Database usage metering and protection system and method
First Claim
1. A secure database access system comprising:
- a storage medium storing encrypted textual information;
means connected to said storage medium for selecting portions of said encrypted information and for reading said selected portions from said storage medium;
means, connected to said selecting and reading means, for decrypting said read encrypted information; and
control means connected to said decrypting means for metering usage of information decrypted by said decrypting means and for communicating said metered usage to a remote location, said control means including means for preventing said decrypting means from decrypting more than a certain quantity of information stored on said storage medium,wherein said control means measures the number of contiguous blocks of said textual information decrypted by said decrypting means and prevents said decrypting means from decrypting more than a certain number of said contiguous blocks.
3 Assignments
0 Petitions
Accused Products
Abstract
A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user'"'"'s site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.
-
Citations
41 Claims
-
1. A secure database access system comprising:
-
a storage medium storing encrypted textual information; means connected to said storage medium for selecting portions of said encrypted information and for reading said selected portions from said storage medium; means, connected to said selecting and reading means, for decrypting said read encrypted information; and control means connected to said decrypting means for metering usage of information decrypted by said decrypting means and for communicating said metered usage to a remote location, said control means including means for preventing said decrypting means from decrypting more than a certain quantity of information stored on said storage medium, wherein said control means measures the number of contiguous blocks of said textual information decrypted by said decrypting means and prevents said decrypting means from decrypting more than a certain number of said contiguous blocks. - View Dependent Claims (2)
-
-
3. A secure database access system comprising:
-
a storage medium storing encrypted textual information; means connected to said storage medium for selecting portions of said encrypted information and for reading said selected portions from said storage medium; means, connected to said selecting and reading means, for decrypting said read encrypted information; and control means connected to said decrypting means for metering usage of information decrypted by said decrypting means and for communicating said metered usage to a remote location, said control means including means for preventing said decrypting means from decrypting more than a certain quantity of information stored on said storage medium, said control means including; means for communicating signals over a communications path to said centralized billing facility; and electronic monitoring means, connected to said decrypting means and to said communicating means, for counting the number of predetermined length blocks of information decrypted by said decrypting means and for controlling said signal communicating means to communicate said count to said billing facility, wherein said monitoring means also determines identifying characteristics of said selected portions and controls said signal communicating means to communicate said identifying characteristics to said billing facility.
-
-
4. A secure database access system comprising:
-
non-volatile storage means for storing a text-oriented database in digital form; means connected to said storage means for selecting and reading portions of said stored database; means connected to said selecting and reading means for determining the percentage of said stored database read by said selecting and reading means; further non-volatile storage means connected to said determining means for storing information representing said determined quantity; communicating means connected to said further storage means for periodically transmitting said stored information to a location remote thereto; and means connected to receive said stored quantity information for preventing said reading and selecting means from reading and selecting further information when said determined percentage indicated by said stored information exceeds a predetermined percentage of said database.
-
-
5. A secure data base access system comprising:
-
a storage medium storing a textual data base comprising characters in encrypted form, said storage medium also storing index information, said index information correlating portions of said encrypted database with unencrypted search information; a host digital signal processor, operatively connected to said storage medium, said processor pre-programmed so as to;
(a) generate unencrypted search information, (b) read said index information from said storage medium, (c) identify, in accordance with said index information, the portions of said encrypted database which satisfy said search information, and (d) read said identified encrypted database portions from said storage medium;a non-volatile memory device; means for decrypting portions of said encrypted database to produce corresponding decrypted information; decoder control logic means, coupled to said host processor, said decrypting means, and said memory device, for receiving said encrypted database portions read by said host processor, for controlling said decrypting means to decrypt said portions, for measuring the quantity of information decrypted by said decrypting means, and for storing said measured quantity in said memory device; and telecommunications means connected to said non-volatile memory for periodically communicating said stored measured quantity to a distant location over a telecommunications network, for transmitting said same search information over said network, and for accessing a further, related portion of said same database over said telecommunication network in accordance with said same search information. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of accessing information comprising the steps of:
-
(i) providing a storage medium storing encrypted text information organized into a database thereon; (ii) selecting portions of said encrypted information; (iii) reading said selected portions from said storage medium; (iv) decrypting said read information; (v) measuring the amount of information decrypted by said decrypting step; (vi) calculating a usage fee in response to said measured amount; and (vii) preventing decryption of more than a predetermined quantity of contiguous database information. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method of accessing databases comprising the steps of:
-
storing digital information organized into plural discrete databases on a random access non-volatile storage device; selecting one of said plural databases; selecting discrete portions of said selected database; using said selected discrete portions of said selected database; metering said usage of each of said databases individually and generating signals indicating said usage; storing said usage-indicating signals in a further non-volatile storage device; periodically communicating said stored usage-indicating signals to a remote location; and inhibiting said using step whenever said metering step indicates a significant percentage of any of said plural databases has been used within a given time period.
-
-
20. A method of securing access to a database comprising the steps of:
-
providing a read only random access storage medium having a database in encrypted form stored thereon and also having index information stored thereon said index information correlating portions of said encrypted database with unencrypted search information; generating unencrypted search information; reading said index information from said storage medium; identifying, in accordance with said index information, the specific database portions of said encrypted database which satisfy said generated search information; reading said identified encrypted database portions from said storage medium; decrypting said read portions of said encrypted database to produce corresponding decrypted information; measuring the quantity of information decrypted by said decrypting step; storing said measured quantity in a non-volatile memory device; and inhibiting said decrypting step from decrypting more than a certain percentage of said encrypted database in response to said quantity measured by said measuring step thereby preventing copying of a significant portion of said database.
-
-
21. A method of securing access to a database comprising the steps of:
-
providing a random access mass storage medium having a database stored thereon and also having index information correlating portions of said database with encrypted source information stored thereon; generating search information; reading said index information from said storage medium; identifying, in accordance with said index information, the specific portions of said database which correspond to said generated search information; reading said specific identified database portions from said storage medium; decrypting said specific identified portions of said encrypted source to produce corresponding decrypted information; measuring the quantity of information decrypted by said decrypting step; storing said measured quantity in a non-volatile memory device; and inhibiting said decrypting step from decrypting more than a predetermined percentage of said source in response to said quantity measured by said measuring step, thereby preventing copying of a significant portion of said database. - View Dependent Claims (22, 23)
-
-
24. A method of distributing literary properties comprising the steps of:
-
(i) providing, to a user at a user site, a storage medium having plural different text-oriented literary properties stored thereon in digital form, rights in said text-oriented properties being owned by different property owners; (ii) permitting the user to select and electronically access said stored properties and preventing the user from copying more than a certain percentage of said stored properties using a digital signal processor at said user site connected to a non-volatile storage device also at said user site; (iii) storing with said digital processor digital signals identifying said selected properties in said non-volatile storage device in response to database accesses by the user in accordance with said permission provided by said permitting step (ii); (iv) periodically communicating said stored digital signals from said digital processor to a central billing facility remote to said user site via a telecommunications network; (v) determining, in response to said communicated digital signals communicated by said communicating step (iv), a user charge based on actual access of the properties stored on said storage medium by the user in accordance with said permission provided by said permitting step (ii); (vi) subsequent to said determining step (v), collecting the user charge determined by said determining step (v) from said user; and (vii) apportioning said user charge collected in said collecting step (vi) between said different property owners in accordance with said actual access of said properties by said user in accordance with said permission provided by said permitting step (ii). - View Dependent Claims (25, 26, 27)
-
-
28. A secured browsing workstation comprising:
-
means, connected to receive encrypted information transmitted thereto by a host digital signal processor, for decrypting said encrypted information; display means, operatively coupled to said decrypting means, for displaying selected portions of said decrypted information; user interface means, manipulable by a user, for selecting information portions to be displayed and for selecting information portions to be further processed; data transmitting means, connected to said interface means and operatively connected to said decrypting means, for transmitting said portions selected for further processing by said host digital signal processor; and billing information generating means, connected to said user interface means, for generating billing information in response to information use, said generating means applying different billing rates for display of decrypted information and for further processing of decrypted information, said billing information generating means including means for generating an indication of total charges, and means for comparing said total charges to a predetermined credit and for inhibiting said data transmitting means from transmitting said portions to said host processor whenever said total charges exceed said predetermined credit. - View Dependent Claims (29, 30, 31)
-
-
32. A method of securing access to a database comprising the steps of:
-
(a) providing a storage medium having digital signals representing a database stored thereon; (b) selecting portions of said database; (c) extracting signals representing said selected database portions from said storage medium; (d) storing at least one characteristic of said selected portions in a non-volatile memory device; (e) repeating said selecting step (b); (f) reading stored characteristics from said memory device; (g) determining whether a database portion selected by said repeated selecting step (b) has a logical relationship with database portions earlier selected by said selecting step (b); and (h) inhibiting said extracting step (c) if said determining step reveals said logical relationship exists to thereby prevent copying of any substantial portion of information of said database, wherein said determining step (g) includes the step of determining whether signals representing more than a predetermined percentage of said database have been extracted. - View Dependent Claims (33, 34)
-
-
35. A method of securing access to a database comprising the steps of:
-
(a) providing a storage medium having digital signals representing a database stored thereon; (b) selecting portions of said database; (c) extracting signals representing said selected database portions from said storage medium; (d) storing at least one characteristic of said selected portions in a non-volatile memory device; (e) repeating said selecting step (b); (f) reading stored characteristics from said memory device; (g) determining whether a database portion selected by said repeated selecting step (b) has a logical relationship with database portions earlier selected by said selecting step (b); and (h) inhibiting said extracting step (c) if said determining step reveals said logical relationship exists to thereby prevent copying of any substantial portion of information of said database, wherein said data is organized in sequential blocks, and said determining step (g) includes the step of determining whether signals representing more than a predetermined number of sequential blocks of said database have been extracted.
-
-
36. A method of securing access to a database comprising the steps of:
-
(a) providing a storage medium having digital signals representing a database stored thereon; (b) selecting relatively small portions of said database; (c) extracting signals representing said selected database portions from said storage medium; (d) storing at least one characteristic of said selected portions in a non-volatile memory device; (e) repeating said selecting step (b); (f) reading stored characteristics from said memory device; (g) determining whether a database portion selected by said repeated selecting step (b) has a logical relationship with database portions earlier selected by said selecting step (b); and (h) inhibiting said extracting step (c) if said determining step reveals said logical relationship exists to thereby prevent copying of any substantial portion of information of said database, said method further including the step of specifying a maximum cost value; wherein said determining step includes the steps of; calculating a total cost based on the quantity of extracted data portions associated with said stored characteristics, and determining whether said calculated total cost exceeds said specified cost value; and wherein said inhibiting step inhibits said extracting step whenever said calculated total cost exceeds said specified cost value.
-
-
37. Apparatus for accessing a stored database comprising:
-
a storage medium having digital signals representing a database stored thereon; means operatively associated with said storage medium for selecting portions of said database and for non-destructively extracting signals representing said selected database portions from said storage medium; non-volatile memory means connected to said selecting and extracting means for storing at least one characteristic of said selected portions in a non-volatile memory device and for retaining said stored characteristics; and means connected to said non-volatile memory means and to said selecting and extracting means for determining whether a characteristic of data portions selected by said selecting and extracting means has a predetermined relationship with characteristics retained by said memory means and for inhibiting said selecting and extracting means from extracting said selected data portions if said testing reveals said predetermined relationship exists to thereby prevent copying of a substantial portion of said database over time, wherein said determining means includes means for determining whether signals representing more than a predetermined percentage of said data has been extracted. - View Dependent Claims (38, 39, 40)
-
-
41. Apparatus for accessing a stored database comprising:
-
a storage medium having digital signals representing a database stored thereon; means operatively associated with said storage medium for selecting portions of said database and for non-destructively extracting signals representing said selected database portions from said storage medium; non-volatile memory means connected to said selecting and extracting means for storing at least one characteristic of said selected portions in a non-volatile memory device and for retaining said stored characteristics; and means connected to said non-volatile memory means and to said selecting and extracting means for determining whether a characteristic of data portions selected by said selecting and extracting means has a predetermined relationship with characteristics retained by said memory means and for inhibiting said selecting and extracting means from extracting said selected data portions if said testing reveals said predetermined relationship exists to thereby prevent copying of a substantial portion of said database over time, wherein said data is organized in sequential blocks, and said determining means includes means for determining whether signals representing more than a predetermined number of sequential blocks of said data have been extracted.
-
Specification