ELECTRONIC BOOK SECURITY AND COPYRIGHT PROTECTION SYSTEM
First Claim
1. A system for encrypting an electronic book for delivery from a first party to a second party, comprising:
- a first interface, which is part of the first party, that receives and transmits electronic books, encryption information, and non-encrypted information related to the electronic books contemporaneously;
a first memory coupled to the first interface that stores the electronic books, the encryption information, and the non-encrypted information;
a first processor coupled to the first interface and the first memory that processes the encryption information and encrypts and decrypts the electronic books;
a second interface that is a viewing interface coupled to the first interface and that receives electronic books transmitted from the first party, and that receives and transmits encryption information;
a second memory coupled to the second interface that stores the received electronic books and the encryption information; and
a second processor coupled to the second interface and the second memory that processes the encryption information and that decrypts the received electronic books;
wherein the second interface, the second memory and the second processor are housed on a portable book viewer; and
wherein, when the information is viewed on the second interface, the second interface is uncoupled from the first interface.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention, electronic book security and copyright protection system, provides for secure distribution of electronic text and graphics to subscribers and secure storage. The method may be executed at a content provider'"'"'s site, at an operations center, over a video distribution system or over a variety of alternative distribution systems, at a home subsystem, and at a billing and collection system. The content provider or operations center and/or other distribution points perform the functions of manipulation and secure storage of text data, security encryption and coding of text, cataloging of books, message center, and secure delivery functions. The home subsystem connects to a secure video distribution system or variety of alternative secure distribution systems, generates menus and stores text, and transacts through communicating mechanisms. A portable book-shaped viewer is used for secure viewing of the text. A billing system performs the transaction, management, authorization, collection and payments utilizing the telephone system or a variety of alternative communication systems using secure techniques.
-
Citations
14 Claims
-
1. A system for encrypting an electronic book for delivery from a first party to a second party, comprising:
-
a first interface, which is part of the first party, that receives and transmits electronic books, encryption information, and non-encrypted information related to the electronic books contemporaneously; a first memory coupled to the first interface that stores the electronic books, the encryption information, and the non-encrypted information; a first processor coupled to the first interface and the first memory that processes the encryption information and encrypts and decrypts the electronic books; a second interface that is a viewing interface coupled to the first interface and that receives electronic books transmitted from the first party, and that receives and transmits encryption information; a second memory coupled to the second interface that stores the received electronic books and the encryption information; and a second processor coupled to the second interface and the second memory that processes the encryption information and that decrypts the received electronic books; wherein the second interface, the second memory and the second processor are housed on a portable book viewer; and wherein, when the information is viewed on the second interface, the second interface is uncoupled from the first interface.
-
-
2. The system of claim 1, wherein the first and the second parties are coupled to a communications network, and wherein the encryption information and the electronic books are transmitted and received using the communications network.
-
3. The system of claim 2, wherein the communications network includes one or more of a television delivery system, a wired telephone system, a wireless telephone network, a personal communications network, a wired Internet system, a wireless Internet system, an intranet, a local area network, a radio communications network, and an optical fiber network.
-
4. The system of claim 1, wherein the encryption information includes an encryption key and a decryption key.
-
5. The system of claim 4, wherein the encryption key and the decryption keys comprise a symmetric key.
-
6. The system of claim 5, wherein the first processor comprises a first key generator, the first key generator generating the symmetric key.
-
7. The system of claim 6, wherein the first key generator generates the symmetric key randomly.
-
8. The system of claim 5, wherein the second processor comprises a second key generator, the second key generator generating the symmetric key.
-
9. The system of claim 8, wherein the second key generator generates the symmetric key randomly.
-
10. The system of claim 5, wherein the first processor and the second processor retrieve the symmetric key from the first and the second memories, respectively.
-
11. The system of claim 5, wherein the symmetric key is a transaction symmetric key, the transaction symmetric key supplied by a third party.
-
12. The system of claim 11, wherein the third party is a certificate authority.
-
13. The system of claim 12, wherein the certificate authority issues the transaction symmetric key encrypted.
-
14. The system of claim 13, wherein the transaction symmetric key is encrypted by the certificate authority using a first party symmetric key.
Specification