Method for controlling the distribution of data
First Claim
Patent Images
1. A method for controlling the use of data on a device by a user, comprising the steps of:
- issuing a smart card to the user by a first party, wherein a private key which is assigned to the user is stored on the smart card, wherein the private key is usable but not known by the user and the private key can not be used until the card is activated by authenticating that the user is authorized to use the smart card;
encrypting data to be sent to the user using a public key assigned to the user before distributing the data to the user; and
after distribution of the data to the user, prompting the user to enter a private key each time the user wants to use the data, wherein the user inserts the smart card into a smart card reader connected to the device and activates the smart card, wherein the device decrypts the encrypted data using the private key.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for protecting digital information which places a financial risk on a purchaser of digital information if the digital information is illegally copied is disclosed. The digital information being purchased is first encoded using a public key before being distributed to the purchaser. Each time the digital information is used, the digital information must be decoded using a private key which is stored on a smart card such as a credit card or an identification card, wherein the private key can not be used until the user of the smart card has been properly authenticated.
-
Citations
32 Claims
-
1. A method for controlling the use of data on a device by a user, comprising the steps of:
-
issuing a smart card to the user by a first party, wherein a private key which is assigned to the user is stored on the smart card, wherein the private key is usable but not known by the user and the private key can not be used until the card is activated by authenticating that the user is authorized to use the smart card;
encrypting data to be sent to the user using a public key assigned to the user before distributing the data to the user; and
after distribution of the data to the user, prompting the user to enter a private key each time the user wants to use the data, wherein the user inserts the smart card into a smart card reader connected to the device and activates the smart card, wherein the device decrypts the encrypted data using the private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for controlling the use of data on a device by a user, comprising the steps of:
-
issuing a smart card to the user by a first party, wherein a first private key which is assigned to the user is stored on the smart card, wherein the first private key is usable but not known by the user and the first private key can not be used until the card is activated by authenticating that the user is authorized to use the smart card;
obtaining at least a second set of public and private keys and storing the at least second private key on the smart card;
encrypting data to be sent to the user using a first public key assigned to the user and the second public key before distributing the data to the user; and
after distribution of the data to the user, prompting the user to enter the first and at least second private keys each time the user wants to use the data, wherein the user inserts the smart card into a smart card reader connected to the device and activates the smart card, wherein the device decrypts the encrypted data using the first and at least second private keys. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for controlling the use of data on a device by a user, comprising the steps of:
-
encrypting data to be sent to the user using at least one public key assigned to the user before distributing the data to the user; and
after distribution of the data to the user, prompting the user to enter at least one private key each time the user wants to use the data, wherein the at least one private key is stored on a smart and the at least one private key is usable but not known by the user and the at least one private key can not be used until the card is activated by authenticating that the user is authorized to use the smart card, wherein the user inserts the smart card into a smart card reader connected to the device and activates the smart card, wherein the device decrypts the encrypted data using the private key. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for controlling the use of data on a device by a user, comprising the steps of:
-
encrypting data to be sold to the user by a seller using at least one public key assigned to the user before distributing the data to the user; and
after distribution of the data to the user, the user is prompted by the device to enter at least one private key each time the user wants to use the data, wherein the at least one private key is stored on a smart and the at least one private key is usable but not known by the user and the at least one private key can not be used until the card is activated by authenticating that the user is authorized to use the smart card, wherein the user inserts the smart card into a smart card reader connected to the device and activates the smart card, wherein the device decrypts the encrypted data using the private key.
-
Specification