Electronic book security and copyright protection system
1 Assignment
0 Petitions
Accused Products
Abstract
The invention, electronic book security and copyright protection system, provides for secure distribution of electronic text and graphics to subscribers and secure storage. The method may be executed at a content provider'"'"'s site, at an operations center, over a video distribution system or over a variety of alternative distribution systems, at a home subsystem, and at a billing and collection system. The content provider or operations center and/or other distribution points perform the functions of manipulation and secure storage of text data, security encryption and coding of text, cataloging of books, message center, and secure delivery functions. The home subsystem connects to a secure video distribution system or variety of alternative secure distribution systems, generates menus and stores text, and transacts through communicating mechanisms. A portable book-shaped viewer is used for secure viewing of the text. A billing system performs the transaction, management, authorization, collection and payments utilizing the telephone system or a variety of alternative communication systems using secure techniques.
186 Citations
144 Claims
-
1-129. -129. (canceled)
-
130. A system for encrypting an electronic book for delivery from a first party to a second party, comprising:
-
a first interface that receives and transmits electronic books and encryption information;
a first memory coupled to the first interface that stores the electronic books and the encryption information;
a first processor coupled to the first interface and the first memory that processes the encryption information and encrypts and decrypts the electronic books;
a second interface that receives electronic books transmitted from the first party, and that receives and transmits encryption information;
a second memory coupled to the second interface that stores the received electronic books and the encryption information; and
a second processor coupled to the second interface and the second memory that processes the encryption information and that decrypts the received electronic books.
-
-
131. The system of claim 130, wherein the first and the second parties are coupled to a communications network, and wherein the encryption information and the electronic books are transmitted and received using the communications network.
-
132. The system of claim 131, wherein the communications network includes one or more of a television delivery system, a wired telephone system, a wireless telephone network, a personal communications network, a wired Internet system, a wireless Internet system, an intranet, a local area network, a radio communications network, and an optical fiber network.
-
133. The system of claim 130, wherein the encryption information includes an encryption key and a decryption key.
-
134. The system of claim 133, wherein the encryption key and the decryption keys comprise a symmetric key.
-
135. The system of claim 134, wherein the first processor comprises a first key generator, the first key generator generating the symmetric key.
-
136. The system of claim 135, wherein the first key generator generates the symmetric key randomly.
-
137. The system of claim 134, wherein the second processor comprises a second key generator, the second key generator generating the symmetric key.
-
138. The system of claim 137, wherein the second key generator generates the symmetric key randomly.
-
139. The system of claim 134, wherein the first processor and the second processor retrieve the symmetric key from the first and the second memories, respectively.
-
140. The system of claim 134, wherein the symmetric key is a transaction symmetric key, the transaction symmetric key supplied by a third party.
-
141. The system of claim 140, wherein the third party is a certificate authority.
-
142. The system of claim 141, wherein the certificate authority issues the transaction symmetric key encrypted.
-
143. The system of claim 142, wherein the transaction symmetric key is encrypted by the certificate authority using a first party symmetric key.
-
144-189. -189. (canceled)
Specification