of said encrypted data and wherein said access conditions include the receipt of one of said access code identifiers from said user; applying said access code to said encrypted data to decrypt a portion of said encrypted data; and processing said decrypted portion of said encrypted data. 13. A method as recited in Claim 12 wherein on said data storage unit, update means are stored, such cooperative with said one transmitted access code for generating updated access codes for access to previously unaccessible parts of said data on said data storage unit. 14. A method as recited in Claim 13 wherein said updated access codes are D generated by a controller. 15. A method as recited in Claim 12 wherein said authorization signal is S0generated in response to an authorization request by said user, such including 20 said access code identifier.
916. A method as recited in Claim 12 wherein said access code identifier is representative of an attribute. 17. A method as recited in claim 16 wherein said attribute is representative of an allowed use of said data. 0 0 -29- 18. A method as recited in Claim 12 wherein said applying step is carried out by hardware configuration. 19. A method as recited in Claim 12 wherein said applying step is carried out by software configuration. 20. A method as recited in Claim 12 wherein said data stored on said data storage unit include identifying codes associated with different portions of said data. 21. A method as recited in Claim 20 wherein said identifying codes are correlated with attributes. 22. A method as recited in claim 21 wherein said attributes are representative of an allowed use of said data. 23. A method of distributing information in the form of data sets and providing access thereto, comprising the steps of: encrypting said data sets so that different access codes are required to QO 15 decrypt different portions of said data sets; S: correlating said data sets with access code identifiers which identify particular access codes which will decrypt said data sets; writing said data sets on a data storage unit; providing a data storage controller which is capable of applying said access codes to said data storage means; remotely providing a data access controller with one of said different access codes to decrypt a selected one of said encrypted data sets in •T °response to the receipt of one of said access code identifiers; said data access controller accessing said data sets written onto said data storage means; and C" 4 F- wherein said access codes are further stored with attributes defined in a manner which corresponds to particular properties of said data sets, both of which are transmitted to said data access controller in response to the receipt of one of said access code identifiers. 24. A method as recited in Claim 23 wherein said data storage unit stores update means cooperative with said access codes for generating updated access codes for access to previously unaccessible parts of said data on said data storage unit. A method as recited in Claim 24 wherein said updated access codes are generated by said controller. 26. A method as recited in claim 23 wherein said attributes are representative of an allowed use of said data. 27. A system for encrypting data, comprising: a memory medium including programming codes stored thereon for 15 encrypting individual data sets and for assigning access code identifiers to said individual data sets, each of said access code identifiers associated with and used in identifying a particular access code for decrypting one of said individual data sets, said access code identifier for identifying said particular access code; 20 a processor in communication with said memory medium for writing said •O encrypted individual data sets to a data storage unit so that at least some of said individual data sets are stored in conjunction with access code identifiers on said data storage unit; and *31 •i!1 31_ *r a a remote access code distribution controller for transferring a particular one of said access codes for use with a particular one of said portable data storage means on receipt of one of said access code identifiers from a second location. 28. A system as recited in Claim 27 wherein said data storage unit stores update means which are cooperative with said access codes for generating updated access codes for access to previously unaccessible parts of said data on said data storage unit. 29. A system as recited in Claim 27 wherein said access code is further associated with an attribute. A system as recited in claim 29 wherein said attribute is representative of an allowed use of said data set. 31. A method for encrypting data sets to control access thereto, comprising the steps of: 15 defining attributes in a manner which corresponds to particular properties of said data sets; binding said attributes to access codes and storing them in a first 00 S: location; :0 0 encoding said data sets so they may be decrypted by said access codes when said access codes signal are applied to said data sets by a processor; storing said encoded data sets on a data storage unit; transmitting to a second location from said first location one of said access codes bound to one of said attributes. 0000 00 32. A method as recited in Claim 31 wherein said attributes are 25 representative of a use of said data. O•••OQ -32- "V" *0 0O 0-i WO 96/41445 PCT/US96/09393 33. A method as recited in Claim 31 wherein said access codes are correlated with identifying codes. 34. A method as recited in Claim 31 wherein access to said encoded data sets of said data storage unit is provided by a remote authorization center and further comprises the step of: providing a controller for communication with said data storage unit and wherein, upon transmitting one of said identifying codes to said remote authorization center, one of said access codes is downloaded to said controller wherein said controller provides access to said data sets stored on said data storage unit. A method as recited in Claim 34 wherein said controller is provided in a hardware configuration. 36. A method as recited in Claim 34 wherein said controller is provided in a software configuration. 37. A method as recited in Claim 34 wherein said data storage unit stores thereon means cooperative with access codes for generating updated access codes for access to previously unaccessible parts of said data stored on said data storage unit. 38. A data retrieval system for use by a user comprising: a data storage unit including data stored thereon including portions selected by said user, said selected portions on said data storage unit being accessible by a set of access codes, wherein one of said set of access codes is transmitted by a remote central processing unit to a user at a different location, such transmitted to said user to provide access to said selected portions of said data stored on said data storage unit; and -33- wherein said data storage unit includes update means cooperative with said transmitted access codes for automatically generating updated access codes for access to previously unaccessible parts of said selected portions of said data on said data storage unit when electronic update counter conditions are met. 39. A system as recited in Claim 38 wherein each of said access codes is correlated with an identifying code and wherein said authorization request includes said identifying code. A system as recited in Claim 39 wherein said identifying code is representative of an attribute. 41. A system as recited in claim 40 wherein said attribute is representative of an allowed.use of said data. 42. A system as recited in Claim 38 wherein said data stored on said data storage unit includes identifying codes for identifying said data. 43. A system as recited in claim 42 wherein said identifying codes are codes S associated with attributes. o 44. A system as recited in claim 43 wherein said attribute is representative of an allowed use of said data. .34. o* S A system for providing authentication of electronic transmissions, comprising: an authorization center for transmitting access codes to different locations upon receipt of authenticated requests for said access codes, wherein one of said access codes is electronically transmitted to a different location when said authenticated request meets particular electronic signature conditions; and a controller at said different location for receiving said access codes from said authorization center, said controller capable of verifying that said access code was transmitted from said remote authorization center. 46. A system as recited in Claim 45 wherein said access codes provide for the decryption of encrypted data stored on a data storage unit. 47. A system as recited in Claim 46 wherein on said data storage unit, update means are stored, such being cooperative with said one transmitted access code for generating updated access codes for access to previously unaccessible parts of said data on said data storage unit. 0 48. A system as recited in Claim 45 wherein said access codes are correlated with an identifying code and wherein said authenticated request includes said identifying code. 49. A system as recited in Claim 48 wherein said identifying code is representative of an attribute. A system as recited in claim 49 wherein said attribute is representative of an allowed use of said data. 'a 00. 51. A system as recited in Claim 45 wherein said controller is a hardware configuration. 52. A system as recited in Claim 45 wherein said controller is a software configuration. 53. A system as recited in Claim 46 wherein said data stored on said data storage unit includes identifying codes for identifying said data. 54. A system as recited in claim 53 wherein said identifying codes are codes associated with attributes. A system as recited in claim 54 wherein said attribute is representative of an 10 allowed use of said data. 56. A method for providing authentication of electronic transmissions, S comprising the steps of: providing an authorization center for transmitting access codes to S different locations upon receipt of authenticated requests for said access 0*0 0 0is codes, wherein one of said access codes is electronically transmitted to a o: different location when said authenticated request meets particular electronic signature conditions; and providing a controller at said different location for receiving said access codes from said authorization center, said controller capable of verifying that said access code was transmitted from said remote authorization center. 0 4 S 57. A method as recited in Claim 56 wherein said access codes provide for S the decryption of encrypted data stored on a data storage unit. 0 -36- 0 0 @0 0 58. A method as recited in Claim 57 wherein on said data storage unit, update means are stored, such being cooperative with said one transmitted access code for generating updated access codes for access to previously unaccessible parts of said data on said data storage unit. 59. A method as recited in Claim 56 wherein said access codes are correlated with an identifying code and wherein said authenticated request includes said identifying code. A method as recited in Claim 59 wherein said identifying code is representative of an attribute. 61. A method as recited in claim 60 wherein said attribute is representative of an allowed use of said data. 62. A method as recited in Claim 56 wherein said controller is a hardware configuration. 0 63. A method as recited in Claim 56 wherein said controller is a software configuration. 64. A method as recited in Claim 56 wherein said data stored on said data storage unit includes identifying codes for identifying said data. A method as recited in claim 64 wherein said identifying codes are codes associated with attributes. 66. A method as recited in claim 65 wherein said attribute is representative of an allowed use of said data. 37- o Jj P:\OPER\SSB\62595-96.RES 23/11/99 -38- 00 *0, 0 00 0 S 0. *r 0* 0 0 0 .C 67. A system for controlling access by a user to a plurality of sets of electronic content, comprising: a data storage device for storing each of the plurality of sets of electronic content in an encrypted form such that a predetermined access code is required for accessing each of the plurality of sets of electronic content stored in the data storage device, and for storing a plurality of access code identifiers that each correspond to an access code; a user access apparatus, comprising: a processor, wherein the processor can be operated in response to an access code to enable access to a corresponding set of encrypted electronic content stored in a data storage device; a controller, the controller further comprising: means for communicating with a remote authorization unit, wherein an access code identifier can be transmitted to a remote authorization unit and an access code can be received from a remote authorization unit; means for.communicating with a processor, wherein instructions can be transmitted to a processor to control operation of the processor in accordance with an access code; and means for communicating with a data storage device via a network, wherein an access code identifier can be retrieved from a data storage device via the network in response to a user instruction, the access code identifier so retrieved being transmitted to a remote authorization unit by the means for communicating with a remote authorization unit; and a remote authorization unit located at a location remote from the processor and the controller, the remote authorization unit further comprising: means for communicating with a controller; means for storing access codes; 30 means for identifying an access code corresponding to an access code identifier received by the remote authorization unit from a controller; and P:\OPER\SSB\62595-96.RES 23/11/99 -39- means for causing the identified access code to be transmitted to the controller from which the access code identifier was received. 68. A system as in claim 67, wherein the remote authorization unit further comprises: means for storing sets of one or more attributes that define a manner in which a set of electronic content can be accessed, such that at least one set of attributes corresponds to each of the plurality of sets of electronic content; means for identifying a set of attributes corresponding to an access code identifier; means for causing the identified set of attributes for an access code identifier to be transmitted to a controller from which the access code identifier was received; and wherein: the instructions transmitted to a processor to control operation of the processor S 15 in accordance with an access code are transmitted in accordance with a manner defined by a set of attributes corresponding to a set of electronic content being accessed by the processor. 69. A system as in claim 67, wherein the data storage device further comprises a server computer. A system as in claim 67, further comprising a plurality of data storage devices with which a user access apparatus can communicate via a network. @000 71. A system as in claim 70, further comprising a plurality of user access apparatus each comprising a controller and processor as recited in claim 67. i- I 72. A system as in claim 67, further comprising a plurality of user access apparatus each comprising a controller and processor as recited in claim 67. Jr; ;a A system as in claim 67, wherein the network further comprises the Internet. P:\OPER\SSB\62595-96.RES -23/11/99 74. A system as in claim 67, wherein one or more of the means for communicating further comprises a wireless communications device or devices. A system for controlling access by a user to a plurality of sets of electronic content, comprising: a data storage device for storing each of the plurality of sets of electronic content in an encrypted form such that a predetermined access code is required for accessing each of the plurality of sets of electronic content stored in the data storage device, and for storing update instructions and an update counter value; a user access apparatus, comprising: a processor, wherein the processor can be operated in response to an access code to enable access to a corresponding set of encrypted electronic content stored in a data storage device; and a controller, the controller further comprising: 15 means for communicating with a remote authorization unit, wherein an access code can be received from a remote authorization unit; o o means for communicating with a processor, wherein instructions can be transmitted to a processor to control operation of the processor S 20 in accordance with an access code; means for communicating with a data storage device via a network, wherein update instructions and an update counter value can e ~be retrieved from a data storage device via the network; and *666 o means for using update instructions and an update counter value 25 to generate an updated access code from an access code previously 0ll received from a remote authorization unit, such that the updated access 666660 6 code enables access, without receipt of an additional access code from a remote authorization unit, to an otherwise inaccessible set of electronic content stored in a data storage device. 30 i P:\OPER\SSB\62595-96. RES 23/11/99 -41- 76. A system as in claim 75, further comprising a remote authorization unit located at a location remote from the processor and the controller, the remote authorization unit further comprising: means for storing access codes; and means for communicating with a controller, wherein an access code can be transmitted to a controller. 77. A system as in claim 76, wherein: the controller's means for communicating with a remote authorization unit enables an authorization request to be transmitted to a remote authorization unit; and the remote authorization unit further comprises: means for evaluating an authorization request received from a controller to determine whether the authorization request is approved; means for identifying an access code corresponding to an 15 authorization request; and means for causing the identified access code for an approved O authorization request to be transmitted to a controller from which the approved authorization request was received. a a, 20 78. A system as in claim 77, wherein the remote authorization unit further comprises: means for storing sets of one or more attributes that define a manner in a. which a set of electronic content can be accessed, such that at least one set of "attributes corresponds to each of the plurality of sets of electronic content; S 25 means for identifying a set of attributes corresponding to an authorization ~a request; means for causing the identified set of attributes for an approved authorization request to be transmitted to a controller from which the approved authorization request was received; and wherein: the instructions transmitted to a processor to control operation of the processor in accordance with an access code are transmitted in accordance P:\OPER\SSB\62595-96.RES 23/11/99 *a S S 0S 0S 9 S S S -42- with a manner defined by a set of attributes corresponding to a set of electronic content being accessed by the processor. 79. A system as in claim 78, wherein: the data storage device also stores a plurality of access code identifiers that each correspond to an access code; the authorization request includes an access code identifier; the controller's means for communicating with a data storage device enables an access code identifier to be retrieved via the network from a data storage device in response to a user instruction, the access code identifier so retrieved being transmitted to a remote authorization unit by the controller's means for communicating with a remote authorization unit; and the remote authorization unit's means for identifying an access code identifies an access code corresponding to the access code identifier that is part of an 15 authorization request received by the remote authorization unit from a controller. 80. A system as in claim 76, wherein: the data storage device also stores a plurality of access code identifiers that each correspond to an access code; the controller's means for communicating with a remote authorization unit enables an access code identifier to be transmitted to a remote authorization unit; the controller's means for communicating with a data storage device enables an access code identifier to be retrieved via the network from a data storage device in response to a user instruction, the access code identifier so retrieved being 25 transmitted to a remote authorization unit by the controller's means for communicating with a remote authorization unit; and the remote authorization unit further comprises: means for identifying an access code corresponding to an access code identifier received by the remote authorization unit from a controller; and 0 means for causing the identified access code to be transmitted to the controller from which the access code identifier was received. S S~B~ S. si S 5 P:\OPER\SSB\62595-96.RES 23/11/99 43- 81. A system as in claim 75, wherein the controller is a hardware means for performing the functions of the controller. 82. A system as in claim 75, wherein the controller is a software means for performing the functions of the controller. 83. A system as in claim 75, wherein the data storage device further comprises a server computer. 84. A system as in claim 75, further comprising a plurality of data storage devices with which a user access apparatus can communicate via a network. A system as in claim 84, further comprising a plurality of user access apparatus each comprising a controller and processor as recited in claim 86. A system as in claim 75, further comprising a plurality of user access apparatus each comprising a controller and processor as recited in claim 87. A system as in claim 75, wherein the network further comprises the Internet. 0* S. S V VS 88. A system as in claim 75, wherein one or more of the means for communicating further comprises a wireless communications device or devices. 89. A system for controlling access by a user to a plurality of sets of electronic 25 content, comprising: SVSS.. a data storage device for storing each of the plurality of sets of electronic 50.550 content in an encrypted form such that a predetermined access code is required for S" accessing each of the plurality of sets of electronic content stored in the data storage S device; a user access apparatus, comprising: a processor, wherein the processor can be operated in response to an P:\OPER\SSB\6259596.RFS 23/11/99 44 access code to enable access via a network to a corresponding set of encrypted electronic content stored in a data storage device; a controller, the controller further comprising: means for communicating with a remote authorization unit, wherein an authorization request can be transmitted to a remote authorization unit and an access code and a set of attributes can be received from a remote authorization unit; and means for communicating with a processor, wherein instructions can be transmitted to a processor to control operation of the processor in accordance with an access code, the instructions being transmitted in accordance with the manner defined by a set of attributes corresponding to a set of electronic content being accessed by the processor; and a remote authorization unit located at a location remote from the processor and the controller, the remote authorization unit further comprising: S. 15 means for communicating with a controller; means for storing access codes; means for storing sets of one or more attributes that define a manner in which a set of electronic content can be accessed, such that at least one set of attributes corresponds to each of the plurality of sets of electronic content; S 20 means for evaluating an authorization request received from a controller to determine whether the authorization request is approved; means for identifying an access code and a set of attributes corresponding to an authorization request; and means for causing the identified access code and set of attributes for an S 25 approved authorization request to be transmitted to the controller from which .Woe*.. o 0the approved authorization request was received. C 90. A system as in claim 89, where in at least one set of attributes defines a S. duration of time for which a corresponding set of electronic content can be accessed. C Is P:\OPER\SSB\62595-96.RES 23/11/99 91. A system as in claim 89, wherein as least one set of attributes defines a number of times that a corresponding set of electronic content can be accessed. 92. A system as in claim 89, wherein at least one set of attributes enables unlimited access to a corresponding set of electronic content such that the set of electronic content can be accessed for any duration of time or any number of times. 93. A system as in claim 89, wherein at least one set of attributes specifies a portion of a corresponding set of electronic content that is not accessible to the user. 94. A system as in claim 89, wherein at least one set of attributes inhibits copying or printing of a corresponding ser of electronic content. 15 95. A system as in claim 89, wherein at least one set of attributes controls the manner in which a corresponding set of electronic content is displayed. 96. A system as in claim 89, wherein the data storage device further comprises a server computer. 97. A system as in claim 89, further comprising a plurality of data storage devices with which a user access apparatus can communicate via a network. 98. A system as in claim 97, further comprising a plurality of user access apparatus 25 each comprising a controller and processor as recited in claim 89. S S OS 5* 5 S S p S S. S p 99. A system as in claim 89, further comprising a plurality of user access apparatus each comprising a controller and processor as recited in claim 89. 100. A system as in claim 89, wherein the network further comprises the Internet. !IN. It P:\OPER\SSB\62595-96. RES 23/11/99 -46- 101. A system as in claim 89, wherein one or more of the means for communicating further comprises a wireless communications device or devices. 102. A system for controlling access by a user to a plurality of sets of electronic content substantially as hereinbefore described with reference to the accompanying drawings. 103. A system for accessing data by a user, substantially as hereinbefore described with reference to the accompanying drawings. 104. A method for distributing data to a user substantially as hereinbefore described with reference to the accompanying drawings. 105. A method of distributing information in the form of data sets and providing 15 access thereto substantially as hereinbefore described with reference to the accompanying drawings. 106. A system for encrypting data substantially as hereinbefore described with S* reference to the accompanying drawings. 107. A method for encrypting data sets to control access thereto substantially as hereinbefore described with reference to the accompanying drawings. 108. A data retrieval system substantially as hereinbefore described with reference S 25 to the accompanying drawings. S' 109. A system for providing authentication of electronic transmissions substantially as hereinbefore described with reference to the accompanying drawings. I. P:\OPER\SSfl\62595-96. RES 23/11/99 -47 110. A method for providing authentication of electronic transmissions substantially as hereinbefore described with reference to the accompanying drawings. DATED this 23rd day of November 1999 SPYRUS, INC. By its Patent Attorneys DAVIES COLLISON CAVE a 4@ o 0 09 0 6 0 00 0
AU62595/96A 1993-09-14 1996-06-07 System and method for access control for data storage media Ceased AU715638C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU62595/96A AU715638C (en) 1993-09-14 1996-06-07 System and method for access control for data storage media

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US122005 1993-09-14
AU76874/94A AU694742C (en) 1993-09-14 1994-09-14 Access control for portable data storage media
US08/485,817 US5677953A (en) 1993-09-14 1995-06-07 System and method for access control for portable data storage media
US08/485817 1995-06-07
PCT/US1996/009393 WO1996041445A1 (en) 1995-06-07 1996-06-07 System and method for access control for data storage media
AU62595/96A AU715638C (en) 1993-09-14 1996-06-07 System and method for access control for data storage media

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU76874/94A Division AU694742C (en) 1993-09-14 1994-09-14 Access control for portable data storage media

Publications (3)

Publication Number Publication Date
AU6259596A AU6259596A (en) 1996-12-30
AU715638B2 true AU715638B2 (en) 2000-02-10
AU715638C AU715638C (en) 2000-10-12

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4827500A (en) * 1987-01-30 1989-05-02 American Telephone And Telegraph Company, At&T Bell Laboratories Automatic speech recognition to select among call destinations
US5457746A (en) * 1993-09-14 1995-10-10 Spyrus, Inc. System and method for access control for portable data storage media

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4827500A (en) * 1987-01-30 1989-05-02 American Telephone And Telegraph Company, At&T Bell Laboratories Automatic speech recognition to select among call destinations
US5457746A (en) * 1993-09-14 1995-10-10 Spyrus, Inc. System and method for access control for portable data storage media

Also Published As

Publication number Publication date
AU6259596A (en) 1996-12-30

Similar Documents

Publication Publication Date Title
US5703951A (en) System and method for access data control
US5677953A (en) System and method for access control for portable data storage media
JP3503774B2 (en) Method and apparatus for securing access to a file
US6954753B1 (en) Transparent electronic safety deposit box
JP3503773B2 (en) Method and apparatus for securing access to a file
EP0679980B1 (en) Method and apparatus enabling software trial with computer-dependent identification
JP3914430B2 (en) Method and apparatus for enabling distribution of software objects
EP0679979B1 (en) Method and apparatus enabling software trial with a try-and-buy user interaction
JP3507594B2 (en) Computer
JP3701350B2 (en) Content sales period verification terminal and center, and content decryption key expiration date verification terminal
JP2003524264A (en) Method and apparatus for storing, distributing and accessing intellectual property in digital form
CN100442301C (en) Method and system for monitoring content
AU715638B2 (en) System and method for access control for data storage media
AU715638C (en) System and method for access control for data storage media
AU694742C (en) Access control for portable data storage media
JP2012108639A (en) Browsing/viewing system for removable storage media

Legal Events

Date Code Title Description
DA2 Applications for amendment section 104

Free format text: THE NATURE OF THE PROPOSED AMENDMENT IS AS SHOWN IN THE STATEMENT(S) FILED 20000308

FGA Letters patent sealed or granted (standard patent)
DA3 Amendments made section 104

Free format text: THE NATURE OF THE AMENDMENT IS AS WAS NOTIFIED IN THE OFFICIAL JOURNAL DATED 20000406