Secure content system and method
First Claim
Patent Images
1. A method of authenticating a file to be executed, comprising the steps of:
- generating a key pair, comprising a public key and a private key;
signing a file with a digital signature using said private key;
sending said file to a client; and
authenticating said file at said client with said public key.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a system and method for distributing files, such as data files, executable files, and web page content files, between an unsecure server and a client. The client is capable of authenticating the transferred file to determine if the creator of the file has been previously authorized to create files for the client. The file creator may be the original equipment manufacturer (OEM) of the client. The file creator may be a third party that is not the same party as the OEM of the client.
-
Citations
49 Claims
-
1. A method of authenticating a file to be executed, comprising the steps of:
-
generating a key pair, comprising a public key and a private key;
signing a file with a digital signature using said private key;
sending said file to a client; and
authenticating said file at said client with said public key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a second file to be executed, comprising the steps of:
-
storing said public key in a non-alterable memory in a client;
transferring the first file bearing a digital signature into said client;
authenticating said first file with digital signature using said public key;
transferring a second file bearing a digital signature to said client after authenticating and executing said first file; and
authenticating said second file bearing a digital signature, by executing the software in said first file on said client, using said public key. - View Dependent Claims (9, 10, 11, 12)
-
-
13-41. -41. (Cancelled)
-
42. A method of authenticating a file to be executed, comprising:
-
generating a key pair, comprising a public key and a private key;
signing a file with a client manufacturer signature using said private key;
sending said file to a client; and
authenticating said file at said client with said public key. - View Dependent Claims (43, 44, 45, 46, 47, 48)
-
-
49-62. -62. (Cancelled)
Specification