Database usage metering and protection system and method
First Claim
1. A method of providing, for use by a customer at said customer'"'"'s site, a database that is at least in part encrypted, said method permitting said customer to use at least one part of said database while helping to ensure that owners of rights in portions of said database are properly compensated for use of said database, said method comprising the steps of:
- (i) providing at least one storage medium at said customer'"'"'s site, said storage medium having at least a portion of said database stored thereon in encrypted form, said database including at least first and second parts, a first owner owning at least one right in said first part, a second owner owning at least one right in said second part;
(ii) providing a database protection system for use with at least a portion of said database;
(iii) supplying at least one key for use by said database protection system;
(iv) limiting said customer'"'"'s use of at least a portion of said database;
(v) decrypting an encrypted portion of said database at least in part by using said database protection system and said key;
(vi) receiving a payment associated at least in part with use of (a) said first part, and (b) said second part, of said database; and
(vii) providing compensation to said first and second owners by apportioning at least part of said payment amongst said first and second owners.
1 Assignment
0 Petitions
Accused Products
Abstract
A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which .disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user'"'"'s site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.
-
Citations
105 Claims
-
1. A method of providing, for use by a customer at said customer'"'"'s site, a database that is at least in part encrypted, said method permitting said customer to use at least one part of said database while helping to ensure that owners of rights in portions of said database are properly compensated for use of said database, said method comprising the steps of:
-
(i) providing at least one storage medium at said customer'"'"'s site, said storage medium having at least a portion of said database stored thereon in encrypted form, said database including at least first and second parts, a first owner owning at least one right in said first part, a second owner owning at least one right in said second part; (ii) providing a database protection system for use with at least a portion of said database; (iii) supplying at least one key for use by said database protection system; (iv) limiting said customer'"'"'s use of at least a portion of said database; (v) decrypting an encrypted portion of said database at least in part by using said database protection system and said key; (vi) receiving a payment associated at least in part with use of (a) said first part, and (b) said second part, of said database; and (vii) providing compensation to said first and second owners by apportioning at least part of said payment amongst said first and second owners. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
-
59. A database protection system for securely distributing a database, said system preventing unauthorized use of at least a portion of said database, said system comprising:
-
at least one storage medium physically disposed at a customer'"'"'s site, said storage medium storing at least a portion of said database, said database containing properties, at least a portion of said database being encrypted, said encrypted portion requiring processing with at least one key for authorized use; and a digital processing arrangement, disposed at said customer'"'"'s site and operatively connected to said storage medium, said processing arrangement including; (a) control logic allowing said customer to select and use at least one part of at least one of said database properties, said control logic selectively processing, using said at least one key, at least one part of said encrypted portion of said stored database; (b) means for storing, at said customer'"'"'s site, at least one value related to metering of at least one aspect of use of at least a portion of said database properties, said storing means including means for storing, at said customer'"'"'s site, limit information related to limiting at least one aspect of said customer'"'"'s use of said database properties, wherein at least a portion of said stored limit information is accessible to said customer; and means for determining payment required from said customer for use of at least one portion of said database. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
-
73. A method of securely distributing an encrypted database portion, said method comprising:
-
providing, for use at a user location, at least one storage medium having an encrypted database portion stored thereon; selecting at least a part of said encrypted database portion; supplying a database protection arrangement for use at said user location in conjunction with said storage medium, said supplied database protection arrangement including a tamper resistant hardware element, said database protection arrangement performing the following steps; (a) storing, at least in part within said hardware element, information representing, at least in part, at least one key; (b) selectively processing, at least in part within said hardware element and with said stored key, at least a portion of said selected part of said encrypted database portion so as to provide useable information; (c) metering, at least in part within said hardware element, at least one parameter related to at least one aspect of use of at least a part of said encrypted database portion; and (d) storing, within said hardware element, information based on at least a portion of said metering. - View Dependent Claims (74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105)
-
Specification