Copy protection of data
3 Assignments
0 Petitions
Accused Products
Abstract
A copyright protection scheme is provided in which data is downloaded from a server 1, typically over the World Wide Web 2 to a client 3, for presentation to a user. The downloaded data is cryptographically protected, by encryption and hashing. When displayed by the client, storing and copying functions are selectively disabled in respect of the data, in order to prevent unauthorised copying.
38 Citations
33 Claims
-
1-27. -27. (canceled)
-
28. A method of downloading data from a server to a client, the method comprising:
-
transmitting an applet from the server to the client, the applet including at least a hashing algorithm, an encryption algorithm, and an encryption key;
receiving, at the server, a file request for the data from the client, the file request being generated by execution of the applet at the client;
hashing, at the server, the requested data using a copy of hashing algorithm that was previously transmitted to the client as part of the applet;
encrypting, at the server, the requested data using a copy of the encryption algorithm and the encryption key that were previously transmitted to the client as part of the applet; and
wrapping the hashed and encrypted data in a file and transmitting the wrapped filed to the client. - View Dependent Claims (29, 30)
-
-
31. A server for downloading data to a client, said server comprising:
-
an output which transmits an applet to the client, the applet including at least a hashing algorithm, an encryption algorithm, and an encryption key;
an input which receives a file request for the data from the client, the file request being generated by execution of the applet at the client;
a processor which;
hashes the requested data using a copy of hashing algorithm that was previously transmitted to the client as part of the applet;
encrypts the requested data using a copy of the encryption algorithm and the encryption key that were previously transmitted to the client as part of the applet; and
wraps the hashed and encrypted data in a file and transmitting the wrapped filed to the client. - View Dependent Claims (32, 33)
-
Specification