Method and device for protecting information against unauthorised use
0 Assignments
0 Petitions
Accused Products
Abstract
Described are method and device for protecting information against unauthorized use. Information obtained by the user is encrypted using an asymmetrical cryptography method with a user'"'"'s key which is received by a distributor of information. The information is decoded before the use thereof with the aid of a private key of the user. Decryption may be carried out directly in a CPU of the user'"'"'s computer user so that the decrypted information does not exist outside the processor.
-
Citations
133 Claims
-
1-64. -64. (Cancelled).
-
65. A method for protecting against an unauthorized use of information, comprising the steps of:
-
obtaining by a Vendor a consumer public key;
encrypting the information using an asymmetrical cryptography algorithm with the consumer public key;
obtaining by the Consumer a consumer private key corresponding to the consumer public key; and
immediately before use of the information by the Consumer, decrypting the information with the consumer private key, wherein when the information is not being used, the information is stored in a form encrypted with the consumer public key. - View Dependent Claims (66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
-
77. A method for protection against an unauthorized duplication of information, comprising the steps of:
-
obtaining by a Vendor a consumer public key;
generating by the Vendor a random key for an asymmetrical cryptography algorithm;
encrypting the information using the asymmetrical cryptography algorithm and the random key;
encrypting the random key using the asymmetrical cryptography algorithm and the consumer public key;
obtaining by the Consumer a consumer private key corresponding to the consumer public key;
decrypting the encrypted random key obtained by the Consumer from the Vendor using (a) a further asymmetrical cryptography algorithm corresponding to the asymmetrical cryptography algorithm and (b) the consumer private key, wherein the random key is decrypted immediately before use of the information by the Consumer, and wherein when the information is not being used, the random key is stored in a form decrypted using the consumer public key; and
decrypting by the Consumer the information obtained from the Vendor using the further asymmetrical cryptography algorithm and the decrypted random key. - View Dependent Claims (78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91)
-
-
92. A system for protecting against an unauthorized duplication of information, comprising:
-
a vendor arrangement obtaining a consumer public key and encrypting the information using an asymmetrical algorithm with the consumer public key; and
a consumer arrangement obtaining a consumer private key corresponding to the consumer public key and decrypting the information, immediately before its use by the Consumer, using the asymmetrical algorithm with the consumer private key, wherein when the information is not being used, the consumer arrangement stores the information in a form encrypted with the consumer public key. - View Dependent Claims (93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109)
-
-
110. A system for protecting against unauthorized use of information, comprising:
-
a vendor arrangement obtaining a consumer public key and generating a random key for a symmetrical cryptography algorithm, the vendor arrangement encrypting the information using the symmetrical cryptography algorithm and the random key and encrypting the random key using the symmetrical cryptography algorithm and the consumer public key; and
a consumer arrangement obtaining a consumer private key corresponding to the consumer public key, the consumer arrangement decrypting the encrypted random key, immediately before use of the information, using an asymmetrical cryptography algorithm and the consumer private key, wherein when the information is not being used, the random key is stored in a form encrypted using the consumer public key, and wherein the consumer arrangement decrypts the information using the symmetrical cryptography algorithm and the decrypted random key. - View Dependent Claims (111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133)
-
Specification