US20110010299A1 - System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software - Google Patents
System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software Download PDFInfo
- Publication number
- US20110010299A1 US20110010299A1 US12/801,927 US80192710A US2011010299A1 US 20110010299 A1 US20110010299 A1 US 20110010299A1 US 80192710 A US80192710 A US 80192710A US 2011010299 A1 US2011010299 A1 US 2011010299A1
- Authority
- US
- United States
- Prior art keywords
- content
- package
- user computer
- data
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 14
- 230000004044 response Effects 0.000 claims description 8
- 230000001419 dependent effect Effects 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 11
- 230000006870 function Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000012384 transportation and delivery Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000001983 electron spin resonance imaging Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012858 packaging process Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000036316 preload Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Definitions
- a system for dissemination of data which combines a number of disparate system components into a reliable, secure and scalable system to meet the needs of data consumers 12 and IPs 14 .
- the system employs industry standard technologies, systems and development requirements, which generally behave as disparate systems, and Requesters, in accordance with the present invention to facilitate the inter-operation of a disparate systems to allow them to behave as a cohesive, single entity. Requesters are described in U.S. Pat. No. 5,809,145 which is incorporated by reference herein.
- a requester architecture is provided to operate as a high speed communication routing system which permits the transfer of data between objects within systems and applications independently of the platform, software and operating system.
- the Requester architecture allows for rapid integration of existing technologies into a cohesive virtual network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Software Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Technology Law (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
Abstract
A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters.
Description
- This application is a continuation of U.S. patent application Ser. No. 11/978,566, filed Oct. 30, 2007, which is a continuation of U.S. patent application Ser. No. 10/126,973, filed Apr. 22, 2002 (now U.S. Pat. No. 7,356,847), which is a continuation-in-part of U.S. patent application Ser. No. 10/126,974, filed Apr. 22, 2002 (now U.S. Pat. No. 7,010,697), which is a continuation of U.S. patent application Ser. No. 09/031,536, filed Feb. 27, 1998 (now abandoned), which is a continuation-in-part of U.S. patent application Ser. No. 08/670,846, filed Jun. 28, 1996 (now U.S. Pat. No. 5,809,145), the entire subject of which are hereby incorporated herein by reference.
- The invention relates to a system for allowing information providers to prepare digital information for secure electronic commerce via the internet, including dynamic encryption of the information, and for allowing customers to browse and purchase secured, purchasable data or simply to unlock secured correspondence that is intended for a some customers and not others without having to pre-load fulfillment software.
- Demand for network-based distribution of protected and unprotected data is increasing dramatically. Yet, many challenges exist that need to be addressed to effectively distribute data via electronic commerce such as: (1) conducting reliable, secure transactions necessary to build confidence with both information providers (e.g., data publishers) and data customers; (2) ensuring that data can be located, accessed and purchased in a timely manner; and (3) ensuring that information providers or publishers can specify access controls and that the administration of the posting of datasets which are capable of changing dynamically is not unwieldy and unmanageable.
- A need exists for a data distribution infrastructure which addresses the aforementioned challenges and which overcomes a number of disadvantages associated with existing distributed data commerce systems. Traditional distributed data commerce systems are implemented behind a firewall so that secure transactions can be made. These systems, however, are characterized by high installation and maintenance costs for both software and hardware. Another disadvantage associated with many existing distributed data commerce systems is the requirement of a customer to load special fulfillment software onto the customer computer prior to the acquisition of any secure data. The fulfillment software enables the customer to order, purchase and decrypt secure data. Another disadvantage of many existing distributed data commerce systems arises from the static encryption of datasets. Information providers typically encrypt datasets to be distributed as secure datasets and store the secured datasets on a web server prior to any demand for the datasets by customers. Thus, modification of the datasets and overall administration of the posting of the datasets is less efficient since the data is already encrypted.
- In accordance with an aspect of the present invention, a method of delivering encrypted content to a user computer via a communication network is provided. Queries are generated using said user computer to search for content via said communication network. The content can be available from an information provider via a server and the communication network, for example. A package is downloaded from the information provider and comprises, for example, selected content retrieved from the server data repository and bundled in response to the queries. A unique package identifier is assigned to the package and stored in the server data repository. At least a portion of the content is encrypted using a key in response to said queries. The package can be previewed using the user computer and at least one content item provided in said package can be selected. A machine-dependent product code is generated at the user computer. The product code comprises a unique identifier corresponding to said user computer. A request for the at least one content item and the product code is transmitted to the information provider.
- In accordance with another aspect of the present invention, a method of delivering encrypted content to a user computer via a communication network is provided. Individual pieces of content are stored in a server, each of the individual pieces comprising at least one of an image, audio, video and software. Queries are received from a user computer searching for content via a communication network to obtain selected content comprising at least two selections from the stored individual pieces of content. The selected content is retrieved from the server in response to the queries, the selected content comprising at least two of the individual pieces of content selected by the user. Each of the respective individual pieces of content selected by the user are encrypted with corresponding keys. The selected ones of the individual pieces of content are bundled into a customized package. A unique package identifier for the package is generated and stored. The package and the package identifier are transmitted to the user computer for downloading. A request is received from the user computer to decrypt a selected portion of the package. The request comprises a product code generated using the package identifier and a hardware identifier that is unique to the user computer. A release code is generated for decrypting the selected portion using the key and the product code. The release code is not generated on the server when the respective one of the individual pieces was encrypted but rather after the user has downloaded the respective one of the individual pieces and generated the product code.
- These and other features and advantages of the present invention will be more readily comprehended from the following detailed description when read in connection with the appended drawings, which form a part of this original disclosure, and wherein:
-
FIG. 1 is a schematic block diagram of a data distribution system illustrating the dynamic downloading of an executable with secure data files to provide customers with fulfillment software in accordance with an embodiment of the present invention; -
FIGS. 2 and 3 depict exemplary computer screens generated on an information provider's computer to allow an information provider to create purchasable content in accordance with an embodiment of the present invention; -
FIG. 4 is a flow chart depicting the sequence of operations for requesting a secured file with an embedded executable in accordance with an embodiment of the present invention; -
FIGS. 5 , 6 and 7 are exemplary computer screens generated on a customer computer for selecting a purchasable item and purchasing a release code to decrypt the purchasable item in accordance with an embodiment of the present invention; -
FIG. 8 depicts an exemplary computer screen generated on an information provider's computer to locate a release code corresponding to a product code for a requested purchasable item in accordance with an embodiment of the present invention; -
FIG. 9 is a schematic block diagram of a data distribution system which dynamically encrypts secure content in accordance with an embodiment of the present invention; and -
FIGS. 10 , 11 and 12 are schematic block diagrams illustrating software modules including Requesters in a distributed framework for building universal data distribution infrastructures in accordance with an embodiment of the present invention. - A data distribution system (DDS) 10 is provided in accordance with the present invention to allow information providers (IPs) to prepare digital information (hereinafter referred to as “content”) for commerce, as well as to perform data retrieval and transmission, and transactional services. A number of embodiments are described below which provide different electronic commerce functions. For example, a desktop encryption/decryption system (DES) is described in connection with
FIGS. 1-8 which permits seamless integration of secured data commerce functionality with existing software applications and operating systems without requiring modification to a user's system. An information provider (IP) 12, as shown inFIG. 1 , can use the DES to make digital content into a purchasable item, or simply to encrypt the content for a secured correspondence transmission that does not require purchasing thereof Acustomer 14 can receive the secured correspondence or purchasable item via the interne or download these items from a compact disc (CD), for example. The DES provides the secured correspondence or purchasable item with an embedded executable to provide preview and purchase functions to the customer without having to modify software applications and operating system (OS) on the customer computer prior to receiving the secured content. - In addition, server-based technology is provided which permits dynamic encryption of content and which permits customers and IPs to otherwise engage in internet commerce (i.e., to request, preview, download and purchase selected secured content), as will be described below in connection with
FIG. 9 . Finally, a distributed framework is provided which can be adopted by IPs as a standardized framework from which to build a universal data distribution infrastructure, as shown inFIGS. 10-12 . The distributed framework preferably employs the kernel and Requester technology that is the subject of U.S. Pat. No. 5,809,145, the entire subject of which is hereby incorporated herein by reference for all purposes. - The DES provides an
IP 12 with means to create secured content in the form of purchasable items or secured correspondence. The DES preferably comprises software operating on a IP computer (e.g., a Web Server 16) which generatesscreens FIGS. 2 and 3 , respectively, when the IP is preparing content for secure commerce or transmission. TheIP 12 can create content via an input device and an application program (e.g., word processing, image processing or publishing software) or retrieve existing content stored in a memory device. The newly created or retrieved files are listed in thedialogue box 20 in the “Save as Purchasable”screen 18. In accordance with the present invention, the DES software translates a user input such as selection of the “Save”button 22 into a DES function. For example, when the “Save as Purchasable”option 24 is selected by theIP 12, the “Save” call resulting from activating the “Save” button is flagged by the DES to create a purchasable item. The DES subsequently invokes special handlers in accordance with the present invention to prepare, secure (e.g., encrypt) and package the saved content for distribution via sale, or simply secure correspondence transmission with no sale. - In addition to using a secure wrapper for encryption, the DES provides the encrypted content with an embedded executable in accordance with the present invention. The executable translates application-wide and OS-wide calls such as “file open”, “read”, “write” and “close” into DES events such as saving selected data as a purchasable item, or providing customers with preview and purchasing dialogue, in the OS and one or more of the applications being run on the
IP 12 computer orcustomer 14 computer. Thus, the fulfillment software required to preview, request a release code, purchase a release code and to decrypt selected content via the release code is provided to a customer computer following transmission of the selected secure content. The DES is therefore advantageous because a customer need not have previously installed fulfillment software prior to the request or receipt of the selected secure content. - With regard to an IP, the DES stores content saved as purchasable content on a
hard drive 26 or other memory device as a protected file. The encryption can be, for example, in accordance with an encryption method that generates machine-dependent release codes such as the method described in U.S. Pat. No. 5,809,145 incorporated by reference herein. Other encryption algorithms, however, can be used. The special handlers of the DES assign a product code for the protected file containing the purchasable item and create a release code or key to decrypt or unlock the protected file. By way of an example, raw and unencrypted data in a digital format is stored in independent data files at, for example, an IP data processing facility. The key for encrypting and decrypting the data can be generated, for example, cryptographically using a random number generator. The encrypted data is then stored in a database at a particular location. A unique dataset code is assigned to the dataset and is preferably generated using a hash algorithm on the location of the dataset. The location of the dataset, the key and the hashed dataset code are then stored in a key management database maintained at the IP or separate fulfillment center. The encrypted data is distributed via CD-ROM, for example, or made available via a network (e.g., the internet). - A user can select a dataset and initiate a request by clicking on an item in a preview screen, for example. A hardware-dependent digital signature (HDDS) is generated in response to the dataset request. The signature can be based on a card number of a board within the customer computer or other computer-specific device. The location of the selected dataset is determined by the computer using a table on the CD-ROM or available via a network and preferably hashed. The hashed location is then concatenated with the HDDS and compressed to present the user with a product code corresponding to the selected dataset.
- The product code is forwarded to the IP or fulfillment center, where it is processed to decompress the product code, and to extract the hashed location of the selected dataset and the HDDS. The hashed location is used to find the key within the key management database for decrypting the requested dataset. The I-IDDS is then hashed and encrypted along with the key. The encrypted key is concatenated with the hashed dataset code, compressed, and sent as a release code to the customer.
- With reference to
FIG. 3 , theIP 12 can store the release codes in akey database 28. In the DES, acustomer 14 can obtain a release code for a selected purchasable item or for secure correspondence directed to the customer via a telephone order or a facsimile modem or transaction in accordance with one embodiment of the present invention. The DES preferably provides a two layer approach to providing protected content for commerce. First, encrypted files are browsed and downloaded by thecustomer 14. Second, thecustomer 14 subsequently initiates a transaction to unlock selected ones of the encrypted file(s). Thus, the content to be protected in the present example is statically encrypted, that is, it is encrypted and stored at anIP 12 or provided on a physically distributed memory medium such as a CD even before acustomer 14 has decided to unlock and, if necessary, download or purchase the content. A method of dynamically encrypting the content in accordance with another aspect of the present invention is described in connection withFIG. 9 . - The purchase transaction supported by the DES is illustrated in
FIG. 4 . With reference to block 36 inFIG. 4 , thecustomer 14 computer lists files retrievable from a CD in a CD drive connected thereto, or from a local hard drive, or from aremote website database 26 via an interne browser. Thecustomer 14 computer generates a screen 30 (FIG. 5 ) which lists files that can be “opened” in adialogue box 32 in a conventional manner using application software and/or the OS. If selected from thebox 32, the embedded executable of a purchasable item preferably interprets the selection of the “open”button 34 as a request for apreview display screen 50, as shown inFIG. 6 , which is optionally provided by the executable when the purchasable item is encrypted. - As indicated by the
communication paths FIG. 1 , the customer browses secure content and downloads the same into a local memory device (blocks 36 and 38 ofFIG. 4 ). The downloaded files are each preferably provided with an embedded executable in accordance with the present invention. When acustomer 14 selects the “open” button 34 (FIG. 5 ), or selects a “Purchase”button 56 on the “Preview”screen 50 in the currently-executing software application, and the file to be opened is identified as being purchasable, special handlers in the embedded executable annunciate user interface elements and initialize operations to be performed on the read and write functions. For example, a “Purchase Item”screen 58, as indicated inFIG. 7 , is generated by the executable on the customer computer. - With continued reference to
FIGS. 1 and 4 , the executable provided with the downloaded secure content provides means for the customer computer to commence unlocking or decrypting the secure content in accordance with the present invention. The executable is represented by thereference numeral 57 for illustrative purposes. In accordance with the present invention, the executable 57 is not made available to thecustomer 14 computer until after downloading, as represented by thedata path 54. - As illustrated by the
data path 55 inFIG. 1 and theblock 40 inFIG. 4 , the executable 57 now commences decrypting of the secured content. As shown inFIG. 7 , thecustomer 14 has theoptions FIG. 1 ), of transmitting a facsimile purchase order using a modem, or conducting an internet commerce transaction (e.g., as described below in connection withFIG. 9 . The dialogue box inFIG. 7 provides aproduct code 60 for identifying the selected secured content to a fulfillment center, as indicated by thedata path 61 inFIG. 1 . The product code can be spoken to an operator at theorder desk 68 during a telephone transaction, or transmitted via a facsimile modem or via the interne. The customer provides additional data such as a credit card information for payment and customer name (block 42 ofFIG. 4 ). - With reference to
blocks FIG. 4 , an order desk operator can enter theproduct code 60 on an IP computer. A release code screen 70 (FIG. 8 ) can be generated for display on the order desk computer to indicate the release code once a release code has been located in thekey database 28 which corresponds to the product code. Upon verification of valid credit card payment with abank 72 via acommerce server 74, the order desk computer retrieves therelease code 69, as indicated at 65, and provides the release code to the customer, as indicated at 63. The customer computer can then use the release code corresponding to the product code to unlock the protected file so that the purchased content is ready for use. It is to be understood that release codes, as well as product codes, can be transmitted between thecustomer 14 and theIP 12 verbally via a telephone call, or by transmission via the interne or facsimile - In accordance with another aspect of the present invention, the
DDS 10 uses server-based technology to implement internet commerce at an IP website. As shown inFIG. 9 , acustomer 14 uses aninternet browser 56 to access an IP website via aWeb server 16. The IP allows the customer to initiate queries on the server data repository and search for content. The customer then selects content that is of interest. The IP can bundle various mixed digital media content (e.g., images, audio, video, software) into a customized package. The portions of the package are encrypted with a unique cryptographic key(s). A unique package identifier (or “serial number”) is created and stored in a transaction database, along with the unique cryptographic key(s). Alternatively, the identifiers and keys may be generated prior the to packaging process, as long as they have not been used by another package. The package may contain previews of digital content and/or trial versions of software applications that are not encrypted. As described above, a software application (e.g., an embedded executable) that manages the package is added to the package contents and is configured so that the customer can execute the application on their computer after they have downloaded the package. The management application allows the user to access any preview and trial content, and handles the enablement process. As stated above, the present invention is advantageous because no pre-installed fulfillment software is required on the customer's computer. - In accordance with the present invention, the
web server 16 preferably comprises a number of application-specific programs (ASPs) for implementing anencryption server 84, ASPs for controlling anorder desk 86, andASPs 88 for electronic commerce (EC) server functions. The customer downloads the package as a single file or data stream. The customer can view any preview content included in the package. After review of secure content previews 79 usingpreview pages 80, thecustomer 14 can select purchasable items via Shopping Basket pages 82. When the customer initiates the fulfillment process, a product code is created that contains the unique package identifier (serial number), and a hardware identifier that is unique to the hardware of the customer's computer. The product code is sent to the fulfillment server. The product codes for the requested purchasable items are provided to theencryption server 84. - As stated previously, the encryption server retrieves the selected purchasable items from a
data repository 90 wherein the data is not necessarily encrypted in any way. The retrieved purchasable items are encrypted on-the-fly by theencryption module 88 by preferably using machine-dependent release codes. The key is then stored in thedatabase 28 via aSQL server 92. The requested, encrypted files are then provided to theserver 16 for downloading to thecustomer 14. The customer may then go through a commerce transaction to purchase the package, or a component thereof. After viewing the encrypted files via Shopping Basket pages, the customer can enter anEC order page 94. EC server ASPs are provided to obtain the corresponding key or release code from thekey database 28 and any available customer data from acustomer database 96 via theSQL server 92. The server locates the package identifier and keys in the database. TheEC server ASPs 88 also perform transactional services such as a credit card transaction to pay for the requested, encrypted item. The server constructs a unique release code based on the information in the product code and the package keys, and sends it to the customer. Once payment is verified, the IP Website sends the release code to the customer to unlock the desired content. The customer enters the release code into the management application. The content is decrypted to the customer's computer. The customer may repeat the fulfillment process for another component in the package if more that one component exists. - Thus, the product code is generated on a customer's computer and contains a secured unique hardware identifier for that customer's computer. It is preferably not generated on the server when the product is encrypted and does not identify the product. A separate unique identifier is preferably used for that purpose. In addition, the release code is not generated on the server when the product is dynamically encrypted and sent to the customer, but rather it is generated on the server after the customer has downloaded the product and has sent the product code to the server. This may occur at a later time when they request the product to be enabled. The customer hardware identifier from the product code is required to generate the release code, thereby linking the release code to that particular customer's computer.
- In accordance with the present invention and with reference to
FIG. 10 , a system for dissemination of data is provided which combines a number of disparate system components into a reliable, secure and scalable system to meet the needs ofdata consumers 12 andIPs 14. The system employs industry standard technologies, systems and development requirements, which generally behave as disparate systems, and Requesters, in accordance with the present invention to facilitate the inter-operation of a disparate systems to allow them to behave as a cohesive, single entity. Requesters are described in U.S. Pat. No. 5,809,145 which is incorporated by reference herein. Using object-oriented kernel programming, a requester architecture is provided to operate as a high speed communication routing system which permits the transfer of data between objects within systems and applications independently of the platform, software and operating system. Thus, the Requester architecture allows for rapid integration of existing technologies into a cohesive virtual network. - As shown in
FIG. 10 , the Requester layers 100 a and 100 b provide a standard way in which to perform high-level communications, bulk delivery and resource exploration, as well as to combine existing and future technologies in a seamless manner. The Requester technology, for example, can be integrated by being built on top of such industry standards as TCP/IP and CORBA. - The Requesters in the Requester layers 100 a and 100 b provide three services: messaging, bulk delivery and resource exploration. For messaging, a Requester allows different pieces of software to communicate with each other and can therefore be used extensively throughout an entire system for requests, posting of results and small data transfers. Requester messaging is similar to packet delivery in a network in that messages are routed from one object to others on the same computer or across the
interne 102. Bulk delivery operations via Requesters are implemented on top of a messaging architecture to provide managed flows of data based on a connection-oriented mechanism. Requester bulk delivery is efficient because it allows dynamic link profiling, which uses minimum bandwidth while maximizing throughput, automatic bit width selection, failure recovery, compression and advanced flow control. Thus, downloading of large amounts of data is efficient and reliable for the user and easier for an IP since the data can be dumped into a stream or named pipe. Requester resource exploration enables the system to transform a collection of distinct elements into a single entity. Resource exploration permits software to explore what is available using lists, indices and directories, which are automatically generated and updated. Thus, Requester resource exploration significantly reduces maintenance, as well as facilitates the integration of advanced software agents that can dynamically probe large amounts of data in search of specific data entities. - In the exemplary system illustrated in
FIG. 10 , a framework is provided for distributing geographic data. It is to be understood that the framework can be used to distribute any type of data. The Requester layers 100 a and 100 b facilitate communication betweendata consumers 12,IPs 14 anddata managers 15 via an interne orintranet 102.Individual consumers 12 and groups ofconsumers other data 106 via servers such as anarchive server 108 orgeographical query server 110. - The relationships with
consumers 12 is becoming more prevalent since profiles can be built on consumer data preferences as a consumer browses and accesses data. Profiles are an effective means for target marketing through advertisements and special offers. Preferred types of data, purchasing patterns and other information allow companies to identify who their customers are and therefore to more effectively sell their data or create relationships withre-sellers 112 to sell their data. Relationships between sellers and re-sellers for value-added data products based on many suppliers' data, percentages or fixed sums of transactions can be automatically routed by the framework illustrated inFIG. 10 to the correct parties, thereby facilitating supplier/re-seller relationships. Therequester layer 100 b, for example, facilitates the routing of financial and other data betweentransaction servers 114 andfinancial networks 116. - With reference to
FIG. 11 ,client framework 120 can be implemented which standardizes ways in which users communicate with servers over theinternet 102. Clients communicating through theRequester layer 100 a to the different standards supported by the framework of the present invention can communicate with all vendor's servers without requiring specialized interface levels to obtain base functionality. Users can therefore point their internet browser to a data supplier's site which automatically loads a Java client link which links the user to the system. A client framework can also be developed to adapt new functionalities implemented on top of theclient framework 120. Thus, developers can enhance the client framework to add specialized features and capabilities, to use alternate means of navigation and to embed new technologies. By allowing functions such as a pane to display a web page, data suppliers do not have to learn a completely new way of publishing content since they can place their web site as a metadata value on theirarchive server 108. For example, by exposing capabilities through anobject adapter 122, an embedded Java applet or an ActiveX component can interact with the client to perform functions together to provide a unified user experience. - With reference to
FIG. 12 , server specifications define how servers communicate with each other and with clients through the Requester layers 100 a and 100 b. For example, specifications define howarchive servers 108 advertise their presence, how data is labeled, as well as defining metadata requirements, data and metadata access methods, security options, access log formats, object announcement for resource exploration, and persistent wrapping for security in Requester interfaces.Archive server 108 specifications provide guidelines for storing data to be distributed, such as geographic data and metadata. In accordance with the present invention, an archive server specification is provided which sets forth basic functionality, required commands in the manner in which an archive server interacts with the Requester layer 100 and therefore provides information required for a vendor to develop a full-feature archive server based on existing server technologies. In the case of geographic data, many different geospatial data types exist. Specialized archive servers can be created to manage different data types. For example, a spatialdata management system 124 such as ESRI SDE can be developed for vector data which runs on top of adatabase environment 126 to provide full capability vector data support. Raster data has different requirements than vector data and requires a different approach. Anarchive server 108 can be implemented which supports such capabilities as arbitrary area extraction to better manage raster data. - Specifications are also provided for a
query server 110 to provide guidelines for query systems for searching of data to be distributed. Query server specifications define basic functionality and commands that must be implemented, how the query server interacts with the requester layer 100, and advanced capabilities, such as automated index generation and resource detection. The specification can be used to create a layer on top of a current search engine to allow the search engine to become a seamless part of a cohesive system. Specifications for query servers can include how query servers advertise their presence, how indexed data can be accessed and discovered automatically, and can provide guidelines for searching data, as well as query initiated methods, list formats and requester interfaces. - Similarly,
transaction server 114 specifications provide access control systems guidelines by defining basic functionality and commands that must be implemented, as well as defining how a transaction server interacts with a requester layer. Existing transaction servers are easily provided to a system with the addition of a layer such that interfaces with financial networks can be provided by financial transaction servers which is a subset of a transaction server specification. The system illustrated inFIG. 10 preferably uses the SET protocol developed by Visa and MasterCard. Transaction server specifications define how transaction servers advertise their presence, how transaction servers securely retrieve access control information from an archive server and how transaction servers invoke the wrapping of a piece of data and invoke requester interfaces. - While certain advantageous embodiments have been chosen to illustrate the invention, it will be understood by those skilled in the art that various changes and modifications can be made therein without departing from the scope of the invention as defined in the appended claims.
Claims (9)
1. A method of delivering encrypted content to a user computer via a communication network comprising the steps of:
generating queries using said user computer to search for content via said communication network, said content being available from an information provider via a server and said communication network;
downloading a package from said information provider, said package comprising selected content retrieved from said server data repository and bundled in response to said queries and a unique package identifier assigned to said package and stored in said server data repository, at least a portion of said content being encrypted using a key in response to said queries;
selecting at least one content item provided in said package using said user computer;
generating a machine-dependent product code at said user computer, said product code comprising a unique identifier corresponding to said user computer; and
transmitting a request for said at least one content item and said product code to said information provider.
2. A method as claimed in claim 1 , wherein said at least one content item is encrypted and further comprising the steps of:
receiving a release code from said information provider to decrypt said at least one content item, said release code being generated using said product code and said key; and
decrypting said purchaseable item at said user computer using said release code.
3. A method as claimed in claim 1 , wherein said package comprises secure content previews of selected said content items from said server data repository, said selected content items being stored unencrypted at said data repository, said selecting step comprising the step of reviewing said previews, and further comprising the step of encrypting said at least one purchaseable item in response to said request.
4. A method as claimed in claim 1 , wherein said unique identifier is derived from a hardware device in said user computer.
5. A method as claimed in claim 1 , wherein said unique identifier is derived from a card number of a circuit board in said user computer.
6. A method as claimed in claim 1 , wherein said selected content items in said package comprise mixed digital media content having at least two of images, audio, video and software.
7. A method of delivering encrypted content to a user computer via a communication network comprising the steps of:
storing individual pieces of content in a server, each of said individual pieces comprising at least one of an image, audio, video and software;
receiving queries from a user computer searching for content via a communication network to obtain selected content comprising at least two selections from the stored said individual pieces of content;
retrieving said selected content from said server in response to said queries, said selected content comprising at least two of said individual pieces of content selected by the user;
encrypting each of the respective said individual pieces of content selected by the user with corresponding keys;
bundling the selected ones of said individual pieces of content in said selected content into a customized package;
generating and storing a unique package identifier for said package;
transmitting said package and said package identifier to said user computer for downloading; and
receiving a request from said user computer to decrypt a selected portion of said package, said request comprising a product code generated using said package identifier and a hardware identifier that is unique to said user computer.
8. A method as claimed in claim 7 , further comprising generating a release code for decrypting said selected portion using said key and said product code.
9. A method as claimed in claim 8 , wherein the release code is not generated on the server when the respective one of said individual pieces corresponding to said selected portion was encrypted but after the user has downloaded the respective one of said individual pieces and generated said product code.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/801,927 US20110010299A1 (en) | 1996-06-28 | 2010-07-01 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US15/011,219 US20160217274A1 (en) | 1996-06-28 | 2016-01-29 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/670,846 US5809145A (en) | 1996-06-28 | 1996-06-28 | System for distributing digital information |
US3153698A | 1998-02-27 | 1998-02-27 | |
US10/126,973 US7356847B2 (en) | 1996-06-28 | 2002-04-22 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US10/126,974 US7010697B2 (en) | 1996-06-28 | 2002-04-22 | System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software |
US11/978,566 US7770230B2 (en) | 2002-04-22 | 2007-10-30 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US12/801,927 US20110010299A1 (en) | 1996-06-28 | 2010-07-01 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/978,566 Continuation US7770230B2 (en) | 1996-06-28 | 2007-10-30 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/011,219 Continuation US20160217274A1 (en) | 1996-06-28 | 2016-01-29 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110010299A1 true US20110010299A1 (en) | 2011-01-13 |
Family
ID=39810189
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/978,566 Expired - Fee Related US7770230B2 (en) | 1996-06-28 | 2007-10-30 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US12/801,927 Abandoned US20110010299A1 (en) | 1996-06-28 | 2010-07-01 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US15/011,219 Abandoned US20160217274A1 (en) | 1996-06-28 | 2016-01-29 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/978,566 Expired - Fee Related US7770230B2 (en) | 1996-06-28 | 2007-10-30 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/011,219 Abandoned US20160217274A1 (en) | 1996-06-28 | 2016-01-29 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
Country Status (1)
Country | Link |
---|---|
US (3) | US7770230B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090260003A1 (en) * | 2008-04-09 | 2009-10-15 | Canon Kabushiki Kaisha | Application packaging device and method for controlling the same |
US20090300366A1 (en) * | 2008-05-30 | 2009-12-03 | Markus Gueller | System and Method for Providing a Secure Application Fragmentation Environment |
US20100235264A1 (en) * | 2006-11-10 | 2010-09-16 | Media Patents, S.L. | Process for the on-line sale of a software product |
US20120173735A1 (en) * | 2010-12-30 | 2012-07-05 | Robert Bosch Gmbh | Radio Tool and Method for the Operation Thereof |
US11514074B2 (en) * | 2015-09-30 | 2022-11-29 | EMC IP Holding Company LLC | Method and system for optimizing data replication for large scale archives |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4714980B2 (en) * | 2000-10-17 | 2011-07-06 | ソニー株式会社 | Content receiving apparatus and content receiving method |
US20070235535A1 (en) * | 2006-04-05 | 2007-10-11 | Davoust David M | Method and software for determining the eligibility of a voter and for providing pollworker training |
US8726141B2 (en) * | 2009-10-28 | 2014-05-13 | Metaglue Corporation | Content integrity management system |
US8762343B2 (en) * | 2009-12-29 | 2014-06-24 | Cleversafe, Inc. | Dispersed storage of software |
US8468583B2 (en) * | 2010-02-23 | 2013-06-18 | Symantec Corporation | Streamlined process for enrollment of multiple digital certificates |
US10027700B2 (en) * | 2015-02-20 | 2018-07-17 | Authentic8, Inc. | Secure analysis application for accessing web resources via URL forwarding |
US11032309B2 (en) | 2015-02-20 | 2021-06-08 | Authentic8, Inc. | Secure application for accessing web resources |
US9537873B2 (en) | 2015-02-20 | 2017-01-03 | Authentic8, Inc. | Secure analysis application for accessing web resources |
US11356411B2 (en) | 2015-02-20 | 2022-06-07 | Authentic8, Inc. | Secure analysis application for accessing web resources |
US9921976B2 (en) * | 2015-03-25 | 2018-03-20 | Vera | Access files |
US9910967B2 (en) | 2015-07-27 | 2018-03-06 | International Business Machines Corporation | File origin determination |
US10116497B2 (en) * | 2016-05-20 | 2018-10-30 | Moneygram International, Inc. | Systems and methods for providing split control of multiple execution environments |
CN109214198B (en) * | 2018-08-13 | 2021-09-24 | 苏州泥娃软件科技有限公司 | Secure cloud document system capable of encrypted searching |
EP3648431B1 (en) * | 2018-11-05 | 2023-11-08 | Authentic8, Inc. | Secure application for accessing web resources |
Citations (83)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4646234A (en) * | 1984-02-29 | 1987-02-24 | Brigham Young University | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs |
US4713753A (en) * | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
US4736423A (en) * | 1985-04-30 | 1988-04-05 | International Business Machines Corporation | Technique for reducing RSA Crypto variable storage |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4888798A (en) * | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US4897874A (en) * | 1988-03-31 | 1990-01-30 | American Telephone And Telegraph Company At&T Bell Laboratories | Metropolitan area network arrangement for serving virtual data networks |
US4926476A (en) * | 1989-02-03 | 1990-05-15 | Motorola, Inc. | Method and apparatus for secure execution of untrusted software |
US5010571A (en) * | 1986-09-10 | 1991-04-23 | Titan Linkabit Corporation | Metering retrieval of encrypted data stored in customer data retrieval terminal |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5058162A (en) * | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
US5123045A (en) * | 1989-08-18 | 1992-06-16 | Massachusetts Institute Of Technology | Comprehensive software protection system |
US5218638A (en) * | 1990-12-07 | 1993-06-08 | Hitachi Ltd. | Encipher method and decipher method |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5247575A (en) * | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US5291598A (en) * | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
US5297206A (en) * | 1992-03-19 | 1994-03-22 | Orton Glenn A | Cryptographic method for communication and electronic signatures |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5341429A (en) * | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
US5369702A (en) * | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5386369A (en) * | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
US5400403A (en) * | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
US5402490A (en) * | 1992-09-01 | 1995-03-28 | Motorola, Inc. | Process for improving public key authentication |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5414772A (en) * | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5416840A (en) * | 1993-07-06 | 1995-05-16 | Phoenix Technologies, Ltd. | Software catalog encoding method and system |
US5454101A (en) * | 1992-09-15 | 1995-09-26 | Universal Firmware Industries, Ltd. | Data storage system with set lists which contain elements associated with parents for defining a logical hierarchy and general record pointers identifying specific data sets |
US5457746A (en) * | 1993-09-14 | 1995-10-10 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5499295A (en) * | 1993-08-31 | 1996-03-12 | Ericsson Inc. | Method and apparatus for feature authorization and software copy protection in RF communications devices |
US5504814A (en) * | 1991-07-10 | 1996-04-02 | Hughes Aircraft Company | Efficient security kernel for the 80960 extended architecture |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US5557796A (en) * | 1988-09-14 | 1996-09-17 | Digital Equipment Corp. | Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands |
US5563946A (en) * | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5598470A (en) * | 1994-04-25 | 1997-01-28 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block |
US5615264A (en) * | 1995-06-08 | 1997-03-25 | Wave Systems Corp. | Encrypted data package record for use in remote transaction metered data system |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5646992A (en) * | 1993-09-23 | 1997-07-08 | Digital Delivery, Inc. | Assembly, distribution, and use of digital information |
US5671412A (en) * | 1995-07-28 | 1997-09-23 | Globetrotter Software, Incorporated | License management system for software applications |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5734719A (en) * | 1993-10-15 | 1998-03-31 | International Business Systems, Incorporated | Digital information accessing, delivery and production system |
US5742807A (en) * | 1995-05-31 | 1998-04-21 | Xerox Corporation | Indexing system using one-way hash for document service |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5809145A (en) * | 1996-06-28 | 1998-09-15 | Paradata Systems Inc. | System for distributing digital information |
US5822428A (en) * | 1997-03-07 | 1998-10-13 | Great Notions Corp. | Data encryption for product information and access |
US5875247A (en) * | 1994-09-09 | 1999-02-23 | Fujitsu Limited | System for decrypting encrypted software |
US5883955A (en) * | 1995-06-07 | 1999-03-16 | Digital River, Inc. | On-line try before you buy software distribution system |
US5883954A (en) * | 1995-06-07 | 1999-03-16 | Digital River, Inc. | Self-launching encrypted try before you buy software distribution system |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5898777A (en) * | 1996-03-07 | 1999-04-27 | Portland Software, Inc. | Digital product dissemination and sale |
US5907617A (en) * | 1995-06-07 | 1999-05-25 | Digital River, Inc. | Try before you buy software distribution and marketing system |
US5918213A (en) * | 1995-12-22 | 1999-06-29 | Mci Communications Corporation | System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products |
US5920868A (en) * | 1996-07-03 | 1999-07-06 | Sun Microsystems, Inc. | Cataloging apparatus for facilitating the re-use of distributed objects in a distributed object system |
US5933620A (en) * | 1996-03-28 | 1999-08-03 | Advanced Micro Devices, Inc. | Method and apparatus for serializing microprocessor identification numbers |
US5956709A (en) * | 1997-07-28 | 1999-09-21 | Xue; Yansheng | Dynamic data assembling on internet client side |
US5982887A (en) * | 1995-04-27 | 1999-11-09 | Casio Computer Co., Ltd. | Encrypted program executing apparatus |
US5991402A (en) * | 1997-09-23 | 1999-11-23 | Aegisoft Corporation | Method and system of dynamic transformation of encrypted material |
US5999622A (en) * | 1995-11-22 | 1999-12-07 | Microsoft Corporation | Method and apparatus for protecting widely distributed digital information |
US6044469A (en) * | 1997-08-29 | 2000-03-28 | Preview Software | Software publisher or distributor configurable software security mechanism |
US6212525B1 (en) * | 1997-03-07 | 2001-04-03 | Apple Computer, Inc. | Hash-based system and method with primary and secondary hash functions for rapidly identifying the existence and location of an item in a file |
US6243692B1 (en) * | 1998-05-22 | 2001-06-05 | Preview Software | Secure electronic software packaging using setup-external unlocking module |
US20010034658A1 (en) * | 2000-02-23 | 2001-10-25 | Silva Juliana Freire | Applications of executable shopping lists |
US20010042045A1 (en) * | 1999-02-08 | 2001-11-15 | Howard Christopher J. | Limited-use browser and security system |
US6334214B1 (en) * | 1998-04-03 | 2001-12-25 | Preview Software | Try/buy wrapping of installation-ready software for electronic distribution |
US6363356B1 (en) * | 1998-07-16 | 2002-03-26 | Preview Software | Referrer-based system for try/buy electronic software distribution |
US20020087500A1 (en) * | 1998-08-18 | 2002-07-04 | Brian T. Berkowitz | In-memory database system |
US6434532B2 (en) * | 1998-03-12 | 2002-08-13 | Aladdin Knowledge Systems, Ltd. | Interactive customer support for computer programs using network connection of user machine |
US6442553B1 (en) * | 1994-10-31 | 2002-08-27 | Fujitsu Limited | Hash system and hash method for transforming records to be hashed |
US20020136407A1 (en) * | 2000-10-30 | 2002-09-26 | Denning Dorothy E. | System and method for delivering encrypted information in a communication network using location identity and key tables |
US20020174355A1 (en) * | 2001-03-12 | 2002-11-21 | Arcot Systems, Inc. | Techniques for searching encrypted files |
US6807534B1 (en) * | 1995-10-13 | 2004-10-19 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US6898555B2 (en) * | 2003-07-14 | 2005-05-24 | Aladdin Knowledge Systems Ltd. | Method for indicating the integrity of use-information of a computer program |
US6915425B2 (en) * | 2000-12-13 | 2005-07-05 | Aladdin Knowledge Systems, Ltd. | System for permitting off-line playback of digital content, and for managing content rights |
US20050229012A1 (en) * | 2000-05-05 | 2005-10-13 | Microsoft Corporation | Identifying and coalescing identical objects encrypted with different keys |
US7047369B1 (en) * | 1997-09-25 | 2006-05-16 | Aladdin Knowledge Systems Ltd. | Software application environment |
US7065650B2 (en) * | 2004-05-10 | 2006-06-20 | Aladdin Knowledge Systems Ltd. | Method for indicating the integrity of a collection of digital objects |
US7093282B2 (en) * | 2001-08-09 | 2006-08-15 | Hillhouse Robert D | Method for supporting dynamic password |
US7093137B1 (en) * | 1999-09-30 | 2006-08-15 | Casio Computer Co., Ltd. | Database management apparatus and encrypting/decrypting system |
US7356847B2 (en) * | 1996-06-28 | 2008-04-08 | Protexis, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US7925656B2 (en) * | 2008-03-07 | 2011-04-12 | International Business Machines Corporation | Node level hash join for evaluating a query |
US20120323792A1 (en) * | 1997-09-11 | 2012-12-20 | Digital Delivery Networks, Inc. | Multi platform and operating system digital content vending, delivery, and maintenance system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1993020508A1 (en) | 1992-04-07 | 1993-10-14 | Digital Equipment Corporation | Entity management system with remote call feature |
US5825876A (en) | 1995-12-04 | 1998-10-20 | Northern Telecom | Time based availability to content of a storage medium |
US7010697B2 (en) * | 1996-06-28 | 2006-03-07 | Protexis, Inc. | System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software |
-
2007
- 2007-10-30 US US11/978,566 patent/US7770230B2/en not_active Expired - Fee Related
-
2010
- 2010-07-01 US US12/801,927 patent/US20110010299A1/en not_active Abandoned
-
2016
- 2016-01-29 US US15/011,219 patent/US20160217274A1/en not_active Abandoned
Patent Citations (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4646234A (en) * | 1984-02-29 | 1987-02-24 | Brigham Young University | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs |
US4713753A (en) * | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
US4888798A (en) * | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US4736423A (en) * | 1985-04-30 | 1988-04-05 | International Business Machines Corporation | Technique for reducing RSA Crypto variable storage |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5010571A (en) * | 1986-09-10 | 1991-04-23 | Titan Linkabit Corporation | Metering retrieval of encrypted data stored in customer data retrieval terminal |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4897874A (en) * | 1988-03-31 | 1990-01-30 | American Telephone And Telegraph Company At&T Bell Laboratories | Metropolitan area network arrangement for serving virtual data networks |
US5247575A (en) * | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US5557796A (en) * | 1988-09-14 | 1996-09-17 | Digital Equipment Corp. | Extensible entity management system including a dispatching kernel and modules which independently interpret and execute commands |
US4926476A (en) * | 1989-02-03 | 1990-05-15 | Motorola, Inc. | Method and apparatus for secure execution of untrusted software |
US5123045A (en) * | 1989-08-18 | 1992-06-16 | Massachusetts Institute Of Technology | Comprehensive software protection system |
US5058162A (en) * | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5218638A (en) * | 1990-12-07 | 1993-06-08 | Hitachi Ltd. | Encipher method and decipher method |
US5504814A (en) * | 1991-07-10 | 1996-04-02 | Hughes Aircraft Company | Efficient security kernel for the 80960 extended architecture |
US5297206A (en) * | 1992-03-19 | 1994-03-22 | Orton Glenn A | Cryptographic method for communication and electronic signatures |
US5291598A (en) * | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
US5402490A (en) * | 1992-09-01 | 1995-03-28 | Motorola, Inc. | Process for improving public key authentication |
US5454101A (en) * | 1992-09-15 | 1995-09-26 | Universal Firmware Industries, Ltd. | Data storage system with set lists which contain elements associated with parents for defining a logical hierarchy and general record pointers identifying specific data sets |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5341429A (en) * | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5414772A (en) * | 1993-06-23 | 1995-05-09 | Gemplus Development | System for improving the digital signature algorithm |
US5416840A (en) * | 1993-07-06 | 1995-05-16 | Phoenix Technologies, Ltd. | Software catalog encoding method and system |
US5386369A (en) * | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
US5400403A (en) * | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
US5499295A (en) * | 1993-08-31 | 1996-03-12 | Ericsson Inc. | Method and apparatus for feature authorization and software copy protection in RF communications devices |
US5457746A (en) * | 1993-09-14 | 1995-10-10 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5646992A (en) * | 1993-09-23 | 1997-07-08 | Digital Delivery, Inc. | Assembly, distribution, and use of digital information |
US5734719A (en) * | 1993-10-15 | 1998-03-31 | International Business Systems, Incorporated | Digital information accessing, delivery and production system |
US5369702A (en) * | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5598470A (en) * | 1994-04-25 | 1997-01-28 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block |
US5563946A (en) * | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US5875247A (en) * | 1994-09-09 | 1999-02-23 | Fujitsu Limited | System for decrypting encrypted software |
US6442553B1 (en) * | 1994-10-31 | 2002-08-27 | Fujitsu Limited | Hash system and hash method for transforming records to be hashed |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US6088722A (en) * | 1994-11-29 | 2000-07-11 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5982887A (en) * | 1995-04-27 | 1999-11-09 | Casio Computer Co., Ltd. | Encrypted program executing apparatus |
US5742807A (en) * | 1995-05-31 | 1998-04-21 | Xerox Corporation | Indexing system using one-way hash for document service |
US5907617A (en) * | 1995-06-07 | 1999-05-25 | Digital River, Inc. | Try before you buy software distribution and marketing system |
US5883955A (en) * | 1995-06-07 | 1999-03-16 | Digital River, Inc. | On-line try before you buy software distribution system |
US5883954A (en) * | 1995-06-07 | 1999-03-16 | Digital River, Inc. | Self-launching encrypted try before you buy software distribution system |
US5615264A (en) * | 1995-06-08 | 1997-03-25 | Wave Systems Corp. | Encrypted data package record for use in remote transaction metered data system |
US5671412A (en) * | 1995-07-28 | 1997-09-23 | Globetrotter Software, Incorporated | License management system for software applications |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US6807534B1 (en) * | 1995-10-13 | 2004-10-19 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5999622A (en) * | 1995-11-22 | 1999-12-07 | Microsoft Corporation | Method and apparatus for protecting widely distributed digital information |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5918213A (en) * | 1995-12-22 | 1999-06-29 | Mci Communications Corporation | System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products |
US5898777A (en) * | 1996-03-07 | 1999-04-27 | Portland Software, Inc. | Digital product dissemination and sale |
US5933620A (en) * | 1996-03-28 | 1999-08-03 | Advanced Micro Devices, Inc. | Method and apparatus for serializing microprocessor identification numbers |
US7356847B2 (en) * | 1996-06-28 | 2008-04-08 | Protexis, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US5809145A (en) * | 1996-06-28 | 1998-09-15 | Paradata Systems Inc. | System for distributing digital information |
US5920868A (en) * | 1996-07-03 | 1999-07-06 | Sun Microsystems, Inc. | Cataloging apparatus for facilitating the re-use of distributed objects in a distributed object system |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5822428A (en) * | 1997-03-07 | 1998-10-13 | Great Notions Corp. | Data encryption for product information and access |
US6212525B1 (en) * | 1997-03-07 | 2001-04-03 | Apple Computer, Inc. | Hash-based system and method with primary and secondary hash functions for rapidly identifying the existence and location of an item in a file |
US5956709A (en) * | 1997-07-28 | 1999-09-21 | Xue; Yansheng | Dynamic data assembling on internet client side |
US6044469A (en) * | 1997-08-29 | 2000-03-28 | Preview Software | Software publisher or distributor configurable software security mechanism |
US20120323792A1 (en) * | 1997-09-11 | 2012-12-20 | Digital Delivery Networks, Inc. | Multi platform and operating system digital content vending, delivery, and maintenance system |
US5991402A (en) * | 1997-09-23 | 1999-11-23 | Aegisoft Corporation | Method and system of dynamic transformation of encrypted material |
US7047369B1 (en) * | 1997-09-25 | 2006-05-16 | Aladdin Knowledge Systems Ltd. | Software application environment |
US6434532B2 (en) * | 1998-03-12 | 2002-08-13 | Aladdin Knowledge Systems, Ltd. | Interactive customer support for computer programs using network connection of user machine |
US6334214B1 (en) * | 1998-04-03 | 2001-12-25 | Preview Software | Try/buy wrapping of installation-ready software for electronic distribution |
US6243692B1 (en) * | 1998-05-22 | 2001-06-05 | Preview Software | Secure electronic software packaging using setup-external unlocking module |
US6363356B1 (en) * | 1998-07-16 | 2002-03-26 | Preview Software | Referrer-based system for try/buy electronic software distribution |
US20020087500A1 (en) * | 1998-08-18 | 2002-07-04 | Brian T. Berkowitz | In-memory database system |
US20010042045A1 (en) * | 1999-02-08 | 2001-11-15 | Howard Christopher J. | Limited-use browser and security system |
US7130831B2 (en) * | 1999-02-08 | 2006-10-31 | Copyright Clearance Center, Inc. | Limited-use browser and security system |
US7093137B1 (en) * | 1999-09-30 | 2006-08-15 | Casio Computer Co., Ltd. | Database management apparatus and encrypting/decrypting system |
US20010034658A1 (en) * | 2000-02-23 | 2001-10-25 | Silva Juliana Freire | Applications of executable shopping lists |
US20050229012A1 (en) * | 2000-05-05 | 2005-10-13 | Microsoft Corporation | Identifying and coalescing identical objects encrypted with different keys |
US20020136407A1 (en) * | 2000-10-30 | 2002-09-26 | Denning Dorothy E. | System and method for delivering encrypted information in a communication network using location identity and key tables |
US6915425B2 (en) * | 2000-12-13 | 2005-07-05 | Aladdin Knowledge Systems, Ltd. | System for permitting off-line playback of digital content, and for managing content rights |
US20020174355A1 (en) * | 2001-03-12 | 2002-11-21 | Arcot Systems, Inc. | Techniques for searching encrypted files |
US7093282B2 (en) * | 2001-08-09 | 2006-08-15 | Hillhouse Robert D | Method for supporting dynamic password |
US6898555B2 (en) * | 2003-07-14 | 2005-05-24 | Aladdin Knowledge Systems Ltd. | Method for indicating the integrity of use-information of a computer program |
US7065650B2 (en) * | 2004-05-10 | 2006-06-20 | Aladdin Knowledge Systems Ltd. | Method for indicating the integrity of a collection of digital objects |
US7925656B2 (en) * | 2008-03-07 | 2011-04-12 | International Business Machines Corporation | Node level hash join for evaluating a query |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100235264A1 (en) * | 2006-11-10 | 2010-09-16 | Media Patents, S.L. | Process for the on-line sale of a software product |
US20100235263A1 (en) * | 2006-11-10 | 2010-09-16 | Media Patents, S.L. | Process for implementing a method for the on-line sale of software product use licenses through a data network, and software component which allows carrying out said process |
US20110060689A1 (en) * | 2006-11-10 | 2011-03-10 | Media Patents, S.L. | Process for implementing a method for the on-line sale of software products and the activation of use licenses through a data network |
US20110078044A1 (en) * | 2006-11-10 | 2011-03-31 | Media Patents, S.L. | Process for implementing a method for the on-line sale of software product use licenses through a data network, and software component which allows carrying out said process |
US8645278B2 (en) | 2006-11-10 | 2014-02-04 | Media Patents, S.L. | Process for the on-line sale of a software product |
US8645277B2 (en) | 2006-11-10 | 2014-02-04 | Media Patents, S.L. | Process for the on-line sale of a software product |
US20090260003A1 (en) * | 2008-04-09 | 2009-10-15 | Canon Kabushiki Kaisha | Application packaging device and method for controlling the same |
US20090300366A1 (en) * | 2008-05-30 | 2009-12-03 | Markus Gueller | System and Method for Providing a Secure Application Fragmentation Environment |
US8478973B2 (en) * | 2008-05-30 | 2013-07-02 | Infineon Technologies Ag | System and method for providing a secure application fragmentation environment |
US20120173735A1 (en) * | 2010-12-30 | 2012-07-05 | Robert Bosch Gmbh | Radio Tool and Method for the Operation Thereof |
US11514074B2 (en) * | 2015-09-30 | 2022-11-29 | EMC IP Holding Company LLC | Method and system for optimizing data replication for large scale archives |
Also Published As
Publication number | Publication date |
---|---|
US20160217274A1 (en) | 2016-07-28 |
US20080175384A1 (en) | 2008-07-24 |
US7770230B2 (en) | 2010-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7743427B2 (en) | System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software | |
US7770230B2 (en) | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software | |
US7356847B2 (en) | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software | |
US5809145A (en) | System for distributing digital information | |
US6223288B1 (en) | System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers | |
JP4574097B2 (en) | Content distribution system, reference server | |
US7483958B1 (en) | Methods and apparatuses for sharing media content, libraries and playlists | |
US6944776B1 (en) | System and method for data rights management | |
JPH11232286A (en) | Information retrieving system | |
US7895123B1 (en) | Digital content publication | |
JPWO2002056580A1 (en) | Content directory service system | |
US20030095660A1 (en) | System and method for protecting digital works on a communication network | |
US10339282B2 (en) | File origin determination | |
US8799643B2 (en) | System and method for monitoring secure data on a network | |
WO2001075562A2 (en) | Digital rights management within an embedded storage device | |
JP2003508995A (en) | System and method for securely storing, transferring and retrieving content-referenced information | |
JP2004532439A (en) | Apparatus, method and system for accessing digital rights management information | |
US20020034304A1 (en) | Method of preventing illegal copying of an electronic document | |
JP4006214B2 (en) | Data search system, data relay server, database server, and database access method | |
JP2005516278A (en) | Method and system for transmitting and distributing information in a secret manner and for physically exemplifying information transmitted in an intermediate information storage medium | |
JP2003030156A (en) | System, server and method for contents distribution | |
JP2002314523A (en) | Method for providing distribution contents including advertisement employing peer-to-peer network, and its management server, and user terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ARVATO DIGITAL SERVICES LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ARVATO DIGITAL SERVICES CANADA, INC.;REEL/FRAME:033563/0241 Effective date: 20140811 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |