Method and apparatus for providing electronic data
First Claim
1. A method of providing electronic data from a first computer to a second computer, the method comprising the steps of:
- 1;
at least partially encrypting the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd), 2;
communicating the at least partially encrypted data from the first computer to the second computer, 3;
the second computer requesting the decryption key (Kd) from the first computer, 4;
the first computer providing the decryption key (Kd) to the second computer, 5;
the second computer decrypting the at least partially encrypted data using the decryption key (Kd), 6;
rendering the decryption key (Kd) unfit for use, 7;
outputting the data to an output device.
2 Assignments
0 Petitions
Accused Products
Abstract
Method and apparatus for preventing illegal copying of copyright material. Encrypted data is transmitted from a first computer to a second computer, and the decryption key has to be requested each time the user want to gain access to the data in an unencrypted form. The encryption key is subsequently rendered unfit for use and/or the decrypted data is rendered unfit for use. The decryption key may be stored in a non-accessible part of a hardware processor of the second computer. Access to the data in an unencrypted form, e.g. the number of copies, may thus be controlled. Further, a method of distributing electronic data from a number of publishers to a number of recipients. Each publisher makes data available from e.g. a web site, and the recipients may purchase the data via a global computer network. The data is distributed in a safe manner as described above. Makes it possible to publish small editions of data while still protecting the copyright.
80 Citations
102 Claims
-
1. A method of providing electronic data from a first computer to a second computer, the method comprising the steps of:
-
1;
at least partially encrypting the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicating the at least partially encrypted data from the first computer to the second computer,3;
the second computer requesting the decryption key (Kd) from the first computer,4;
the first computer providing the decryption key (Kd) to the second computer,5;
the second computer decrypting the at least partially encrypted data using the decryption key (Kd),6;
rendering the decryption key (Kd) unfit for use,7;
outputting the data to an output device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 27, 28, 29, 30, 31, 32, 33, 34, 35, 40, 41, 42, 43, 44, 45, 46, 48, 49, 50, 51, 52, 53, 54)
-
-
23. A computer program system for providing electronic data from a first computer to a second computer, the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicate the at least partially encrypted data from the first computer to the second computer3;
provide a request for the decryption key (Kd) from the second computer to the first computer,4;
cause the first computer to provide the decryption key (Kd) to the second computer,5;
cause the second computer to decrypt the at least partially encrypted data using the decryption key (Kd),6;
render the decryption key (Kd) unfit for use,7;
output the data to an output device.
-
-
24. A computer readable data carrier loaded with a computer program system for providing electronic data from a first computer to a second computer, the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicate the at least partially encrypted data from the first computer to the second computer,3;
provide a request for the decryption key (Kd) from the second computer to the first computer,4;
cause the first computer to provide the decryption key (Kd) to the second computer,5;
cause the second computer to decrypt the at least partially encrypted data using the decryption key (Kd),6;
render the decryption key (Kd) unfit for use,7;
output the data to an output device.
-
-
25. A computer system operatively connected to a computer readable data carrier loaded with a computer program system for providing electronic data from a first computer of the computer system to a second computer of the computer system, the computer system and the program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicate the at least partially encrypted data from the first computer to the second computer,3;
provide a request for the decryption key (Kd) from the second computer to the first computer,4;
cause the first computer to provide the decryption key (Kd) to the second computer,5;
cause the second computer to decrypt the at least partially encrypted data using the decryption key (Kd),6;
render the decryption key (Kd) unfit for use,7;
output the data to an output device.
-
-
26. A method of providing electronic data from a first computer to a second computer, the method comprising the steps of:
-
1;
at least partially encrypting the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
the second computer requesting the decryption key (Kd) from the first computer,3;
the first computer providing the decryption key (Kd) to the second computer,4;
communicating the at least partially encrypted data from the first computer to the second computer,5;
the second computer concurrently receiving and decrypting, by means of a decryption computer program, the at least partially encrypted data, and outputting the data to a selected data output computer program for outputting a signal representative of the decrypted data to a selected software program or hardware device, the data output computer program being known to render the decrypted data unfit for use after output thereof to the selected software program or hardware device,6;
rendering the decrypted data unfit for use.
-
-
36. A computer program system of providing electronic data from a first computer to a second computer, the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
cause the second computer to request the decryption key (Kd) from the first computer,3;
cause the first computer to provide the decryption key (Kd) to the second computer,4;
communicate the at least partially encrypted data from the first computer to the second computer,5;
cause the second computer to concurrently receive and decrypt, by means of a decryption computer program, the at least partially encrypted data, and output the data to a selected data output computer program outputting a signal representative of the decrypted data to a selected software program or hardware device, and cause the data output computer program to render the decrypted data unfit for use after output thereof to the selected software program or hardware device,6;
render the decrypted data unfit for use.
-
-
37. A computer readable data carrier loaded with a computer program system of providing electronic data from a first computer to a second computer, the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
cause the second computer to request the decryption key (Kd) from the first computer,3;
cause the first computer to provide the decryption key (Kd) to the second computer,4;
communicate the at least partially encrypted data from the first computer to the second computer,5;
cause the second computer to concurrently receive and decrypt, by means of a decryption computer program, the at least partially encrypted data, and output the data to a selected data output computer program for outputting a signal representative of the decrypted data to a selected software program or hardware device, and cause the data output computer program to render the decrypted data unfit for use after output thereof to the selected software program or hardware device,6;
render the decrypted data unfit for use.
-
-
38. A computer system operatively connected to a computer readable data carrier loaded with a computer program system of providing electronic data from a first computer of the computer system to a second computer of the computer system, the computer system and the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
cause the second computer to request the decryption key (Kd) from the first computer,3;
cause the first computer to provide the decryption key (Kd) to the second computer,4;
communicate the at least partially encrypted data from the first computer to the second computer,5;
cause the second computer to concurrently receive and decrypt, by means of a decryption computer program, the at least partially encrypted data, and output the data to a selected data output computer program for outputting a signal representative of the decrypted data to a selected software program or hardware device, and cause the data output computer program to render the decrypted data unfit for use after output thereof to the selected software program or hardware device,6;
render the decrypted data unfit for use.
-
-
39. A computer system for providing electronic data comprising
a first computer, a second computer, an output device, the first computer comprising encryption means for at least partially encrypting data with an encryption key (Kg), said encryption key (Kg) having a corresponding decryption key (Kd), first communication means for communicating the at least partially encrypted data to the second computer, providing means for providing the decryption key (Kd) to the second computer on request, the second computer comprising second communication means for receiving the at least partially encrypted data from the first computer, requesting and receiving means for requesting and receiving the decryption key (Kd) from the first computer, decryption means for decrypting the at least partially encrypted data, outputting means for outputting the data to the output device, means for rendering the decryption key (Kd) unfit for use.
-
47. A method of transferring data from a computer system to an output device, the computer system comprising a first computer and a plurality of second computers, said first computer and said second computers being interconnected via a computer network, the data being present at at least one of the second computers, the method comprising the steps of:
-
1;
sending, by means of said at least one second computer, a request to the first computer for permission to output the data to the output device, said request including an identification of the output device,2;
checking, by means of the first computer, whether the output device is an allowed type of output device,3;
the first computer providing an answer to the request to the second computer, the answer including a permission to output the data to the output device if the output device is of an allowed type,4;
if the output device is of an allowed type;
outputting the data from the second computer to the output device.
-
-
55. A computer program system for transferring data from a computer system to an output device, the computer system comprising a first computer and a plurality of second computers, said first computer and said second computers being interconnected via a computer network, the data being present at at least one of the second computers, the computer program system being adapted to:
-
1;
send, by means of said at least one second computer, a request to the first computer for permission to output the data to the output device, said request including an identification of the output device,2;
check, by means of the first computer, whether the output device is an allowed type of output device,3;
cause the first computer to provide an answer to the request to the second computer, the answer including a permission to output the data to the output device if the output device is of an allowed type,4;
if the output device is of an allowed type;
output the data from the second computer to the output device. - View Dependent Claims (59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
-
56. A computer readable data carrier loaded with a computer program system for transferring data from a computer system to an output device, the computer system comprising a first computer and a plurality of second computers, said first computer and said second computers being interconnected via a computer network, the data being present at at least one of the second computers, the computer program system being adapted to:
-
1;
send, by means of said at least one second computer, a request to the first computer for permission to output the data to the output device, said request including an identification of the output device,2;
check, by means of the first computer, whether the output device is an allowed type of output device,3;
cause the first computer to provide an answer to the request to the second computer, the answer including a permission to output the data to the output device if the output device is of an allowed type,4;
if the output device is of an allowed type;
output the data from the second computer to the output device.
-
-
57. A computer system operatively connected to a computer readable data carrier loaded with a computer program system for transferring data from a computer system to an output device, the computer system comprising a first computer and a plurality of second computers, said first computer and said second computers being interconnected via a computer network, the data being present at at least one of the second computers, the computer system and the computer program system being adapted to:
-
1;
send, by means of said at least one second computer, a request to the first computer for permission to output the data to the output device, said request including an identification of the output device,2;
check, by means of the first computer, whether the output device is an allowed type of output device,3;
cause the first computer to provide an answer to the request to the second computer, the answer including a permission to output the data to the output device if the output device is of an allowed type,4;
if the output device is of an allowed type;
output the data from the second computer to the output device.
-
-
58. A method of providing electronic data from a first computer to a second computer, the second computer comprising an output device, the method comprising the steps of:
-
1;
at least partially encrypting the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicating the at least partially encrypted data from the first computer to the second computer,3;
the second computer requesting the decryption key (Kd) from the first computer,4;
checking whether the driver of the output device is an allowed type of driver,5;
the first computer providing the decryption key (Kd) to the second computer only if said driver is an allowed type of driver,6;
the second computer decrypting the at least partially encrypted data in case said decryption key (Kd) is provided,7;
outputting the decrypted data to the output device.
-
-
70. A computer program system for providing electronic data from a first computer to a second computer, the second computer comprising an output device, the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicate the at least partially encrypted data from the first computer to the second computer,3;
cause the second computer to request the decryption key (Kd) from the first computer,4;
check whether the driver of the output device is an allowed type of driver,5;
cause the first computer to provide the decryption key (Kd) to the second computer only if said driver is an allowed type of driver,6;
cause the second computer to decrypt the at least partially encrypted data in case said decryption key (Kd) is provided,7;
output the decrypted data to the output device.
-
-
71. A computer readable data carrier loaded with a computer program system for providing electronic data from a first computer to a second computer, the second computer comprising an output device, the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicate the at least partially encrypted data from the first computer to the second computer,3;
cause the second computer to request the decryption key (Kd) from the first computer,4;
check whether the driver of the output device is an allowed type of driver,5;
cause the first computer to provide the decryption key (Kd) to the second computer only if said driver is an allowed type of driver,6;
cause the second computer to decrypt the at least partially encrypted data in case said decryption key (Kd) is provided,7;
output the decrypted data to the output device.
-
-
72. A computer system operatively connected to a computer readable data carrier loaded with a computer program system for providing electronic data from a first computer to a second computer, the second computer comprising an output device, the computer system and the computer program system being adapted to:
-
1;
at least partially encrypt the data with an encryption key (Kg) in the first computer, said encryption key (Kg) having a corresponding decryption key (Kd),2;
communicate the at least partially encrypted data from the first computer to the second computer,3;
cause the second computer to request the decryption key (Kd) from the first computer,4;
check whether the driver of the output device is an allowed type of driver,5;
cause the first computer to provide the decryption key (Kd) to the second computer only if said driver is an allowed type of driver,6;
cause the second computer to decrypt the at least partially encrypted data in case said decryption key (Kd) is provided,7;
output the decrypted data to the output device.
-
-
73. A method of decrypting data, the method utilising a hardware processor containing an inaccessible part, the method comprising, by means of said hardware processor:
-
storing, in the hardware processor, an encryption/decryption key (AB) comprising a public part (A) and a corresponding private part (B), the private part (B) of the key (AB) being stored in the inaccessible part of the hardware processor, outputting the public part (A) of the key (AB) to an external processor or program, receiving, from said external processor, an encrypted decryption key (E) which is encrypted by means of the public part (A) of the key (AB), decrypting key (E) into the inaccessible part of the hardware processor by using the private part (B), receiving data encrypted with encryption key (E), decrypting the data using the decrypted key (E), outputting the decrypted data. - View Dependent Claims (74, 75, 76, 77, 78, 79)
-
-
80. A computer program system for decrypting data, the computer program system being adapted to co-operate with a hardware processor containing an inaccessible part, the computer program system being further adapted to, in co-operation with the hardware processor:
-
store, in the hardware processor, an encryption/decryption key (AB) comprising a public part (A) and a corresponding private part (B), the private part (B) of the key (AB) being stored in the inaccessible part of the hardware processor, output the public part (A) of the key (AB) to an external processor or program, receive, from said external processor, an encrypted decryption key (E) which is encrypted by means of the public part (A) of the key (AB), decrypt key (E) into the inaccessible part of the hardware processor by using the private part (B), receive data encrypted with encryption key (E), decrypt the data using the decrypted key (E), output the decrypted data.
-
-
81. A computer readable data carrier loaded with a computer program system for decrypting data, the computer program system being adapted to co-operate with a hardware processor containing an inaccessible part, the computer program system being further adapted to, in co-operation with the hardware processor:
-
store, in the hardware processor, an encryption/decryption key (AB) comprising a public part (A) and a corresponding private part (B), the private part (B) of the key (AB) being stored in the inaccessible part of the hardware processor, output the public part (A) of the key (AB) to an external processor or program, receive, from said external processor, an encrypted decryption key (E) which is encrypted by means of the public part (A) of the key (AB), decrypt key (E) into the inaccessible part of the hardware processor by using the private part (B), receive data encrypted with encryption key (E), decrypt the data using the decrypted key (E), output the decrypted data.
-
-
82. A computer system operatively connected to a computer readable data carrier loaded with a computer program system for decrypting data, the computer system and the computer program system being adapted to co-operate with a hardware processor containing an inaccessible part, the computer system and the computer program system being further adapted to, in co-operation with the hardware processor:
-
store, in the hardware processor, an encryption/decryption key (AB) comprising a public part (A) and a corresponding private part (B), the private part (B) of the key (AB) being stored in the inaccessible part of the hardware processor, output the public part (A) of the key (AB) to an external processor or program, receive, from said external processor, an encrypted decryption key (E) which is encrypted by means of the public part (A) of the key (AB), decrypt key (E) into the inaccessible part of the hardware processor by using the private part (B), receive data encrypted with encryption key (E), decrypt the data using the decrypted key (E), output the decrypted data.
-
-
83. An electronic processor containing an inaccessible part, and being adapted to, in cooperation with a computer program system, to decrypt data and to:
-
store, in the hardware processor, an encryption/decryption key (AB) comprising a public part (A) and a corresponding private part (B), the private part (B) of the key (AB) being stored in the inaccessible part of the hardware processor, output the public part (A) of the key (AB) to an external processor or program, receive, from said external processor, an encrypted decryption key (E) which is encrypted by means of the public part (A) of the key (AB), decrypt key (E) into the inaccessible part of the hardware processor by using the private part (B), receive data encrypted with encryption key (E), decrypt the data using the decrypted key (E), output the decrypted data.
-
-
84. A method of distributing electronic data via a computer network, said electronic data originating from a plurality of publishers, the method comprising the steps of:
-
1;
each of the plurality of publishers making electronic data available from a first computer being connected to the computer network,2;
the first computer distributing electronic data to users on demand, and3;
the first computer controlling the usage of the electronic data being made available to each user. - View Dependent Claims (85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99)
-
-
100. A computer program system for distributing electronic data via a computer network, said electronic data originating from a plurality of publishers, the computer program system being adapted to:
-
1;
cause each of the plurality of publishers to make electronic data available from a first computer being connected to the computer network,2;
cause the first computer to distribute electronic data to users on demand, and3;
cause the first computer to control the usage of the electronic data being made available to each user.
-
-
101. A computer readable data carrier loaded with a computer program system for distributing electronic data via a computer network, said electronic data originating from a plurality of publishers, the computer program system being adapted to:
-
1;
cause each of the plurality of publishers to make electronic data available from a first computer being connected to the computer network,2;
cause the first computer to distribute electronic data to users on demand, and3;
cause the first computer to control the usage of the electronic data being made available to each user.
-
-
102. A computer system operatively connected to a readable data carrier loaded with a computer program system for distributing electronic data via a computer network, said electronic data originating from a plurality of publishers, the computer system and the computer program system being adapted to:
-
1;
cause each of the plurality of publishers to make electronic data available from a first computer being connected to the computer network,2;
cause the first computer to distribute electronic data to users on demand, and3;
cause the first computer to control the usage of the electronic data being made available to each user.
-
Specification