Method for providing multimedia files and terminal therefor
First Claim
Patent Images
1. A method of securely distributing a data file to a user, the method comprising the steps of:
- encrypting a first key using a second key, to provide an encrypted first key;
storing the encrypted first key on an integrated circuit card at a first party;
providing the integrated circuit card to the user;
encrypting the data file using the first key, to result in an encrypted data file at the first party; and
distributing the encrypted file to a second party for delivery of the encrypted data file from the second party to a terminal associated with the user for downloading of the data file from the second party using the integrated circuit card.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of and a system for securely distributing data files to a user. A first key is encrypted using a second key. The encrypted first key is stored on an integrated circuit card that is associated with the user. The integrated circuit card is provided to the user. Data files are encrypted using the first key to get an encrypted data file at a first party. The encryption parameters are exchanged between the first party and integrated circuit card.
-
Citations
45 Claims
-
1. A method of securely distributing a data file to a user, the method comprising the steps of:
-
encrypting a first key using a second key, to provide an encrypted first key;
storing the encrypted first key on an integrated circuit card at a first party;
providing the integrated circuit card to the user;
encrypting the data file using the first key, to result in an encrypted data file at the first party; and
distributing the encrypted file to a second party for delivery of the encrypted data file from the second party to a terminal associated with the user for downloading of the data file from the second party using the integrated circuit card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 33)
-
-
8. A system for securely distributing at least one data file, the system comprising:
-
a first party for issuing the data file and a first integrated circuit card, wherein the first party is coupled with a second integrated circuit card;
a second party for distributing the issued data file, wherein the second party is coupled with a third integrated circuit card; and
a third party for presenting the distributed data file, wherein the third party is coupled with the first integrated circuit card. - View Dependent Claims (9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 29, 30)
-
-
15. A method of monitoring a securely distributed data file, the method comprising the steps of:
-
storing at least one index on an integrated circuit card; and
associating the index with the data file, wherein the integrated circuit card is associated with a party.
-
-
28. A wireless terminal for receiving secure data in a communication network, the wireless terminal comprising:
-
a wireless module for receiving the secure data from a data source;
an integrated circuit card interface for coupling an integrated circuit card to the wireless terminal;
a storage device connected to the wireless module for storing the received secure data;
a secure module including a first key, the secure module connected to the integrated circuit card interface and the storage device for obtaining a second key from the coupled integrated circuit card and, in response to a request, decrypting the received secure data with the second key; and
an output device connected to the secure module for presenting the decrypted data.
-
-
31. An integrated circuit card for storing an encrypted key for decryption of an encrypted data file, the integrated circuit card adapted to be coupled to a wireless terminal, the integrated circuit card comprising:
-
an interface for coupling the integrated circuit card to the wireless terminal;
a storage device for storing the encrypted key and at least one index; and
a processor for processing data between the interface and the storage. - View Dependent Claims (32, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method of billing for a securely distributed data file, the method comprising the steps of:
-
encrypting a first key using a second key, to provide an encrypted first key;
storing the encrypted first key on an integrated circuit card at a first party;
providing the integrated circuit card to the user;
encrypting the data file using the first key, to result in an encrypted data file at the first party;
distributing the encrypted file to a second party for delivery of the encrypted data file from the second party to a terminal associated with the user for downloading of the data file from the second party using the integrated circuit card; and
updating a value of delivery parameters of the parties. - View Dependent Claims (42, 43)
-
-
44. A method of advertising in a securely distributed data file, the method comprising the steps of:
-
encrypting a first key using a second key, to provide in an encrypted first key;
storing the encrypted first key on an integrated circuit card at a first party;
providing the integrated circuit card to a user;
encrypting the data file using the first key, to result in an encrypted data file at the first party;
distributing the encrypted file to a second party for delivery of the encrypted data file from the second party to a terminal associated with the user for downloading of the data file from the second party using the integrated circuit card; and
connecting a distribution label to the securely distributed data file for visual identification of a desired effect.
-
-
45. A method of controlling access to a distributor in a multi-distributor environment, the method comprising the steps of:
-
encrypting a first key using a second key, to provide in an encrypted first key;
storing the encrypted first key on an integrated circuit card at a first party;
providing the integrated circuit card to a user;
encrypting a data file using the first key, to result in an encrypted data file at the first party;
distributing the encrypted file to a second party for delivery of the encrypted data file from the second party to a terminal associated with the user for downloading of the data file from the second party using the integrated circuit card, wherein a validity value of the integrated circuit card is checked at the second party; and
dividing rights between parties to enable the user to access the data files of different first parties.
-
Specification