Method and system for securing local database file of local content stored on end-user system
First Claim
1. A method for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the method comprising the steps of:
- receiving an encrypted file from storage wherein the file has a beginning, an end and trailer section located just prior to the end;
reading a predetermined distance into the file to retrieve an identifier placed at a predetermined position;
decrypting a identifier with a first decrypting key;
determining if the identifier is valid and if the identifier is valid then performing the steps of;
reading the trailer section from the file;
decrypting the trailer section with the first decrypting key;
determining if the there are any updates in the trailer section and if there are no updates to the trailer section then performing the steps of;
decrypting a reference table containing one or more data table location indicators for data items with the first decrypting key;
decrypting one or data items with the first decrypting key; and
populating the data table with data items at locations specified in the reference table with data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for forming a data table in memory on an end user system. The data table forming a library index of storage locations to electronic digital content in memory. The method consists of retrieving an encrypted file from storage. The file has a beginning, an end and a trailer section located just prior to the end. The file is read from the end a predetermined distance to verify if an identifier is present. Reading and decrypting the trailer section from the file read. Determining if there are any updates in the trailer section. In the case there are no updates in the trailer section then decrypting the reference table containing one or more data table location indicators for data items with the first decrypting key. Next, decrypting one or data items with the first decrypting key. Populating the data table with data items at locations specified in the reference table.
428 Citations
16 Claims
-
1. A method for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the method comprising the steps of:
-
receiving an encrypted file from storage wherein the file has a beginning, an end and trailer section located just prior to the end;
reading a predetermined distance into the file to retrieve an identifier placed at a predetermined position;
decrypting a identifier with a first decrypting key;
determining if the identifier is valid and if the identifier is valid then performing the steps of;
reading the trailer section from the file;
decrypting the trailer section with the first decrypting key;
determining if the there are any updates in the trailer section and if there are no updates to the trailer section then performing the steps of;
decrypting a reference table containing one or more data table location indicators for data items with the first decrypting key;
decrypting one or data items with the first decrypting key; and
populating the data table with data items at locations specified in the reference table with data. - View Dependent Claims (2, 3, 4)
-
-
5. A method for storing electronic digital content, the content containing an index to memory address locations containing one or more members forming the library, the library index stored in a data table in memory, the data table comprising one or more entries with address references to metadata and address references to content data for each of the one or more members forming the library, the method comprising the steps of:
-
writing a header section comprising a row/size indicator;
writing a data section immediately after the header section, the data section comprising one or more data items represented in a length-data string format, wherein the data section comprises references to one or more pieces of metadata and content data forming the one or more members in the library of electronic digital content;
writing a reference table section immediately after the data section, the reference table section comprising a plurality of row/column entries, wherein a number of columns forming each row is specified by the row/size indicator and wherein one or more row/column entries in each row of the reference table represent offsets to each of the one or more pieces of metadata and content data forming the electronic digital content; and
writing a trailer section immediately after the reference table section, the trailer section comprising an offset to the beginning of the reference table. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the method comprising the steps of:
-
retrieving an encrypted file from storage wherein the file has a beginning, an end and trailer section located just prior to the end;
reading from the end of the file, a predetermined distance, to read an identifier placed at a predetermined position;
decrypting a token with a first decrypting key;
determining if the token is valid and if the token is valid then performing the steps of;
reading the trailer section from the file;
decrypting the trailer section with the first decrypting key;
determining if the there are any updates in the trailer section and if there are no updates to the trailer section then performing the steps of;
decrypting a reference table containing one or more data table location indicators for data items with the first decrypting key;
decrypting one or data items with the first decrypting key; and
populating the data table with data items at locations specified in the reference table with data.
-
-
11. A computer readable medium containing programming instruction for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the programming instructions comprising:
-
receiving an encrypted file from storage wherein the file has a beginning, an end and trailer section located just prior to the end;
reading a predetermined distance into the file to retrieve an identifier placed at a predetermined position;
decrypting a identifier with a first decrypting key;
determining if the identifier is valid and if the identifier is valid then performing the steps of;
reading the trailer section from the file;
decrypting the trailer section with the first decrypting key;
determining if the there are any updates in the trailer section and if there are no updates to the trailer section then performing the steps of;
decrypting a reference table containing one or more data table location indicators for data items with the first decrypting key;
decrypting one or data items with the first decrypting key; and
populating the data table with data items at locations specified in the reference table with data. - View Dependent Claims (12, 13, 14)
-
-
15. An end user information processing system comprising:
-
a data table stored in memory, the data table forming a library index of storage locations to electronic digital content;
an encrypted file received receiving from storage wherein the file has a beginning, an end and trailer section located just prior to the end;
an identifier placed at a predetermined distance in the file;
a first decrypting key for decrypting a identifier;
means for determining if the identifier is valid and if the identifier is valid then means for determining if there are any updates in the trailer section, wherein the trailer section has been decrypted with the first decrypting key section, and if there are any updates in the trailer section then populating the data table with data items at locations specified in the reference table with data. - View Dependent Claims (16)
-
Specification